Exploiting SQL injection with no space
With Exploitation scenario:
SQL Injection: A SQLI attack consists of an injection in SQL query via user supplied input to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute operations on the database.
SQLi occurs when an application uses invalidated user input to dynamically construct SQL query.
Example: We want to retrieving data from a library application that publishes articles.