This document provides an overview of SQL injection techniques. It begins with an introduction describing SQL injection as a code injection attack on data-driven web applications. It then covers topics like the intent of SQL injection attacks, real world examples, how the attacks work by inserting malicious SQL statements, and the impacts like data leakage, loss of control, and denial of service. The document also discusses different types of SQL injection attacks, defenses, other injection types, tools used in SQL injection, and concludes by describing how SQL injection exploits applications that concatenate user input into SQL statements.