Injection attacks are numerous, but because they all insert code that they know will be transported into the application or database tiers for execution, they have an impact that earns injections a #1 ranking from the OWASP Top 10. We'll cover the big ones here, but know that the scanning and testing approaches are very similar, in that we'll leverage automation to both probe each portal for signs of weakness and to pass best-practice based strings against any potential flaws to test against them. Before we get into the varieties of injection, it helps to step back and look at how OWASP characterizes them. The following screenshot comes from their latest release candidate of the OWASP 2017 Top 10 List (https://github.com/OWASP/Top10/blob/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf):
Injecting some fun into your testing
OWASP's Injection Attack Characterization...