A successful SQL injection attack can cause the following:
- Authentication bypass: Allows a user to gain access to a system without valid credentials or privileges
- Information disclosure: Allows a user to obtain sensitive information
- Compromised data integrity: Allows a user to manipulate data in a database
- Compromised availability of data: Prevents legitimate users from accessing data on a system
- Remote code execution on a compromised system: Allows a malicious user to run malicious code on a system remotely
Next, let's take a look at learning how to bypass logins using SQL injection.