Damn Vulnerable Web Application(DVWA) — SQL Injection (Blind) Walkthrough

Introduction

Same as the basic SQL Injection challenge, it has a single text field for user query.

Input random ID in the form, it returns the existence of record instead of the record itself.

Security Level: Low

--

--

--

Cyber Security Enthusiast | OSCP | OSWE

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

LC150. Evaluate Reverse Polish Notation

Boot Loader Development On Virtual Floppy Drive

Conventional commits for your dependency updates now live on violinist.io

Why does the FILTFILT documentation not mention the effects of truncation

N.O.W w/ Mark11 and DKD

452 Applications, 8 Interviews, And Finally One Job Offer

Very Interesting #0

Kubernetes Cluster Autoscaler

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
David Tse

David Tse

Cyber Security Enthusiast | OSCP | OSWE

More from Medium

Server side template injection — SSTI vulnerability ⚠️

Port Knocking

Gallery THM Walkthrough

Vulnerability Management Using Nessus