๐ Project Title
SQL-INJECTION-AUTHENTICATION-BYPASS
๐ Overview This project demonstrates a manual SQL Injection vulnerability in a login authentication mechanism, resulting in authentication bypass.
The testing was conducted in an authorized lab environment using manual request manipulation.
Mapped to: OWASP Top 10 โ A03: Injection
๐ Tools Used
Burp Suite (Proxy โ Manual Interception)
Browser Developer Tools
๐ Vulnerability Details
Type: SQL Injection (Boolean-Based)
Location: Login Authentication Form
Impact: Unauthorized Access
Severity: High https://github.com/Sanjjanaaa/OWASP-A03-SQL-Injection-Auth-Bypass-/tree/main/Report
๐งช Methodology https://github.com/Sanjjanaaa/OWASP-A03-SQL-Injection-Auth-Bypass-/tree/main/Methodology
Intercepted login POST request using Burp Proxy.
Identified authentication parameters (username & password).
Injected boolean-based SQL payload.
Observed authentication bypass.
Confirmed backend query manipulation.
๐ฅ Impact
Authentication Bypass
Potential privilege escalation
Database exposure risk
Unauthorized session creation
๐ก Remediation https://github.com/Sanjjanaaa/OWASP-A03-SQL-Injection-Auth-Bypass-/tree/main/Remediation
Use parameterized queries
Implement prepared statements
Apply server-side input validation
Avoid detailed SQL error messages
Deploy WAF
๐ธ Proof of Concept
Screenshots available in https://github.com/Sanjjanaaa/OWASP-A03-SQL-Injection-Auth-Bypass-/tree/main/Screenshots directory.
โ๏ธ Ethical Disclaimer
This project was conducted in an authorized testing environment for educational and defensive security purposes only.