[&] Why is it useful to perform SQL injection tests on HTTP headers instead of typical application inputs? - It is always harder to detect injections in headers - Headers are rarely protected - Headers can be overlooked as potential vulnerabilities - Headers do not allow for input sanitization [&] What is the primary type of SQL injection vulnerability discussed in the video? - SQL injection vulnerabilities in HTTP headers - SQL injection vulnerabilities in XML files - SQL injection vulnerabilities in registration forms - SQL injection vulnerabilities in URL parameters [&] What type of SQL injection techniques were identified for exploitation in the video? - Time-based blind, error-based, and union - Error-based, time-based, and XML-based - Error-based, blind, and union-based - Boolean-based, CSS-based, and union query [&] When testing for SQL injection in HTTP headers, which specific header was targeted in the video? - User-Agent - Content-Type - Accept-Encoding - Authorization [&] What is the purpose of using the 'random agent' option in SQL Map? - To bypass network firewalls - To adjust the SQL injection techniques - To use a randomly selected User-Agent - To change the database type