M8.6
docx
keyboard_arrow_up
School
Excelsior University *
*We aren’t endorsed by this school
Course
523
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
2
Uploaded by MegaEnergy12810
M8.6: Lab: DVWA SQL Injection
Due
Dec 17 by 10:59pm
Points
100
Submitting
a text entry box or a file upload
Evaluate
Introduction
Vulnerable databases can expose sensitive information to intruders. Ensuring
its safety is of paramount importance.
SQL
Injection is one of the most
common attacks on a web application. In this lab activity, you will use
the
DVWA
application to simulate an attack, and then list the various
preventative measures that are available to avoid
SQL
injection attacks on
web applications.
What is a SQL Injection?
SQL injection (also known as SQL fishing) is a technique often used
to attack data-driven applications.
This is done by including portions of SQL statements in an entry
field in an attempt to get the website to pass a newly formed rogue
SQL command to the database (e.g., dump the database contents
to the attacker). SQL injection is a code injection technique that
exploits a security vulnerability in an application's software.
The vulnerability happens when user input is either incorrectly
filtered for string literal escape characters embedded in SQL
statements or user input is not strongly typed and unexpectedly
executed. SQL injection is mostly known as an attack vector for
websites but can be used to attack any type of SQL database.
What is SQL Injection Harvesting?
SQL Injection Harvesting is where a malicious user supplies SQL
statements to render sensitive data such as usernames, passwords,
database tables, and more.
What is Damn Vulnerable Web App (DVWA)?
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application
that is damn vulnerable.
Its main goals are to be an aid for security professionals to test their
skills and tools in a legal environment, help web developers better
understand the processes of securing web applications and aid
teachers/students to teach/learn web application security in a
classroom environment.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help