Back to articles
I Built a Web Security Lab and Watched SQL Injection Get Blocked in Real Time
How-ToTools

I Built a Web Security Lab and Watched SQL Injection Get Blocked in Real Time

via Dev.toHawkinsdev

From deploying DVWA to blocking real attacks with SafeLine WAF — here’s everything I learned as a beginner (with screenshots & code) Introduction A few weeks ago I decided it was time to stop just watching YouTube tutorials and actually build something real. I wanted to understand how web attacks work and how to stop them. So I created a complete home lab: I deployed Damn Vulnerable Web Application (DVWA), attacked it from Kali Linux, then put SafeLine WAF in front of it to see how it actually detects and blocks attacks. The result? I went from “SQL injection works” to seeing it blocked instantly— with full logs showing exactly what happened. Here’s the full story of the lab, what I learned, and why this kind of project is perfect for anyone preparing for a SOC analyst role. 1. Setting Up the Vulnerable Target (DVWA) I started by spinning up an Ubuntu VM and installing the LAMP stack (Apache + MariaDB + PHP). Then I cloned DVWA from GitHub. This part was harder than expected. I hit mul

Continue reading on Dev.to

Opens in a new tab

Read Full Article
2 views

Related Articles