wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SQL Injection practice on DVWA

profile
Taha Chatriwala
Nov 04, 2017
0 Likes
0 Discussions
1990 Reads

Please read this article first : How to setup DVWA using XAMPP on a windows 

 
Once you are done with the setup, follow the below steps to try SQL Injection on your DVWA !!! DVWA ( damn vulnerable web application) is one the readymade web application environment used for testing several attacks. It is purely used for educational purposes. We will be showing here how we can perform SQL injection using dvwa.
SQL injection is one of the very old method of system penetrations. It means firing an SQL query in the database and making a database burp out information you desire. Structured query language being well structured has its own flaws which can be exploited. Using certain keywords as mentioned below breaks the query into a set of instructions which can even bypass the password fields. For an instance writing 1'=1-- in the username field after typing username will bypass the password. This means whether password matches or not still give an access. These flaws are obviously no more there as with increasing security there are patches inbuilt in programming now. Still as a developer you can keep in mind while creating date input fields that your need to mention enough conditional checks so that before data is sent over the server it has already been filtered. Go ahead and enjoy the stunts. Not to forget that these are only for educational purpose. Do not ever try it on actual server with any bad intention. As it might lead you behind the bars. Happy learning..!!  

Step 1: Visit the DVWA login page

URL :- " localhost/dvwa/login.php "and login using the username : "admin" and password : "password"   How To Setup DVWA Using XAMPP on Windows  

Step 2 : You will get to this Homepage

  Blind Sql Injection Using DVWA  

Step 3 : Go to security setting option in left and set security level low.

  Blind Sql Injection Using DVWA  

Step 4 : Click on SQL injection option in left.

  Blind Sql Injection Using DVWA  

Step 5 : Write "1" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 6 : Write "a' or ''='" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 7 : Write "1=1" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 8 : Write "1*" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Comments ()


Sign in

Read Next

Digital black market or dark net poses a national security threat?

Blog banner

Hacking of web server and application

Blog banner

Article on different management system

Blog banner

Python as a tool for Data science task & project

Blog banner

Virtual Machine

Blog banner

STARVATION

Blog banner

Twisted world

Blog banner

How to write a cover letter

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

My favourite food

Blog banner

E-learning in today's world

Blog banner

Deadlock in Operating systems

Blog banner

Deadlock

Blog banner

Virtual machine.

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

MUTUAL EXCLUSION

Blog banner

Race Condition in Operating Theatre

Blog banner

Threads

Blog banner

Man is free by the birth .

Blog banner

RAID

Blog banner

Booting Process In Operating System

Blog banner

OS Assignment 3 Deadlock

Blog banner

Penetration Testing

Blog banner

Data Visualization

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

I/O Buffering

Blog banner

LIMITED EDITION

Blog banner

Theads

Blog banner

Memory Management in Operating System

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

Race condition

Blog banner

Health is Wealth

Blog banner

Importance of self defence for girls

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

What are Virtual Machines

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Social Engineering Attacks

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

Blog name

Blog banner