In this chapter, you will take a detailed look at how you can avoid being hacked by a sniffer; in addition, you will learn how you can exploit SQL injection flaws and take over database servers. Crackers break into systems by injecting malformed SQL queries that map out the database column names. This is known as SQL mapping , with SQL injection being the technique by which they obtain this information. When you have a good grasp of SQL mapping, you can defend your system from such attacks.
There are a few good sniffing tools available in Kali Linux. You can also build your ...