wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SQL Injection practice on DVWA

profile
Taha Chatriwala
Nov 04, 2017
0 Likes
0 Discussions
1990 Reads

Please read this article first : How to setup DVWA using XAMPP on a windows 

 
Once you are done with the setup, follow the below steps to try SQL Injection on your DVWA !!! DVWA ( damn vulnerable web application) is one the readymade web application environment used for testing several attacks. It is purely used for educational purposes. We will be showing here how we can perform SQL injection using dvwa.
SQL injection is one of the very old method of system penetrations. It means firing an SQL query in the database and making a database burp out information you desire. Structured query language being well structured has its own flaws which can be exploited. Using certain keywords as mentioned below breaks the query into a set of instructions which can even bypass the password fields. For an instance writing 1'=1-- in the username field after typing username will bypass the password. This means whether password matches or not still give an access. These flaws are obviously no more there as with increasing security there are patches inbuilt in programming now. Still as a developer you can keep in mind while creating date input fields that your need to mention enough conditional checks so that before data is sent over the server it has already been filtered. Go ahead and enjoy the stunts. Not to forget that these are only for educational purpose. Do not ever try it on actual server with any bad intention. As it might lead you behind the bars. Happy learning..!!  

Step 1: Visit the DVWA login page

URL :- " localhost/dvwa/login.php "and login using the username : "admin" and password : "password"   How To Setup DVWA Using XAMPP on Windows  

Step 2 : You will get to this Homepage

  Blind Sql Injection Using DVWA  

Step 3 : Go to security setting option in left and set security level low.

  Blind Sql Injection Using DVWA  

Step 4 : Click on SQL injection option in left.

  Blind Sql Injection Using DVWA  

Step 5 : Write "1" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 6 : Write "a' or ''='" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 7 : Write "1=1" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 8 : Write "1*" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Comments ()


Sign in

Read Next

Save Environment

Blog banner

Starvation

Blog banner

Meshoo

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Principles of Service Operation

Blog banner

How social media affect

Blog banner

Principles of Concurrency

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Explain Multiprocessors

Blog banner

Question

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

"Mahakali cave"

Blog banner

Multiple processor scheduling

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Dos (Denial of service) Attack

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Sagar Parikrama

Blog banner

OS ASSIGNMENT

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

Bit Coins

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

LISP - Library Management System

Blog banner

How return on investment is defined in IT services

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

Payment Card Industry - Data Security Standard PCI-DSS compliance for online banking applications

Blog banner

ASANA- A Management System.

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

Computer Security

Blog banner

Child labour

Blog banner

Why is ITSM important in IT organization?

Blog banner

Business Engineering

Blog banner

Deadlock

Blog banner

Data Science & AI

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

File management In Operating System

Blog banner

Memory Management in Operating System

Blog banner

What is HTML?

Blog banner

Metasploit

Blog banner

Mobile Survey

Blog banner