I've shown you the basic structure of a SQL injection attack, as well as how to take advantage of dynamic SQL to do bad things. Now, however, I want to move to the area where SQL injection really takes on a life of its own: websites. For my example, I'm going to use a very…