Summary
This chapter taught us the importance of analyzing source code in finding SQL injection vulnerabilities. We saw how SQL injection works and explored the common types and techniques of SQL injection. We then learned how to exploit SQL injection and XSS with Burp and Python.
The next chapter is focused on the Internet of Things (IoT).