Summary
This file is the starting point of my methodology of how to tackle SQL Injection
Attack Methodology
When presented with an area that has the possibility of being exploited by an SQLi the first thing we want to do is see if it is exploitable.