A class of vulnerabilities where attacker-controlled input is incorporated into database or directory queries, allowing unauthorized data access or manipulation.
Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free