Type of injection | Nature of attack | Approach for detection |
---|---|---|
String SQLI | Bypassing authentication, identifying injectable parameters using string data type, extracting data | Rule-based |
Numeric SQLI | Bypassing authentication, identifying injectable parameters using numeric data type extracting data | Rule-based |
Comment attack | Bypassing authentication, identifying injectable parameters using the comment form, extracting data | Rule-based |