Damn Vulnerable Web Application(DVWA) — SQL Injection (Blind) Walkthrough

Introduction

Same as the basic SQL Injection challenge, it has a single text field for user query.

Input random ID in the form, it returns the existence of record instead of the record itself.

Security Level: Low

--

--

--

Cyber Security Enthusiast | OSCP | OSWE

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Microservices — Handle Failures using Circuit Breaker [Netflix Hystrix]

Change Metric Resolution Interval on Minikube

Deploying on Kubernetes #6: Application Secrets

Music, code, and learning

What is an object?

ConcurrentModificationException Solution| Java colection

How to create rollup summaries in a declarative way in Salesforce

ADD.XYZ’s Weekly Update 25–Staking Live, APP Launch Nearing

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
David Tse

David Tse

Cyber Security Enthusiast | OSCP | OSWE

More from Medium

How to Exploit Public Firebase Realtime Database using REST API

XSS — Cross-Site Scripting

nginx merge slashes path traversal

Security Testing using OWASP ZAP for Digital Applications — Part I