Figure 5: Manipulating the SQL query lets you list all tables in the database. This is usually all the information needed to launch an effective attack.

Back to Article