SQL injection vulnerabilities occur when an attacker can interfere with the queries that an application makes to its database. You can use Burp to test for these vulnerabilities:
You can follow this process using a lab with a SQL injection vulnerability. For example, SQL injection vulnerability in WHERE clause allowing retrieval of hidden data.
If you're using Burp Suite Professional, you can use Burp Scanner to test for SQL injection vulnerabilities:
Review the Issues list on the Dashboard to identify any SQL injection issues that Burp Scanner flags.
You can alternatively use Burp Intruder to test for SQL injection vulnerabilities. This process also enables you to closely investigate any issues that Burp Scanner has identified:
In the Payloads side panel, under Payload configuration, add a list of SQL fuzz strings.
Under Payload processing, click Add. Configure payload processing rules to replace any list placeholders with an appropriate value. You need to do this if you're using the built-in wordlist:
{base} placeholder, select Replace placeholder with base value.
To replace other placeholders, select Match/Replace, then specify the placeholder and replacement. For example, replace {domain} with the domain name of the site you're testing.
When the attack is finished, study the responses to look for any noteworthy behavior. For example, look for: