Activity 01
Hands-On Lab: SQL Injection Sandbox
Students use a purpose-built vulnerable web application (like DVWA or a simplified teacher-built version) to attempt a SQL injection on a login form. After successfully bypassing authentication, they inspect the vulnerable code and rewrite it using parameterized queries. The before-and-after comparison makes input sanitization immediately meaningful rather than abstract.
Why is the human element often the weakest link in a security system?
Facilitation TipUse the SQL Injection Sandbox to let students attempt an attack and immediately see the database respond, making the vulnerability tangible.
What to look forProvide students with three brief scenarios, each describing a different type of cyberattack (e.g., a user clicking a suspicious link, a database error message, a fake login page). Ask students to identify the primary attack vector for each scenario and briefly explain why.