ethical-hacker video for while conducting a penetration test, you notice that input directly affects the database queries. Which technique could be used to test
While conducting a penetration test, you notice that input directly affects the database queries. Which technique could be used to test the effectiveness of the firewall against SQL injection?