An SQL injection is a vulnerability based on an input validation error, which allows a malicious user to insert unexpected SQL statements into an application to perform different actions on it. For example, extract information, delete data or modify the original statements.
There are three types of SQL injections, as follows:
- In-band SQL injection: This type of SQL injection has the characteristic that is possible to analyze using the same channel used to send the statement. It means that the response generated by the database management system (DBMS) is received in the same analyzed application.
- Inferential: This type of SQL injection is different from the previous one, as it is not possible to see the errors or the results in the application's response. We need to infer what is happening in the application&apos...