This post will refer to a series of SQL injection tutorials. With examples, they cover; bypassing logins, vulnerability, attacks, prevention, and more. Most feature download links.

A SQL injection attack, as you may be aware of, consists of insertion or “injection” of a SQL query via input forms (login form). A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database. It’s most-often a poorly-designed application that reveals database parameters to potential attackers.

Happy Ethical hacking!

  1. Ethical Hacking SQL Injection

  2. Hack a Website Through SQL Injection

  3. SQLi Hunter

  4. SQLi Dumper

  5. Havij Pro SQL Injection Tool

  6. SQLi Dumper V8