Finding SQL Injection Vulnerabilities in Web Applications in 4 steps!

Surya Sadanala
System Weakness
Published in
1 min readOct 17, 2023

--

Let’s take an example web application called testphp.vulnweb.com. Many people are familiar with this website, which was intentionally designed to be highly vulnerable by the Acunetix team for educational and testing purposes.

How to Identify Vulnerabilities in a Website

Step 1: Open the URL http://testphp.vulnweb.com/.

Step 2: Navigate through each page on the website to discover any potentially vulnerable pages.

Note: When we mention “random pages,” we’re referring to pages whose content changes when you modify the URL. For instance, if the URL contains “id=1,” and the page displays information about Shahrukh Khan, and when you change the URL to “id=2,” it now shows details about Thalapathy Vijay, this indicates the page is dynamic. Dynamic pages are often 50% susceptible to SQL injection.

Step 3: If you encounter a dynamic page, try appending a single quote at the end of the URL, like this: “id=1'”.

Step 4: If you receive a SQL syntax error, it indicates that the page is 100% vulnerable to SQL injection.

This article is solely for finding vulnerabilities. Get ready for the exploitation article.

Thanks for reading, everyone! We believe you’ve learned something.

--

--

#Ethical Hacker # Penetration Tester #Digital Forensic Expert #Information Security Specialist#Cyber Security Trainer & Mentor