Skip to content

This project features some of my practical web application security testing on Damn Vulnerable Web Application (DVWA), a PHP/MySQL application specifically designed for learning and practicing web security

Notifications You must be signed in to change notification settings

imsatyasaiteja/DVWA_Exploitation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 

Repository files navigation

DVWA_Exploitation

This project features some of my practical web application security testing on Damn Vulnerable Web Application (DVWA)

DVWA is a PHP/MySQL web application specifically designed for learning and practicing web security

DVWA Setup Preview

dvwa(1) dvwa(2)

Requirements

  • Kali Linux (or any Linux-based OS, preferably installed on a virtual machine)
  • Apache Web Server
  • PHP version 7.x or above (with php-mysql, php-gd, php-xml, php-mbstring modules enabled)
  • MySQL/ MariaDB Database Server to store DVWA data
  • Optional Tools: Burp Suite, sqlmap, Nmap, OWASP ZAP

Installation Steps

  1. Install Apache, PHP, Mariadb:
  • sudo apt update && sudo apt upgrade -y
  • sudo apt install apache2 mariadb-server php php-mysql php-gd php-xml php-mbstring -y
  1. Clone the DVWA repository:
  • cd /var/www/html
  • sudo git clone https://github.com/digininja/DVWA.git
  • sudo chmod -R 755 DVWA
  1. Configure the Database setting:
  • sudo systemctl start mariadb
  • sudo systemctl enable mariadb
  • sudo mysql -u root -p
  • Create the dvwa database and user:
    • CREATE DATABASE dvwa;
    • CREATE USER 'dvwauser'@'localhost' IDENTIFIED BY 'password';
    • GRANT ALL PRIVILEGES ON dvwa.* TO 'dvwauser'@'localhost';
    • FLUSH PRIVILEGES;
    • EXIT;
  1. Configure DVWA:
  • cd /var/www/html/DVWA/config
  • sudo cp config.inc.php.dist config.inc.php
  • sudo nano config.inc.php
  • Update the following values:
    • $_DVWA['db_user'] = 'dvwauser';
    • $_DVWA['db_password'] = 'password';
    • $_DVWA['db_database'] = 'dvwa';
  • Save and exit the config file:
    • Ctrl + O, Enter
    • Ctrl + X
  1. Start Apache Server:
  • sudo systemctl start apache2
  • sudo systemctl enable apache2
  1. Access DVWA in the browser:
  • http://localhost/DVWA
  • Log in with the default credentials:
    • Username: admin
    • Password: password

Tested Vulnerabilities Preview

  • SQL Injection
sql_inj(1)
  • Command Injection
com_inj(1)
  • JavaScript Attack
js_atk(1)
  • File Upload Vulnerability
file_upload_vul(1)
  • Weak Session ID
weak_session_id(1) weak_session_id(2)

Author

About

This project features some of my practical web application security testing on Damn Vulnerable Web Application (DVWA), a PHP/MySQL application specifically designed for learning and practicing web security

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published