Answer:
Attackers can use SQL injection by injecting malicious SQL queries to manipulate authentication checks and potentially bypass authentication.
Attackers can use SQL injection by injecting malicious SQL queries to manipulate authentication checks and potentially bypass authentication.
You may be interested in:
Web Security MCQs - PART 2