wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SQL Injection practice on DVWA

profile
Taha Chatriwala
Nov 04, 2017
0 Likes
0 Discussions
1990 Reads

Please read this article first : How to setup DVWA using XAMPP on a windows 

 
Once you are done with the setup, follow the below steps to try SQL Injection on your DVWA !!! DVWA ( damn vulnerable web application) is one the readymade web application environment used for testing several attacks. It is purely used for educational purposes. We will be showing here how we can perform SQL injection using dvwa.
SQL injection is one of the very old method of system penetrations. It means firing an SQL query in the database and making a database burp out information you desire. Structured query language being well structured has its own flaws which can be exploited. Using certain keywords as mentioned below breaks the query into a set of instructions which can even bypass the password fields. For an instance writing 1'=1-- in the username field after typing username will bypass the password. This means whether password matches or not still give an access. These flaws are obviously no more there as with increasing security there are patches inbuilt in programming now. Still as a developer you can keep in mind while creating date input fields that your need to mention enough conditional checks so that before data is sent over the server it has already been filtered. Go ahead and enjoy the stunts. Not to forget that these are only for educational purpose. Do not ever try it on actual server with any bad intention. As it might lead you behind the bars. Happy learning..!!  

Step 1: Visit the DVWA login page

URL :- " localhost/dvwa/login.php "and login using the username : "admin" and password : "password"   How To Setup DVWA Using XAMPP on Windows  

Step 2 : You will get to this Homepage

  Blind Sql Injection Using DVWA  

Step 3 : Go to security setting option in left and set security level low.

  Blind Sql Injection Using DVWA  

Step 4 : Click on SQL injection option in left.

  Blind Sql Injection Using DVWA  

Step 5 : Write "1" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 6 : Write "a' or ''='" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 7 : Write "1=1" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 8 : Write "1*" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Comments ()


Sign in

Read Next

Virtual Memory

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

I/O Management and Disk Scheduling

Blog banner

On-Page SEO

Blog banner

Virtual Memory

Blog banner

Predicting Student Performance with Data Science

Blog banner

I/O Management and Disk Scheduling

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

Apache Kafka

Blog banner

Sweet Mango Murabba

Blog banner

Go Daddy

Blog banner

Modern Operating System

Blog banner

Risk factors in service transistion

Blog banner

Concurrency and Deadlocks

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

Importance of education

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Open Source Project By Google

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Message Passing in OS

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

Retiring ISS

Blog banner

Operating system

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

Cyber Security in Data Breaching

Blog banner

Modern Operating System

Blog banner

Financial Fraud Detection

Blog banner

URL vs Domain

Blog banner

GIS in Disaster Management

Blog banner

ADIDAS

Blog banner

Uniprocessor Scheduling

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

Culture Of Ladakh

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Cyber Forensics

Blog banner

Buffers in Operating Systems

Blog banner

AI and cyber Security

Blog banner