A web vulnerability where attacker-supplied input is inserted into SQL queries, allowing unauthorized database access, data extraction, modification, or deletion.
Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free