values are transmitted
To begin with, we will determine that in this article I in no way urge anyone to hack someone’s Internet resources using the methods described below.
The main goal of the article is to demonstrate to the user the importance of the topic of data protection on the Internet using an example of a site that is not properly protected. Perhaps, the most common method of hacking a site will be used as a method of attacking a site – SQL injection.
To begin with, we will determine that all, without exception, modern, voluminous, complex sites are built on the basis of a database. Work with data stored in the database of your site is carried out through the structural query language SQL. Continue reading