Back to Browse

Blind SQL Injection 0x2 - DVWA (Medium)

3.0K views
Feb 21, 2021
14:49

No crazy intro this time, and we do not use sqlmap in this video. Today we discuss blind SQL injection exploit development against DVWA by building on the exploit we created in the first part of this series. We are faced with a mysqli_real_escape_string mitigation, and bypass it while addressing some other changes to the application logic. This is part of a series, and it will get progressively more crazy! First video in this series: https://www.youtube.com/watch?v=d3fUh0QeoZI Timeline: 0:00 - Background Context 0:40 - Docker Setup 1:05 - Quick Review 1:55 - Vuln Discussion 4:33 - mysqli_real_escape_string 6:02 - Getting A Working Injection 6:45 - Fixing The Exploit 8:14 - Refactoring Boolean Logic 11:55 - Updating Parameters 13:03 - Testing For Errors 13:41 - Final Exploit 13:55 - Outro My Links: Twitter - https://twitter.com/cwinfosec​ Github - https://github.com/cwinfosec​ Blog - https://cwinfosec.github.io References: https://www.php.net/manual/en/mysqli.real-escape-string.php https://hub.docker.com/r/vulnerables/web-dvwa

Download

0 formats

No download links available.

Blind SQL Injection 0x2 - DVWA (Medium) | NatokHD