wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

SQL Injection practice on DVWA

profile
Taha Chatriwala
Nov 04, 2017
0 Likes
0 Discussions
1990 Reads

Please read this article first : How to setup DVWA using XAMPP on a windows 

 
Once you are done with the setup, follow the below steps to try SQL Injection on your DVWA !!! DVWA ( damn vulnerable web application) is one the readymade web application environment used for testing several attacks. It is purely used for educational purposes. We will be showing here how we can perform SQL injection using dvwa.
SQL injection is one of the very old method of system penetrations. It means firing an SQL query in the database and making a database burp out information you desire. Structured query language being well structured has its own flaws which can be exploited. Using certain keywords as mentioned below breaks the query into a set of instructions which can even bypass the password fields. For an instance writing 1'=1-- in the username field after typing username will bypass the password. This means whether password matches or not still give an access. These flaws are obviously no more there as with increasing security there are patches inbuilt in programming now. Still as a developer you can keep in mind while creating date input fields that your need to mention enough conditional checks so that before data is sent over the server it has already been filtered. Go ahead and enjoy the stunts. Not to forget that these are only for educational purpose. Do not ever try it on actual server with any bad intention. As it might lead you behind the bars. Happy learning..!!  

Step 1: Visit the DVWA login page

URL :- " localhost/dvwa/login.php "and login using the username : "admin" and password : "password"   How To Setup DVWA Using XAMPP on Windows  

Step 2 : You will get to this Homepage

  Blind Sql Injection Using DVWA  

Step 3 : Go to security setting option in left and set security level low.

  Blind Sql Injection Using DVWA  

Step 4 : Click on SQL injection option in left.

  Blind Sql Injection Using DVWA  

Step 5 : Write "1" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 6 : Write "a' or ''='" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 7 : Write "1=1" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Step 8 : Write "1*" in text box and click on submit.

  Blind Sql Injection Using DVWA  

Comments ()


Sign in

Read Next

38_Exploring The Honeynet Project

Blog banner

Service Transition Process in ITSM

Blog banner

Operating system evolution

Blog banner

IO Buffers

Blog banner

Types of Hackers.

Blog banner

Malware Defense

Blog banner

Article on Fresh Book

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Data Mining

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Virtual Machine

Blog banner

internet email and it's applications

Blog banner

Women empowerment

Blog banner

Incident management in ITSM

Blog banner

Caching windows

Blog banner

About myself

Blog banner

Busted : Common Web Security Myths

Blog banner

Functions of operating system

Blog banner

Know your Processors!

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Malware

Blog banner

Windows Operating System

Blog banner

Evolution of Operating system.

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

Memory Management

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Theads

Blog banner

Esri India launches Policy Maps.

Blog banner

Operating system

Blog banner

Top 10 Logos and their meanings

Blog banner

Principles of Concurrency

Blog banner

Threads

Blog banner

Virtual Machine

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Note on Process, Process creation and Process termination

Blog banner