Figure 5:
Manipulating the SQL query lets you list all tables in the database. This is usually all the information needed to launch an effective attack.
Back to Article