Description:
The technique that could attack database on (web) application.
This occur when attacker input special command embedded with
data input on (web) application, such as Username or password
field.
Impact:
A successful SQL injection can read sensitive data, modify data
or execute administration operations on the database.
A1. Injection