
In the last video, we got a little experience with SQL injections. We learnt how a web application may use a database of some kind to authenticate users and how it might be abused if not set correctly.
In this box, we go a little further logging into mysql and looking at the databases and tables.