# Exploitation - SQL injections

### Syntax reference

### Injection detection

### Injection queries

**Authentication bypass**

**Meta information gathering**

**Databases enumeration**

**Tables and columns enumeration**

**Data exfiltration**

### Advanced injection queries and techniques

**Database credentials extraction**

**Reading and writing files**

**System commands execution**

**Denial of Service**

**Out-of-band channeling**

**Logs management**

**Persistence**
