This post will refer to a series of SQL injection tutorials. With examples, they cover; bypassing logins, vulnerability, attacks, prevention, and more. Most feature download links.
A SQL injection attack, as you may be aware of, consists of insertion or “injection” of a SQL query via input forms (login form). A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database. It’s most-often a poorly-designed application that reveals database parameters to potential attackers.
Happy Ethical hacking!