While conducting a penetration test, you eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for while conducting a penetration test, you notice that input directly affects the database queries. Which technique could be used to test

Full Certification Question

While conducting a penetration test, you notice that input directly affects the database queries. Which technique could be used to test the effectiveness of the firewall against SQL injection?