{keyword}') Union All Select - Null,null,null,null,null,null,null-- Hofz

: Use parameterized queries so that user input is never executed as code.

The string you provided is a . Specifically, it is designed to exploit a vulnerability in a database-driven application to extract unauthorized data. : Use parameterized queries so that user input

: This part attempts to "break out" of a standard SQL query. It uses a closing quote and parenthesis to terminate whatever the original developer intended the query to do. : This part attempts to "break out" of a standard SQL query

: This is the core of the attack. It tells the database to combine the results of the legitimate query with the results of a new, malicious one. It tells the database to combine the results

: Ensure all data entered by users is cleaned and validated before it hits your database.

: The attacker uses NULL values to figure out how many columns are in the original database table. If the number of NULL s doesn't match the number of columns in the original query, the database will return an error.

Are you seeing this in your , or are you testing the security of your own code ?