0% found this document useful (0 votes)
11 views1 page

Assignment 3 Statement

The assignment focuses on identifying and exploiting SQL injection vulnerabilities in a deliberately flawed web application. Students must demonstrate the potential impact of these attacks and explain defense mechanisms to prevent them. The submission requires screenshots of exploitation steps and a written description of findings and defensive techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views1 page

Assignment 3 Statement

The assignment focuses on identifying and exploiting SQL injection vulnerabilities in a deliberately flawed web application. Students must demonstrate the potential impact of these attacks and explain defense mechanisms to prevent them. The submission requires screenshots of exploitation steps and a written description of findings and defensive techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Assignment 3: SQL Injection Vulnerability and Defense

In this lab, a web application has been deliberately designed with vulnerabilities to SQL injection attacks,
highlighting common mistakes made by developers. Your objective is to identify these vulnerabilities,
exploit them to demonstrate the potential damage, and develop techniques to defend against such
attacks.

YOU MAY DO THIS ASSIGNMENT IN PAIRS.

Task Requirements:
1. Identify and exploit SQL injection vulnerabilities in the application.

2. Demonstrate the potential impact of successful SQL injection attacks.

3. Explain the defense mechanisms and techniques to prevent these vulnerabilities.

Please follow the link for detailed instructions on the tasks:


https://seedsecuritylabs.org/Labs_20.04/Web/Web_SQL_Injection/

Submission:
- Include screenshots showing each exploitation step with detailed explanations.

- Provide a written description of the findings and the defensive techniques.

- Screenshots and explanations will be evaluated for credit.

You might also like