{keyword}');select Sleep(5)# -

{keyword}');select Sleep(5)# -

: This attempts to prematurely close the original, legitimate SQL query statement intended by the developers [2].

If you enter this payload into a form and the website takes roughly 5 seconds longer than usual to load, it confirms that the application is vulnerable to SQL injection [2]. {KEYWORD}');SELECT SLEEP(5)#

: This represents the legitimate input field or parameter in a web application (e.g., a search box, user ID field, or URL parameter) [1]. : This attempts to prematurely close the original,

If the payload works, an attacker can replace SLEEP(5) with more complex queries (e.g., IF(SUBSTRING((SELECT password FROM users),1,1)='a', SLEEP(5), 0) ) to extract data character-by-character based on whether the server pauses [3]. Security Implications a search box