Get the Whitepaper called Exploiting Web 2.0, Real Life SQL Injection.
You can download it from the following link: https://packetstormsecurity.com/files/download/74615/exploiting-sql.pdf
Source: https://packetstormsecurity.com/files/74615/Whitepaper-On-Exploiting-SQL-Injection.html

