Lab 03: OWASP A03 — Injection Attacks
Objective
Background
Architecture
┌─────────────────────┐ Docker Network: lab-a03 ┌─────────────────────┐
│ KALI ATTACKER │ ─────── HTTP attacks ─────────────▶ │ VICTIM SERVER │
│ innozverse-kali │ │ innozverse-cybersec│
│ sqlmap, curl, │ ◀────── responses ─────────────────── │ Flask API :5000 │
│ python3 │ │ (SQLi, CMDi, SSTI) │
└─────────────────────┘ └─────────────────────┘Time
Prerequisites
Tools
Lab Instructions
Step 1: Environment Setup — Launch Victim Server
Step 2: Launch Kali Attacker
Step 3: Recon — nmap + gobuster
Step 4: SQL Injection — Login Bypass
Step 5: SQL Injection — UNION Data Dump (Manual)
Step 6: sqlmap — Automated Full Database Dump
Step 7: Command Injection — OS Shell Access
Step 8: SSTI — Server-Side Template Injection Detection
Step 9: SSTI — Remote Code Execution
Step 10: Cleanup
Remediation
Vulnerability
Broken Code
Fix
Summary
Attack
Tool
Result
Further Reading
Last updated
