Learning about injection points
While we aren't going to do any "hands-on" with injection in this chapter, it's essential to understand what injection is, how it works, and why it's an issue that remains one of the top issues within web applications. We will look at a more hands-on implementation of injection in Chapter 6, Setting Up and Pentesting AWS Aurora RDS, when we set up a vulnerable environment for SQL injection exercises.
What is an injection?
An injection is a flaw within an application that allows malicious statements to be executed. While it may not seem "too evil," these statements can be statements that actually control databases – ultimately giving unauthorized users control of a system. This means that if not corrected, the flaw could allow malicious users to access sensitive data or even completely take over the database.
How does it work?
To start, a point of entry needs to be found; this is typically a vulnerable...