How to do it...

We already know that DVWA is vulnerable to SQLi, so let's log in and browse to http://192.168.56.11/dvwa/vulnerabilities/sqli/. Then, follow the following steps:

  1. After detecting that an SQLi exists, the next step is to get to know the internal query, or, more precisely, the number of columns its result has. Enter any number in the User ID box and click Submit.
  2. Now, open the HackBar (hit F9) and click Load URL. The URL in the address bar should now appear in the HackBar.
  3. In the HackBar, we replace the value of the id parameter with 1' order by 1 -- ' and click Execute, as shown in the following screenshot:
  1. We keep increasing ...

Get Kali Linux Web Penetration Testing Cookbook - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.