wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SQL Injection practice on DVWA

profile
Taha Chatriwala
Nov 04, 2017
0 Likes
0 Discussions
1990 Reads

Please read this article first : How to setup DVWA using XAMPP on a windows 

 
Once you are done with the setup, follow the below steps to try SQL Injection on your DVWA !!! DVWA ( damn vulnerable web application) is one the readymade web application environment used for testing several attacks. It is purely used for educational purposes. We will be showing here how we can perform SQL injection using dvwa.
SQL injection is one of the very old method of system penetrations. It means firing an SQL query in the database and making a database burp out information you desire. Structured query language being well structured has its own flaws which can be exploited. Using certain keywords as mentioned below breaks the query into a set of instructions which can even bypass the password fields. For an instance writing 1'=1-- in the username field after typing username will bypass the password. This means whether password matches or not still give an access. These flaws are obviously no more there as with increasing security there are patches inbuilt in programming now. Still as a developer you can keep in mind while creating date input fields that your need to mention enough conditional checks so that before data is sent over the server it has already been filtered. Go ahead and enjoy the stunts. Not to forget that these are only for educational purpose. Do not ever try it on actual server with any bad intention. As it might lead you behind the bars. Happy learning..!!  

Step 1: Visit the DVWA login page

URL :- " localhost/dvwa/login.php "and login using the username : "admin" and password : "password"   How To Setup DVWA Using XAMPP on Windows  

Step 2 : You will get to this Homepage

  Blind Sql Injection Using DVWA  

Step 3 : Go to security setting option in left and set security level low.

  Blind Sql Injection Using DVWA  

Step 4 : Click on SQL injection option in left.

  Blind Sql Injection Using DVWA  

Step 5 : Write "1" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 6 : Write "a' or ''='" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 7 : Write "1=1" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 8 : Write "1*" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Comments ()


Sign in

Read Next

What are Tenders its various types

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Metasploit

Blog banner

Game Theory in Blockchain

Blog banner

De-Coding Love

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

Direct memory access (DMA)

Blog banner

Memory Management

Blog banner

Importance of business process documentation

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

Europe Through My Lens

Blog banner

Indian Food

Blog banner

Data Mining

Blog banner

The IT Service Lifecycle

Blog banner

Blockchain in IoT Applications

Blog banner

E-security systems | CCTV

Blog banner

RACI model in IT services

Blog banner

Virtual Memory

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

Threads and concurrency

Blog banner

DIGITAL ECONOMY

Blog banner

Article on different management system

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

How Men and Women Process Pain Differently

Blog banner

Know your Processors!

Blog banner

In the world of Technology...

Blog banner

Concept and definition of m-commerce

Blog banner

Components of GIS

Blog banner

Deadlock and Starvation

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

What is Network Security?

Blog banner

Teamwork

Blog banner

EdTech (Education Technology)

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

Evolution of Operating Sytems

Blog banner

IT RISK

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

Define Instagram.

Blog banner

Caching windows

Blog banner

Real-time Scheduling - 53003230061

Blog banner