In this chapter, we learned how to enumerate the table names from the database using SQL injection, and we also learned how to read files from the OS file system via SQL injection.
Remember to review the tools, such as SQL map or SQL brute, to learn more about how these tools work.
In Chapter 7, Intercepting HTTP Requests, we're going to learn about HTTP proxies, and we're going to create our own based on the mitmproxy tool.