Discovering SQL injections with POST

In this exercise, we will attempt to discover whether SQL injection is possible with POST. The POST method is used to send data to a web server. This method is not like the GET method, which is used to retrieve data or a resource. We will be using the following topology to complete this exercise:

To start detecting SQL injections with POST, use the following instructions:

  1. Enable Burp Proxy on your Kali Linux machine and confirm that your web browser proxy settings are correct. If you are unsure, please refer to Chapter 7, Working with Vulnerability Scanners, specifically the Burp Suite section, which contains ...

Get Learn Kali Linux 2019 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.