Watch this video on YouTube
Which type of SQLi exploits a database server’s ability to make DNS requests in order to pass data to an attacker?