The process of using basic SQL injections and guesswork to find out information about a database (see Database Fingerprinting ). The hacker performs basics SQL injections to find out the database version and type and then guess work to identify key database tables such as Users and Admin and then subsequent sensitive data such as Usernames, Passwords and Email.