In Chapter 5, Password Testing, we learned about the different authentication methods, and we created a password brute forcing tool. In this chapter, we're going to learn about one of the most dangerous vulnerabilities that can affect web applications, SQL injection (SQLi).
In this chapter, we're going to take a look at:
- Introduction to SQL injection
- Detecting SQL injection issues
- Exploiting a SQL injection to extract data
- Advanced SQLi exploiting