This tool automates detecting and exploiting SQL injection flaws and taking over of database servers. The tool is useful for pen testers and has a powerful detection engine that performs database fingerprinting, accesses data from the database, access the underlying file system on the server and executes commands on OS via out-of-band connections.
Learning Objectives
Understand how to use this PenTesting tool