Finding a Vulnerability are know as Bug Hunting
Basic SQL injection Type
Introduction about ethical Hacking