OWASP Vulnerable Web Application Project https://github.com/hummingbirdscyber
Go to file
Fatih Çelik f1a9267cf3
Update
Photo's location changed
2019-03-21 21:25:50 +03:00
CommandExecution Adding note. 2018-12-15 23:59:49 +03:00
FileInclusion Update 2.php 2018-12-14 21:23:56 +03:00
FileUpload Update fileupload3.php 2018-11-30 16:56:17 +06:00
Resources Add files via upload 2018-12-09 01:09:10 +03:00
SQL Update sql6.php 2018-11-30 06:19:58 +06:00
XSS Update XSS_level4.php 2018-12-09 01:57:34 +03:00
homepage.html Update homepage.html 2018-12-09 00:54:45 +03:00
index.php Update index.php 2018-11-30 16:58:30 +06:00
LICENSE Create LICENSE 2018-12-09 02:01:05 +03:00
README.md Update 2019-03-21 21:25:50 +03:00

Vulnerable Web Application

VulnWeb

What is Vulnerable-Web-Application

Vulnerable-Web-Application is a website that is prepared for people who are interested in web penetration and who want to have information about this subject or to be working. In fact, the website is quite simple to install and use.

Vulnerable-Web-Application categorically includes Command Execution, File Inclusion, File Upload, SQL and XSS. For database-requiring categories, it creates a database under localhost with one button during setup. In case of corrupted or changed databases, you can create a database again.

Installation Guide

If you want to run this tool, first of all you need to download web server solution like "xampp"- you can download xampp from Xampp. After your installation;

For Windows you need to copy the files into the xampp/htdocs folder.

For Mac Os you need to install mampp and copy the files into the mamp/htdocs folder. Mampp

For Linux after download our files first you need to open apache server and copy the files to /var/www/html

Other Configurations:

The php.ini file should be altered. You can find the location of your php.ini file under the folder which php is installed.

  • allow_url_include = on - Allows for Remote File Inclusion
  • allow_url_fopen = on - Allows for Remote File Inclusion
  • safe_mode = off - (If PHP <= v5.4) Allows for SQL Injection
  • magic_quotes_gpc = off - (If PHP <= v5.4) Allows for SQL Injection

Installation

After all these configurations, firstly, open Xampp Control Panel and start Apache,MySQL. Your MySQL credentials have to be default.[username:root <-> password:""] Then open up our index.php file in the Vulnerable Web Application directory. Follow the directions and create database. If you messed up with database, you can reset the database. If database is ready, you can go to homepage and start hacking.

License

The contents of this repository are licensed under the GNU General Public License v3.0.

Version

1.0.0