In this lesson, you'll explore how SQL injection works, by interacting with a vulnerable login system. This is a hands-on, guided challenge. Click below to get started.