Summary

This file is the starting point of my methodology of how to tackle SQL Injection

Attack Methodology

When presented with an area that has the possibility of being exploited by an SQLi the first thing we want to do is see if it is exploitable.