wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SQL Injection practice on DVWA

profile
Taha Chatriwala
Nov 04, 2017
0 Likes
0 Discussions
1990 Reads

Please read this article first : How to setup DVWA using XAMPP on a windows 

 
Once you are done with the setup, follow the below steps to try SQL Injection on your DVWA !!! DVWA ( damn vulnerable web application) is one the readymade web application environment used for testing several attacks. It is purely used for educational purposes. We will be showing here how we can perform SQL injection using dvwa.
SQL injection is one of the very old method of system penetrations. It means firing an SQL query in the database and making a database burp out information you desire. Structured query language being well structured has its own flaws which can be exploited. Using certain keywords as mentioned below breaks the query into a set of instructions which can even bypass the password fields. For an instance writing 1'=1-- in the username field after typing username will bypass the password. This means whether password matches or not still give an access. These flaws are obviously no more there as with increasing security there are patches inbuilt in programming now. Still as a developer you can keep in mind while creating date input fields that your need to mention enough conditional checks so that before data is sent over the server it has already been filtered. Go ahead and enjoy the stunts. Not to forget that these are only for educational purpose. Do not ever try it on actual server with any bad intention. As it might lead you behind the bars. Happy learning..!!  

Step 1: Visit the DVWA login page

URL :- " localhost/dvwa/login.php "and login using the username : "admin" and password : "password"   How To Setup DVWA Using XAMPP on Windows  

Step 2 : You will get to this Homepage

  Blind Sql Injection Using DVWA  

Step 3 : Go to security setting option in left and set security level low.

  Blind Sql Injection Using DVWA  

Step 4 : Click on SQL injection option in left.

  Blind Sql Injection Using DVWA  

Step 5 : Write "1" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 6 : Write "a' or ''='" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 7 : Write "1=1" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 8 : Write "1*" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Comments ()


Sign in

Read Next

Dudhasagar waterfall ?

Blog banner

GraphX:- A graph processing tool

Blog banner

Amazon

Blog banner

Understanding - Proof of Work!

Blog banner

OPERATING SYSTEM

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

The Features of Blockchain

Blog banner

Crypto tax evasion

Blog banner

Policies for Service Transition

Blog banner

Python as a tool for data analysis

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

PERT Overview

Blog banner

Article on Fresh Book

Blog banner

Deadlock

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

What is Virtual Memory

Blog banner

Ethical Hacking

Blog banner

child Labour

Blog banner

GIS Mapping

Blog banner

Mail merge

Blog banner

Mumbai Metro 3

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Random Forests

Blog banner

Best password managers: Reviews of the top products

Blog banner

Operating System

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

THE DESIRE OF MANY

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

Operating system

Blog banner

"Games and the future"

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Use case of K-means clustering

Blog banner

Principles of Concurrency

Blog banner

Access management

Blog banner

Memory Management in Operating System

Blog banner

What is Segmentation?

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner