Disrupting databases
Nov 17, 2020
3 minutes
HAVING FUN WITH DVWA “We’ve borked the underlying SQL query and tricked the application into coughing up usernames and passwords for the whole team.”
Part of our last hacking feature in involved setting up the virtual machine and attacking it. We’d encourage you to do that too, (you’ll find all the information you need at ). But this time around we’re going to do something different. The () is exactly what you might suspect. It’s a PHP application riddled with security holes (). It requires a LAMP (Linux Apache). If you’ve been following our features lately, you’ll see that we can’t get enough of , so if you’re similarly enamoured with this container management solution, by all means use it to do the first step of the step-by-step guide.
You’re reading a preview, subscribe to read more.
Start your free 30 days