https://www.fatalerrors.org/a/dvwa-customsguide-sql-injection-blind.html

1️⃣ What is Blind SQL Injection?

2️⃣ How does it work?

3️⃣ Time-Based Blind SQL Injection

4️⃣ Low-Level Security in DVWA


Lab

Access the lab

  1. open owasp → then hit the ip in burp's browser → DVWA → username : admin ,password:admin → then go to sql injection (blind)
    attachments/Pasted image 20250319191915.png

  2. click on sql injection(Blind)
    attachments/Pasted image 20250319191854.png

  3. What Happens?

  1. 1' and 1 = 2 #
    nothing is happening because
  1. substr((select version()),1,1) → Extracts the first character of the version string.
  1. ' union select version(),2# → to know the version of the sql used.
    attachments/Pasted image 20250319191742.png

---****---