increasingly, companies considering security a top priority and ex-filtration of data are more restricted. The OOB techniques often useful in a blind vulnerability , as an attacker you don’t get the output of exploit in direct response , for instance in a web-app vulnerable to blind injection . …