May 15, 2024, 4:47 p.m. | David Eduardo Karpinski

System Weakness - Medium systemweakness.com

In this article we will explore the infamous SQL Injection flaw, but without tools (other than the browser) on Acunetix’s VulnWeb website. First of all, it’s always good to review!

Credit: Unplash

What is SQL Injection?

SQL injection is a technique used by attackers that takes advantage of the improper concatenation of user input parameters with code that interacts directly with database queries.

If you are new to the subject and/or want a more complete explanation, I recommend OWASP or …

bug bounty hacking mysql sql sql injection

Sr. Product Manager

@ MixMode | Remote, US

Information Security Engineers

@ D. E. Shaw Research | New York City

Assoc/Mid ET P&C Control System Field Compliance Analyst (Glen Allen, VA)

@ Dominion Energy | GLEN ALLEN, VA, US, 23060

Technology Risk & Controls Lead- PCI Compliance

@ JPMorgan Chase & Co. | Plano, TX, United States

Editor, Compliance Risk and Diligence

@ Kroll | Manila, Philippines

KGS - KDN IAM Associate Consultant - Bengaluru

@ KPMG India | Bengaluru, Karnataka, India