5th semester project for Introduction to Computer Security course.
- Create a MySQL database using "sqlinjection.sql" file.
- Refer the steps to perform SQL injection in the PDF report.
- Experiment with 3 types of login methods. Edit the </form action=" "> tag in login.php and choose either loginweak.php, loginhash.php or loginPrepStmt.inc.php.
- Using VEGA scanner and Sqlmap in Kali Linux
- Manually inject malicious SQL queries into the website input field.
- Prepared statement using PDO or MySQLi
- Password hashing
- Generates a secure, signed token
- MMK. (2019, Feb). How to change Port 80 and Port 443 in XAMPP Server, Retrieved from https://www.youtube.com/watch?v=rbycmTTAiqI&feature=youtu.be
- https://wisemonkeys.in/information-technology/setup-dvwa-using-xampp-windows/
- http://www.computersecuritystudent.com/SECURITY_TOOLS/DVWA/DVWAv107/lesson6/
- https://www.owasp.org/index.php/Blind_SQL_Injection
- Wikipedia contribution. (2019, Dec 19). SQL Injection. In Wikipedia, Retrieved from https://en.wikipedia.org/wiki/SQL_injection
- https://stackoverflow.com/questions/4712037/what-is-parameterized-query
- Paul Rubens. (2018, May 2018). What Is SQL Injection
- David. (2013, Aug 13). Vega Scanner, Retrieved from https://github.com/subgraph/Vega/wiki/Vega-Scanner