wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SQL Injection practice on DVWA

profile
Taha Chatriwala
Nov 04, 2017
0 Likes
0 Discussions
1990 Reads

Please read this article first : How to setup DVWA using XAMPP on a windows 

 
Once you are done with the setup, follow the below steps to try SQL Injection on your DVWA !!! DVWA ( damn vulnerable web application) is one the readymade web application environment used for testing several attacks. It is purely used for educational purposes. We will be showing here how we can perform SQL injection using dvwa.
SQL injection is one of the very old method of system penetrations. It means firing an SQL query in the database and making a database burp out information you desire. Structured query language being well structured has its own flaws which can be exploited. Using certain keywords as mentioned below breaks the query into a set of instructions which can even bypass the password fields. For an instance writing 1'=1-- in the username field after typing username will bypass the password. This means whether password matches or not still give an access. These flaws are obviously no more there as with increasing security there are patches inbuilt in programming now. Still as a developer you can keep in mind while creating date input fields that your need to mention enough conditional checks so that before data is sent over the server it has already been filtered. Go ahead and enjoy the stunts. Not to forget that these are only for educational purpose. Do not ever try it on actual server with any bad intention. As it might lead you behind the bars. Happy learning..!!  

Step 1: Visit the DVWA login page

URL :- " localhost/dvwa/login.php "and login using the username : "admin" and password : "password"   How To Setup DVWA Using XAMPP on Windows  

Step 2 : You will get to this Homepage

  Blind Sql Injection Using DVWA  

Step 3 : Go to security setting option in left and set security level low.

  Blind Sql Injection Using DVWA  

Step 4 : Click on SQL injection option in left.

  Blind Sql Injection Using DVWA  

Step 5 : Write "1" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 6 : Write "a' or ''='" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 7 : Write "1=1" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 8 : Write "1*" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Comments ()


Sign in

Read Next

To travel is to live

Blog banner

Dangers of Using Public WiFis

Blog banner

VIRTUAL MACHINES

Blog banner

Importance Of Time

Blog banner

Virtual memory

Blog banner

Deadlocks

Blog banner

25 Movies to Watch Post Breakup Blues

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Memory input output management

Blog banner

Service transition principles

Blog banner

Evolution of Operating Systems

Blog banner

Os Virtual Memory

Blog banner

Memory Management

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

OS Assignment-3

Blog banner

Real time scheduling

Blog banner

How to Prepare Your Child for Their First Day of School?

Blog banner

What type of stock broker do I need?

Blog banner

Zero-Day Attack

Blog banner

Evolution of operating system

Blog banner

Importance Of Blockchain

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Operating Systems Overview

Blog banner

MENDELEY

Blog banner

Simple Ways to Grow Your Brand Online

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

'Positivity in life'

Blog banner

operating system

Blog banner

Virtual machine

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Threading

Blog banner

Disk Management

Blog banner

Routers

Blog banner

Synchronization

Blog banner

An Overivew Of Cache Memory

Blog banner

OS assignment 3

Blog banner

Modern Operating System - Suren Kotian

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Assignment 2

Blog banner