SQL Injection 101 Uncovering and Exploiting SQLi Vulnerabilities