You are required to investigate SQL tool and explain the syntax of the commands you use.
You can prepare the DOCUMENT on the selected tool containing following headings
1. Introduction of the tool
2. Features of the tool
3. Techniques used by the tool to exploit vulnerabilities of information systems
4. Experimental setup and evidence of usage of the tool.
5. Conclusions
6. References