SQL injection attack, listing the database contents on non-Oracle databases

Aim:

- Determine the name of the table that holds users’ information.

- Determine the columns that contain the usernames and passwords.

- Retrieve the username and passwords from the column.

- Log in as administrator.

Tools:

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store