| What is the attack technique used to exploit websites by altering the backend database queries through inputting manipulated queries?
Choose the correct option from below list
(1)LDAP Injection
(2)OS Commanding
(3)XML Injection
(4)SQL Injection
Answer:-(4)SQL Injection | | |