• Introduction
  • Detect and exploit a SQL injection
  • Direct connection to the database management system