We can find many ways to optimize our SQL injection applications. For instance, we can test for commonly-used table or column names before running a per-byte check on a server. This chapter provides an easy insight into how to craft an SQL injection tool that suits our needs. SQL injection is an art form. It takes intuition, creativity, experience, and solid background knowledge of all technologies involved to master it. In the next chapter, we move on to other methods of web application penetration testing with Perl, such as cross-site scripting, content management system vulnerabilities, and file inclusion attacks.