So every issue that ZAP has found under SQL injection seems to be time based by trying to inject some form of sleep with a timer of 5 seconds.
To me this is NOT a very useful test, especially considering that there might be some lag with network traffic. Is there any way to change the test to
SQL Injection - Hypersonic SQL - Time Based
SQL Injection - MySQL
SQL Injection - Oracle - Time Based
SQL Injection - PostgreSQL - Time Based
Even those that don't specifically list "Time Based", only try to do sleep (5)'s. I have my thresh hold set to medium and my strength to medium.
- Preferably, do something other than a sleep, try to retrieve actual data or
- Have a much longer sleep, such as 20 seconds.
---
Similarly, do i just copy paste the attack into the form field on the browser to manually test when pressing submit or do i need to somehow modify the actual post request?
---
Re-sending the request to check doesn't perform authentication, isn't this an issue when trying to double check some issues that were found?