See https://github.com/fel-communication-security/sql-injection
- Open Worldwide Application Security Project (OWASP)
- https://www.thecatch.cz/
- https://cognitive-intelligence.github.io/cognitive-web/#/students
- https://www.bleepingcomputer.com/tag/sql-injection/
- https://www.hacksplaining.com/lessons
- https://vm-thijs.ewi.utwente.nl/ctf/sql
- https://github.com/fel-communication-security
- Same-origin policy
- CORS
- XSS
- Reflected XSS
- not stored on the server
- it might be part of the URL query param (link)
- someone sents us the link, we click, the server does not escape the value of the param
- Persistent XSS
- script is stored on the server (malicious comment in the DB)
- Reflected XSS
- https://darknetdiaries.com/
- https://google-gruyere.appspot.com/
- https://stackoverflow.com/questions/9098655/how-can-i-add-comments-in-mysql