SQL injection vulnerabilities
Procedure
step 1. Read the instruction and click the arrow icon to move next instruction

step 2. Read the instruction and select each command provided to the vulnurable site and observe the backend and the explanation

step 3. read the next instruction and and try to login attempt again with provided credentials

step 4. Read the instruction and attempt with the login credentials and observe the the access we got from the sql injection
