wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SQL Injection practice on DVWA

profile
Taha Chatriwala
Nov 04, 2017
0 Likes
0 Discussions
1990 Reads

Please read this article first : How to setup DVWA using XAMPP on a windows 

 
Once you are done with the setup, follow the below steps to try SQL Injection on your DVWA !!! DVWA ( damn vulnerable web application) is one the readymade web application environment used for testing several attacks. It is purely used for educational purposes. We will be showing here how we can perform SQL injection using dvwa.
SQL injection is one of the very old method of system penetrations. It means firing an SQL query in the database and making a database burp out information you desire. Structured query language being well structured has its own flaws which can be exploited. Using certain keywords as mentioned below breaks the query into a set of instructions which can even bypass the password fields. For an instance writing 1'=1-- in the username field after typing username will bypass the password. This means whether password matches or not still give an access. These flaws are obviously no more there as with increasing security there are patches inbuilt in programming now. Still as a developer you can keep in mind while creating date input fields that your need to mention enough conditional checks so that before data is sent over the server it has already been filtered. Go ahead and enjoy the stunts. Not to forget that these are only for educational purpose. Do not ever try it on actual server with any bad intention. As it might lead you behind the bars. Happy learning..!!  

Step 1: Visit the DVWA login page

URL :- " localhost/dvwa/login.php "and login using the username : "admin" and password : "password"   How To Setup DVWA Using XAMPP on Windows  

Step 2 : You will get to this Homepage

  Blind Sql Injection Using DVWA  

Step 3 : Go to security setting option in left and set security level low.

  Blind Sql Injection Using DVWA  

Step 4 : Click on SQL injection option in left.

  Blind Sql Injection Using DVWA  

Step 5 : Write "1" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 6 : Write "a' or ''='" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 7 : Write "1=1" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 8 : Write "1*" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Comments ()


Sign in

Read Next

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Ethical Hacking

Blog banner

Depression

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Multicore and Multithreading

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

Mariana Trench: The deepest depths

Blog banner

Data Lake

Blog banner

Compromising Mobile Platforms

Blog banner

OS- Assignnment 1

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

An Overview of Virtual Machines

Blog banner

What is Virtual Memory

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

RAID - LEVELS OF RAID

Blog banner

Busted : Common Web Security Myths

Blog banner

Street foods

Blog banner

Importance Of Education.

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Memory Management

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

Child labour

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

History of Money

Blog banner

Way to make your meal healthier.

Blog banner

Zero-Day Attack

Blog banner

Information of meesho company

Blog banner

Subnet Masking

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Explain Multiprocessors

Blog banner

Technical SEO : Total Guide

Blog banner

The IT Service Lifecycle

Blog banner

MODERN OPERATING SYSTEM

Blog banner

LISP - Library Management System

Blog banner

Self defence

Blog banner

Memory hierarchy

Blog banner

RAID

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Cache memory

Blog banner