In this exercise, we will attempt to discover whether SQL injection is possible with POST. The POST method is used to send data to a web server. This method is not like the GET method, which is used to retrieve data or a resource. We will be using the following topology to complete this exercise:
To start detecting SQL injections with POST, use the following instructions:
- Enable Burp Proxy on your Kali Linux machine and confirm that your web browser proxy settings are correct. If you are unsure, please refer to Chapter 7, Working with Vulnerability Scanners, specifically the Burp Suite section, which contains ...