Bypassing logins using SQL injection

In this exercise, we will be using the OWASP BWA virtual machine to demonstrate bypassing authentication using SQL injection. To start, power on the OWASP BWA virtual machine. After a few minutes, the virtual machine will provide you with its IP address.

Head on over to your Kali Linux (attacker) machine and follow these steps:

  1. Enter the IP address of the OWASP BWA virtual machine in the web browser of Kali Linux.
  2. Click on the OWASP Mutillidae II application, as follows:
  1. Navigate to the following page: OWASP 2013 | A2 - Broken Authentication and Session Management | Authentication Bypass | Via SQL Injection ...

Get Learn Kali Linux 2019 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.