Compare commits
31 Commits
add-licens
...
master
Author | SHA1 | Date | |
---|---|---|---|
![]() |
c0f2689f4a | ||
![]() |
9f73fad599 | ||
![]() |
d03f54d304 | ||
![]() |
f1a9267cf3 | ||
![]() |
24b08abf2f | ||
![]() |
31eef99842 | ||
![]() |
e8ba3d770b | ||
![]() |
cfb0b6f7dc | ||
![]() |
4f33b5185b | ||
![]() |
e9781d45a3 | ||
![]() |
7f55b828d3 | ||
![]() |
36f63009d4 | ||
![]() |
67d60dc3f2 | ||
![]() |
802b891ba3 | ||
![]() |
cd1dbca3a6 | ||
![]() |
03dcff7d97 | ||
![]() |
cb478ee375 | ||
![]() |
82a233a048 | ||
![]() |
4ea318641d | ||
![]() |
23ec423cd0 | ||
![]() |
78c38c4112 | ||
![]() |
00275616e2 | ||
![]() |
ff2a043182 | ||
![]() |
08b0d3143e | ||
![]() |
4df83e0ae4 | ||
![]() |
85ee198c86 | ||
![]() |
b6e5ee1f69 | ||
![]() |
0230cb4ec5 | ||
![]() |
a4f469a9dc | ||
![]() |
fdb68b638e | ||
![]() |
8a08cbf915 |
|
@ -15,6 +15,7 @@
|
|||
<button class="button" type="button" name="comex2Button" onclick="location.href='CommandExec-2.php';">Command Execution Level 2</button>
|
||||
<button class="button" type="button" name="comex3Button" onclick="location.href='CommandExec-3.php';">Command Execution Level 3</button>
|
||||
<button class="button" type="button" name="comex4Button" onclick="location.href='CommandExec-4.php';">Command Execution Level 4</button>
|
||||
<p align="center">NOTE: The purpose here is to find flags and roads to be used. Paste the paths to the URL is not a solution.</p>
|
||||
</div>
|
||||
</link>
|
||||
<img src="../Resources/hmb.png" align="left" style="width:40%" alt="HummingbirdsCyberTeam">
|
||||
|
|
|
@ -3,7 +3,8 @@
|
|||
<p>
|
||||
<div align="center"><b><h1> Did you notice anything changed? Browse the site.</h1></b></div>
|
||||
<!-- "There are 2 hints under the File Inclusion folder. They should be there -> " <!-->
|
||||
<!-- "Hint1 : FileInclusion\pages\dontOpen\hint1 <!-->
|
||||
<!-- "Hint1 : FileInclusion\pages\dontOpen\hint1.php <!-->
|
||||
<!-- "Hint2 : FileInclusion\hint2\hint2.php" <!-->
|
||||
<!-- "Paste the paths to the URL is not a solution!!" <!-->
|
||||
</body>
|
||||
</html>
|
||||
|
|
48
README.md
48
README.md
|
@ -1,8 +1,17 @@
|
|||
# Vulnerable Web Application V1.0
|
||||
# Vulnerable Web Application
|
||||
|
||||

|
||||

|
||||
|
||||
<h2>Installation Guide</h2>
|
||||
## What is Vulnerable-Web-Application
|
||||
|
||||
Vulnerable-Web-Application is a website that is prepared for people who are interested in web penetration and who want to have
|
||||
information about this subject or to be working. In fact, the website is quite simple to install and use.
|
||||
|
||||
Vulnerable-Web-Application categorically includes Command Execution, File Inclusion, File Upload, SQL and XSS. For database-requiring
|
||||
categories, it creates a database under localhost with one button during setup. In case of corrupted or changed databases, you can
|
||||
create a database again.
|
||||
|
||||
## Installation Guide
|
||||
|
||||
If you want to run this tool, first of all you need to download web server solution like "xampp"- you can download xampp from
|
||||
[Xampp](https://www.apachefriends.org/tr/download.html). After your installation;
|
||||
|
@ -14,15 +23,32 @@ For Mac Os you need to install mampp and copy the files into the mamp/htdocs f
|
|||
|
||||
For Linux after download our files first you need to open apache server and copy the files to /var/www/html
|
||||
|
||||
<b>Other Configurations:</b>
|
||||
## Docker Container
|
||||
You can also run the **Vulnerable Web Application** in Docker with the folowing command:
|
||||
|
||||
The php.ini file should be altered. You can find the location of your php.ini file under the folder which php is installed.
|
||||
* allow_url_include = on - Allows for Remote File Inclusion
|
||||
* allow_url_fopen = on - Allows for Remote File Inclusion
|
||||
* safe_mode = off - (If PHP <= v5.4) Allows for SQL Injection
|
||||
* magic_quotes_gpc = off - (If PHP <= v5.4) Allows for SQL Injection
|
||||
```
|
||||
docker run -it --name vuln_app -p 9991:80 santosomar/vuln_app:latest /bin/bash
|
||||
```
|
||||
**Note**: You can change the port 9991 to any port you desire depending your implementation.
|
||||
|
||||
<b>Installation</b>
|
||||
### Other Configurations:
|
||||
|
||||
After all these configurations, firstly, open Xampp Control Panel and start Apache,MySQL. Your MySQL credentials have to be default.<b>[username:root <-> password:""]</b> Then open up our index.php file in the <b>Vulnerable Web Application</b> directory. Follow the directions and create database. If you messed up with database, you can reset the database. If database is ready, you can go to homepage and start hacking.
|
||||
The `php.ini` file should be altered. You can find the location of your `php.ini` file under the folder which php is installed.
|
||||
- `allow_url_include` = on - Allows for Remote File Inclusion
|
||||
- `allow_url_fopen` = on - Allows for Remote File Inclusion
|
||||
- `safe_mode` = off - (If PHP <= v5.4) Allows for SQL Injection
|
||||
- `magic_quotes_gpc` = off - (If PHP <= v5.4) Allows for SQL Injection
|
||||
|
||||
## Application Setup
|
||||
|
||||
- After editing the previous configuration, open the Xampp Control Panel and start Apache,MySQL.
|
||||
- Your MySQL credentials must stay the default credentials (e.g., username:root <-> password:"")
|
||||
- Open up the `index.php` file in the <b>Vulnerable Web Application</b> directory. Follow the directions and create database.
|
||||
|
||||
**Note**: You can reset the database at any time, if needed or if you run into any problems. Once the database is ready, you can go to homepage and start hacking.
|
||||
|
||||
## License
|
||||
The contents of this repository are licensed under the GNU General Public License v3.0.
|
||||
|
||||
## Version
|
||||
1.0.0
|
||||
|
|
Loading…
Reference in New Issue
Block a user