A SQL injection attack involves an attacker providing input to the database, which is received and used without any validation or sanitization. The result is divulging sensitive data, modifying data, or even bypassing authentication mechanisms.
Testing for SQL injection
Getting ready
Using the OWASP Mutillidae II Login page, let's determine whether the application is vulnerable to SQL injection (SQLi) attacks.
How to do it...
- From the OWASP Mutilliae II menu, select Login by navigating to OWASP 2013 | A1-Injection (SQL) | SQLi – Bypass Authentication | Login...