May 15, 2024, 4:47 p.m. | David Eduardo Karpinski

System Weakness - Medium systemweakness.com

In this article we will explore the infamous SQL Injection flaw, but without tools (other than the browser) on Acunetix’s VulnWeb website. First of all, it’s always good to review!

Credit: Unplash

What is SQL Injection?

SQL injection is a technique used by attackers that takes advantage of the improper concatenation of user input parameters with code that interacts directly with database queries.

If you are new to the subject and/or want a more complete explanation, I recommend OWASP or …

bug bounty hacking mysql sql sql injection

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)