As mentioned in the previous chapter (Chapter 14, Performing Website Penetration Testing), SQL injection (SQLi) allows an attacker to insert a series of malicious SQL code/queries directly into a backend database server. This vulnerability allows an attacker to manipulate records by adding, removing, modifying, and retrieving entries in a database.
In this section, we will cover the following topics:
- The dangers from SQL injection vulnerabilities
- Bypassing logins using SQL injection vulnerability
Now, let's look at the dangers of SQL injections in detail.