This chapter covered the fundamentals of SQL and NoSQL injection, using sqlmap to test a target host URL, the value of Google Dorks for both application-targeted and general vulnerability analysis, and reporting a SQLi bug properly, from detection to submission.
In the next chapter, we'll discuss cross-site request forgery (CSRF), how to create (and automate) CSRF PoCs, where CSRF occurs, validating a CSRF vulnerability, strategies for reporting the bug, and more.