Infrastructure Assessment v1.0
PREPARED BY:
Youssef Moataz
Security Researcher
DATE: April 15, 2026
This audit details critical vulnerabilities identified within the DVWA platform. Exploitation of the id parameter confirmed that unsanitized input is passed directly to the database layer, allowing for unauthorized record retrieval.
Risk Status: CRITICAL. The application is vulnerable to full database compromise.
Assessment limited to the SQL Injection module (LOW security). Objectives:
id parameter.| Phase | Activity | Tools |
|---|---|---|
| Probing | Manual heuristic testing with Boolean logic. | DevTools |
| Automation | Database enumeration and exfiltration. | SQLMap |
| Logic Check | Bespoke script validation for timing logs. | Python 3 |
PHPSESSID=9e124456d84d6cd2cecb9df8d2f9c4d0; security=low
| Vulnerability | Severity | Impact |
|---|---|---|
| Blind SQLi (Time-based) | CRITICAL | Information leakage via inference. |
| UNION-Based SQLi | CRITICAL | Bulk exfiltration of database entries. |
| MD5 Hash Exposure | HIGH | Credentials recovered and decrypted. |
Verified dump of the users table:
| User | MD5 Hash | Plaintext |
|---|---|---|
| admin | 5f4dcc3b5... | password |
| gordonb | e99a18c42... | abc123 |
| 1337 | 8d3533d75... | charley |
| pablo | 0d107d09f... | letmein |
| smithy | 5f4dcc3b5... | password |
Immediate migration to Prepared Statements (PDO) is required.
$stmt = $pdo->prepare('SELECT * FROM users WHERE id = :id');
$stmt->execute(['id' => $id]);
AUDITOR:
Youssef Moataz
AUDIT CODE:
SEC-2026-SQLI