In this final chapter, we reviewed other scenarios that can be used to assess an application. In this chapter, we looked for SQL injections and exploited one of them using different methods.
For an application security assessment, I recommend avoiding the manual exploitation methods, because we will have less time to use them. They are useful when it is not possible to find vulnerabilities using other methods.
In this chapter, you learned how to analyze the parameter behavior in a request to infer what could be vulnerable and reduce the time analysis. Later, we looked into detecting Blind SQL injection vulnerabilities using Burp Suite's scanner, SQLMap, and the Intruder tool. Finally, we learned how to guess a tracking number using Intruder to exploit a Blind SQL injection.