In this exercise, we will be using the OWASP BWA virtual machine to demonstrate bypassing authentication using SQL injection. To start, power on the OWASP BWA virtual machine. After a few minutes, the virtual machine will provide you with its IP address.
Head on over to your Kali Linux (attacker) machine and follow these steps:
- Enter the IP address of the OWASP BWA virtual machine in the web browser of Kali Linux.
- Click on the OWASP Mutillidae II application, as follows:
- Navigate to the following page: OWASP 2013 | A2 - Broken Authentication and Session Management | Authentication Bypass | Via SQL Injection ...