Injection Hacking is one of the most fundamental realms of hacking that exists. The goal being: find a piece of code that allows custom input, while not prohibiting vulnerable interactions. This is a common discovery on many systems that have been designed around the world. Why is this allowed? How do these applications get developed? Often times, systems are developed without recognizing how their code can be attacked. And as code is designed to become more flexible, the art of injection vulnerability becomes even more apparent, even more-so than the code that is designed to become, “how do I get my code to work?”
So, what technologies are vulnerable to injection hacking? Well, even RFID technology, which has been very actively used all over the world. Take a look at the most recent Hak5 on Injection Hacking