This article explores the infamous SQL Injection flaw on Acunetix's VulnWeb website, without using any tools other than the browser. It explains what SQL Injection is and how to identify vulnerable parameters. It also covers the process of enumerating columns in the database.
•2m read time• From systemweakness.com
Table of contents
What is SQL Injection?Identifying possibly vulnerable parametersEnumerating columnsInjecting parametersDiscovering TablesListing ColumnsConclusionSort: