Submit a document that includes the code for your SQL injection attack (Word or PDF format) which includes a) the rationale for why you set it up the way you did and b) what the expected result(s) will be if the attack was to be carried out.
a) Rationale: The SQL injection attack is structured to exploit vulnerabilities in the target system's input validation mechanisms. By injecting malicious SQL code into input fields, we aim to bypass authentication, access unauthorized data, or manipulate the database.
b) Expected Results: If the attack is successful, the attacker could gain unauthorized access to sensitive data, manipulate or delete records, and potentially compromise the integrity and confidentiality of the database.