
What is SQL Injection? Tutorial & Examples | Web Security Academy
What is SQL injection (SQLi)? SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. This can allow …
SQL injection - PortSwigger
This learning path introduces SQL injection (SQLi), a critical web vulnerability. You'll learn how to detect and exploit SQLi to uncover hidden data and manipulate application behavior, as well …
SQL injection - PortSwigger
SQL injection (or SQLi) is a serious vulnerability responsible for many high-profile data breaches. SQL injection typically allows an attacker to extract the entire database from the vulnerable …
Testing for SQL injection vulnerabilities with Burp Suite
Nov 18, 2025 · SQL injection vulnerabilities occur when an attacker can interfere with the queries that an application makes to its database. You can use Burp to test for these vulnerabilities:
SQL injection (second order) - PortSwigger
SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data …
What is cross-site scripting (XSS) and how to prevent it? | Web ...
What is the difference between XSS and SQL injection? XSS is a client-side vulnerability that targets other application users, while SQL injection is a server-side vulnerability that targets …
All labs | Web Security Academy - PortSwigger
As you'll have no prior knowledge of the type of vulnerability that you need to find and exploit, this is great for practicing recon and analysis. Take me to the mystery lab challenge
What is Blind SQL Injection? Tutorial & Examples - PortSwigger
Blind SQL injection occurs when an application is vulnerable to SQL injection, but its HTTP responses do not contain the results of the relevant SQL query or the details of any database …
Examining the database in SQL injection attacks - PortSwigger
To exploit SQL injection vulnerabilities, it's often necessary to find information about the database. This includes: The type and version of the database ...
Using SQL Injection to Bypass Authentication - PortSwigger
In this example we will demonstrate a technique to bypass the authentication of a vulnerable login page using SQL injection. This tutorial uses an exercise from the "Mutillidae" training tool …