Compare commits

...

31 Commits

Author SHA1 Message Date
Fatih Çelik
c0f2689f4a
Merge pull request #2 from santosomar/patch-1
Adding information about Docker Container
2019-07-15 17:43:40 +03:00
Omar Santos
9f73fad599
Adding information about Docker Container
I created a Docker container that users can easily run with `docker run -it --name vuln_app -p 9991:80 santosomar/vuln_app:latest /bin/bash`.

Also, updated the README file with proper markdown tags and a few minor grammar changes.
2019-07-14 01:44:39 -04:00
Fatih Çelik
d03f54d304
Merge pull request #1 from OWASP/add-license-1
Create LICENSE
2019-03-21 21:27:14 +03:00
Fatih Çelik
f1a9267cf3
Update
Photo's location changed
2019-03-21 21:25:50 +03:00
Ramazan Emre Erkan
24b08abf2f
Merge pull request #9 from RamazanEmreErkan/master
Update
2018-12-27 10:19:26 +03:00
Ramazan Emre Erkan
31eef99842
Update README.md 2018-12-27 10:12:51 +03:00
Fatih Çelik
e8ba3d770b
Merge pull request #8 from fatihhcelik/master
Merge pull request #2 from hummingbirdscyber/master
2018-12-26 23:41:05 +00:00
Ramazan Emre Erkan
cfb0b6f7dc
Update README.md 2018-12-20 21:08:09 +03:00
Ramazan Emre Erkan
4f33b5185b
Update README.md 2018-12-20 21:06:36 +03:00
OguzTozkoparan
e9781d45a3
Merge pull request #7 from OguzTozkoparan/master
Merge pull request #1 from hummingbirdscyber/master
2018-12-16 00:00:27 +03:00
OguzTozkoparan
7f55b828d3
Adding note. 2018-12-15 23:59:49 +03:00
Ramazan Emre Erkan
36f63009d4
Update 2.php 2018-12-14 21:23:56 +03:00
Ramazan Emre Erkan
67d60dc3f2
Merge pull request #1 from hummingbirdscyber/master
Update
2018-12-09 02:23:12 +03:00
Fatih Çelik
802b891ba3
Merge pull request #2 from hummingbirdscyber/master
Update
2018-12-09 02:22:08 +03:00
Ömer Faruk Şenyayla
cd1dbca3a6
Merge pull request #6 from ofsenyayla/master
Merge pull request #1 from hummingbirdscyber/master
2018-12-09 02:21:54 +03:00
OguzTozkoparan
03dcff7d97
Merge pull request #1 from hummingbirdscyber/master
Update.
2018-12-09 02:21:22 +03:00
Fatih Çelik
cb478ee375
Merge pull request #5 from fatihhcelik/master
Merge pull request #1 from hummingbirdscyber/master
2018-12-09 02:21:15 +03:00
OguzTozkoparan
82a233a048
Update README.md 2018-12-09 02:20:33 +03:00
Fatih Çelik
4ea318641d
Update README.md 2018-12-09 02:19:32 +03:00
OguzTozkoparan
23ec423cd0
Update README.md 2018-12-09 02:19:20 +03:00
OguzTozkoparan
78c38c4112
Update README.md 2018-12-09 02:18:41 +03:00
OguzTozkoparan
00275616e2
Update README.md 2018-12-09 02:17:58 +03:00
OguzTozkoparan
ff2a043182
Update README.md 2018-12-09 02:17:42 +03:00
OguzTozkoparan
08b0d3143e
Update README.md 2018-12-09 02:16:05 +03:00
Ömer Faruk Şenyayla
4df83e0ae4
Merge pull request #1 from hummingbirdscyber/master
Vuln-Web-App
2018-12-09 02:04:34 +03:00
Fatih Çelik
85ee198c86
Merge pull request #1 from hummingbirdscyber/master
qw
2018-12-09 02:03:21 +03:00
Ufuk Süngü
b6e5ee1f69
Merge pull request #4 from ufuksungu/master
Merge pull request #1 from hummingbirdscyber/master
2018-12-09 02:02:57 +03:00
Ramazan Emre Erkan
0230cb4ec5
Merge pull request #3 from RamazanEmreErkan/master
Merge pull request #1 from hummingbirdscyber/master
2018-12-09 02:01:43 +03:00
Hummingbirds Cyber Team
a4f469a9dc
Create LICENSE 2018-12-09 02:01:05 +03:00
Ufuk Süngü
fdb68b638e
Merge pull request #1 from hummingbirdscyber/master
Update XSS_level4.php
2018-12-09 02:00:23 +03:00
Ramazan Emre Erkan
8a08cbf915
Merge pull request #1 from hummingbirdscyber/master
Update XSS_level4.php
2018-12-09 01:59:58 +03:00
3 changed files with 40 additions and 12 deletions

View File

@ -15,6 +15,7 @@
<button class="button" type="button" name="comex2Button" onclick="location.href='CommandExec-2.php';">Command Execution Level 2</button>
<button class="button" type="button" name="comex3Button" onclick="location.href='CommandExec-3.php';">Command Execution Level 3</button>
<button class="button" type="button" name="comex4Button" onclick="location.href='CommandExec-4.php';">Command Execution Level 4</button>
<p align="center">NOTE: The purpose here is to find flags and roads to be used. Paste the paths to the URL is not a solution.</p>
</div>
</link>
<img src="../Resources/hmb.png" align="left" style="width:40%" alt="HummingbirdsCyberTeam">

View File

@ -3,7 +3,8 @@
<p>
<div align="center"><b><h1> Did you notice anything changed? Browse the site.</h1></b></div>
<!-- "There are 2 hints under the File Inclusion folder. They should be there -> " <!-->
<!-- "Hint1 : FileInclusion\pages\dontOpen\hint1 <!-->
<!-- "Hint1 : FileInclusion\pages\dontOpen\hint1.php <!-->
<!-- "Hint2 : FileInclusion\hint2\hint2.php" <!-->
<!-- "Paste the paths to the URL is not a solution!!" <!-->
</body>
</html>

View File

@ -1,8 +1,17 @@
# Vulnerable Web Application V1.0
# Vulnerable Web Application
![VulnWeb](https://github.com/hummingbirdscyber/Vulnerable-Web-Application/blob/master/Resources/VulnWeb.png)
![VulnWeb](https://github.com/OWASP/Vulnerable-Web-Application/blob/master/Resources/VulnWeb.png)
<h2>Installation Guide</h2>
## What is Vulnerable-Web-Application
Vulnerable-Web-Application is a website that is prepared for people who are interested in web penetration and who want to have
information about this subject or to be working. In fact, the website is quite simple to install and use.
Vulnerable-Web-Application categorically includes Command Execution, File Inclusion, File Upload, SQL and XSS. For database-requiring
categories, it creates a database under localhost with one button during setup. In case of corrupted or changed databases, you can
create a database again.
## Installation Guide
If you want to run this tool, first of all you need to download web server solution like "xampp"- you can download xampp from
[Xampp](https://www.apachefriends.org/tr/download.html). After your installation;
@ -14,15 +23,32 @@ For Mac Os you need to install mampp and copy the files into the mamp/htdocs f
For Linux after download our files first you need to open apache server and copy the files to /var/www/html
<b>Other Configurations:</b>
## Docker Container
You can also run the **Vulnerable Web Application** in Docker with the folowing command:
The php.ini file should be altered. You can find the location of your php.ini file under the folder which php is installed.
* allow_url_include = on - Allows for Remote File Inclusion
* allow_url_fopen = on - Allows for Remote File Inclusion
* safe_mode = off - (If PHP <= v5.4) Allows for SQL Injection
* magic_quotes_gpc = off - (If PHP <= v5.4) Allows for SQL Injection
```
docker run -it --name vuln_app -p 9991:80 santosomar/vuln_app:latest /bin/bash
```
**Note**: You can change the port 9991 to any port you desire depending your implementation.
<b>Installation</b>
### Other Configurations:
After all these configurations, firstly, open Xampp Control Panel and start Apache,MySQL. Your MySQL credentials have to be default.<b>[username:root <-> password:""]</b> Then open up our index.php file in the <b>Vulnerable Web Application</b> directory. Follow the directions and create database. If you messed up with database, you can reset the database. If database is ready, you can go to homepage and start hacking.
The `php.ini` file should be altered. You can find the location of your `php.ini` file under the folder which php is installed.
- `allow_url_include` = on - Allows for Remote File Inclusion
- `allow_url_fopen` = on - Allows for Remote File Inclusion
- `safe_mode` = off - (If PHP <= v5.4) Allows for SQL Injection
- `magic_quotes_gpc` = off - (If PHP <= v5.4) Allows for SQL Injection
## Application Setup
- After editing the previous configuration, open the Xampp Control Panel and start Apache,MySQL.
- Your MySQL credentials must stay the default credentials (e.g., username:root <-> password:"")
- Open up the `index.php` file in the <b>Vulnerable Web Application</b> directory. Follow the directions and create database.
**Note**: You can reset the database at any time, if needed or if you run into any problems. Once the database is ready, you can go to homepage and start hacking.
## License
The contents of this repository are licensed under the GNU General Public License v3.0.
## Version
1.0.0