Skip to content

arjun98k/python-task-intern

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

  1. Setting Up the Environment:

    • You've imported the necessary modules, including webdriver from Selenium.
    • You've set up the Chrome WebDriver using the ChromeDriverManager.
    • You've navigated to the OWASP Juice Shop login page (https://juice-shop.herokuapp.com/#/login).
  2. Handling Pop-ups:

    • You've attempted to close any pop-up dialog that might appear on the page.
    • This is useful to ensure that the login form is visible and accessible.
  3. Performing the SQL Injection Attack:

    • You've defined a loop (while flag) to repeatedly attempt the login.
    • You've set a malicious username (' OR '1'='1) and a valid password (lam).
    • You've entered these credentials into the login form fields.
    • You've clicked the login button.
    • If the resulting URL contains /#/search, it indicates a successful SQL injection attempt.
  4. Outcome:

    • If the URL contains /#/search, your script prints "SQL Injection attempt successful, potentially logged in!"
    • Otherwise, it prints "SQL Injection attempt failed, not logged in."
  5. Explanation:

    • The ' OR '1'='1 part of the username is a classic SQL injection technique. It always evaluates to true, bypassing the login check.
    • The valid password ensures that the form submission is complete.
    • By analyzing the resulting URL, you can determine whether the attack was successful.

Remember that this is a controlled environment for testing purposes. In a real-world scenario, SQL injection attacks are illegal and harmful. Always follow ethical guidelines and obtain proper authorization before testing security vulnerabilities.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages