Anatomy of a Vulnerability
In this section we will recreate a SQL injection and show how to test for it.