Anatomy of a Vulnerability

In this section we will recreate a SQL injection and show how to test for it.