Browser based SQL injection, tips?

Been using a tool to pentest on a website I set up with intentional vulnerabilities on my local network and I’m lost here.

A tool I used for scanning detected a blind SQL injection point, and gave me this link:

https://www.mywebsite.com/?℅22℅09or%09sleep%287%29%231

On the point https://www.mywebsite.com/

Not part of any indexes or other pages

What does the URL fully mean? What kind of request is being done and can I get anything out of it, if at all?

It looks like its tested for a time based blind SQL response but I’d want to know how else I can modify that request to give me other information about the site with no further context

submitted by /u/Blobman42
[link] [comments]

Read More >>