VAPT Tutorials  -  Web Application VAPT

1. SQL Injection Authentication Bypass Login Page

Reference Number

Vulnerability Rating


Tools Used


NA manual

Vulnerability Description

It is observed to application is vulnerable to authentication bypass through sql injection technique.SQL Injection authentication bypass vulnerability exist when an application using dynamic sql statement to communicate with application server to database server and validation is not implemented in application login page.Malicious SQL statement treated as SQL statement when application using dynamic query and pass into back-end through vulnerable application fields and result in login authentication bypass. 

Vulnerability Assessment Steps:


Exploit /Penetration Testing:

Hi this is testhjfjhjf

Exploit /Penetration Testing Step:

Login page bypass through sql injection as shown below screenshot.

Vulnerability Identified By / How It Was Discovered

Black Box

Vulnerable URLs / IP Address


Following are the impact of  SQL injection flaw:

Authentication bypasses and performs privilege escalation attacks.

By altering the SQL query, the attacker can retrieve extra data from the database that the user is not authorized to access.

Advance SQL commands can be used to enumerate the schema of the database and then alter the structure too.

Databases such as Microsoft SQL allow OS commands to run through SQL statements using xp_cmdshell. An application vulnerable to SQL injection could allow the attacker to gain complete control over the database server and also attack other devices on the network through it.

Using batched queries, multiple SQL operations can be executed in a single request.

Run a DoS attack by deleting critical data from the database.


SQL Injection vulnerability are very common and number of techniques to prevent sql injection vulnerability. The prevention technique are following as given below.

Secure Coding

Prevention of SQL injection through secure coding. The most important prevention are following given below;

Use of prepared statements with Parameterized Queries

Use of stored procedures

Whitelist Input Validation