This document provides an overview of SQL injection and a methodology for testing for SQL injection vulnerabilities. It begins with explanations of SQL and how SQL injection works. It then outlines a 7-step methodology for SQL injection testing, including input validation, information gathering, exploiting true/false conditions, extracting data, interacting with the operating system, using command prompts, and expanding influence. Methods described include exploiting different SQL statement types and database types.