
SQL injection attacks - in which SQL commands are injected into data-plane input in order to affect the execution of predefined SQL commands. A successful SQL injection exploit - can read/modify(Insert/Update/Delete) sensitive data from the database, execute administration operations(such as shutdown the DBMS), recover the content of a given file present on the DBMS file system, and in some cases issue commands to the operating system. Let’s start from the basics: What is SQL Injection?Ī SQL injection attack consists of the “insertion/injection” of a SQL query via the input data from the client to the application. Further, we will dive into the automated tool: Sqlmap, which will ease the attack escalation. In this article, we will start by Identifying the SQL Injection vulnerabilities & how to exploit the vulnerable application.

Identifying & Exploiting SQL Injections: Manual & Automated
