My this article totally different from previous one.
SQL Injection (SQLI) Part-1I hope you all enjoyed my previous article on Email spoofing, if not you'll can go to my profile and check it.
A web site may be accessible via a public Internet Protocol (IP) network, such as the Internet, or a private local area network (LAN), by referencing a uniform resource locator (URL) that identifies the site.
Websites have many functions and can be used in various fashions; a website can be a personal website, a commercial website for a company, a government website or a non-profit organization website.
Websites can be the work of an individual, a business or other organization, and are typically dedicated to a particular topic or purpose, ranging from entertainment and social networking to providing news and education.
All publicly accessible websites collectively constitute the World Wide Web, while private websites, such as a company's website for its employees, are typically a part of an intranet.
The websites need a SQLi vulnerability in order to do this technique.
The SQL Injection attack allows external users to read details from the database, so attackers can dump whole website database and find admin username/password details. Note: Unfortunately we CANNOT SQLi attack on all websites.