Performing SQL injection attacks
Nearly all model web applications use an underlying database for storage of everything from application configuration, localization, user authentication credentials, sales records, patient records, and more. The information is read from and written to by the web applications that face the internet.
Unfortunately, web applications often are written in a way that allows remote users to insert their own commands into input forms, giving them the ability to change how the application behaves, and potentially giving access directly to the database itself.
Getting ready
To successfully complete this section, you will need the following:
- Installation and configuration of OWASP-BWA as highlighted in the recipe Installing OWASP-BWA in Chapter 1, Installing Kali and the Lab Setup
- Network connectivity between your Kali Linux desktop and the OWASP-BWA instance
- Scan results from OWASP-ZAP in the recipe, Scanning for Vulnerabilities of Chapter 9, Web and Database Specific Recipes...