SQL Injection ├── What is SQL Injection? │ ├── Definition │ ├── SQL Commands │ │ ├── INSERT │ │ ├── SELECT │ │ ├── UPDATE │ │ └── DELETE │ └── Injection Points │ ├── User Input Forms │ └── URLs ├── Types of SQL Injection │ ├── In-Band │ │ ├── Error-Based │ │ └── UNION-Based │ ├── Blind/Inferential │ │ ├── Boolean-Based │ │ └── Time-Based │ └── Out-of-Band ├── Attack Techniques │ ├── Authentication Bypass │ ├── Authorization Bypass │ ├── Information Disclosure │ ├── Data Manipulation │ └── Remote Code Execution └── Prevention ├── Input Validation ├── Parameterized Queries ├── Stored Procedures ├── Least Privilege Principle └── Regular Security Audits