Damn Vulnerable Web Application(DVWA) — SQL Injection Walkthrough

Introduction

There is a page with a single text field.

Enter user ID ‘1’ and submit.

A record is returned.

Security Level: Low

Exploitation

Instead of entering valid input like 1, try input a single quote character and observe its behaviour.

The error message revealed the database is MariaDB. And it also implied that single quote might lead to SQL…

--

--

--

Cyber Security Enthusiast | OSCP | OSWE

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Important — Linked Helper Data Storage

From iOS developer to product manager (part 1)

String Python C++

What’s inside the box? Some words about NetBox

iOS NotificationCenter in a better way

Rubyconf 2019 — Main takeaways from the keynote — Ruby 3.0 and the road ahead

5 Best Platforms to Build Web Applications

5 Best Platforms to Build Web Applications

How to Catch a Cat with TLA+

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
David Tse

David Tse

Cyber Security Enthusiast | OSCP | OSWE

More from Medium

Log4j Vulnerability Guidance

Using Java Deserialization to exploit log4shell — LogForge, HTB

CSRF (Cross-Site Request Forgery) Explained

Log4j RCE CVE-2021–44228