Skip to content

Solutions and notes for the Damn Vulnerable Web App pentesting tool, intended to be accurate as of 2Q 2019.

Notifications You must be signed in to change notification settings

keewenaw/dvwa-guide-2019

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 

Repository files navigation

Damn Vulnerable Web App Guide 2019

A compilation of solutions and various notes for the Damn Vulnerable Web App (DVWA) pentesting tool, intended to be accurate as of 2Q 2019.

Please note the following restrictions and caveats. Please read them in full. Continuing to read or interact with this repo in any manner signifies consent to these terms.

  1. I will always assume you have the following already set up:
    1. A fully-updated version of Kali, with Firefox, Burp Suite, and whatever other tools you find interesting configured appropriately. I used Kali 4.19.0 x64 in a VM.
    2. A fully-updated web server with XAMPP installed and configured. I used Ubuntu 18.04 LTS with GNOME, also in a VM.
    3. Connectivity between (i) and (ii). That is, you should be able to visit the IP of your web server in your Kali browser and see and interact with the XAMPP dashboard without issue. I also made a quick addition to my /etc/hosts in Kali, associating the IP of my web server to the hostname "dvwa". That's up to you though.
    4. The Damn Vulnerable Web App (DVWA) installed and configured correctly on your web server. I put mine in /dvwa/, but I believe the default folder is named something different. Hence, I can access my DVWA instance at http://dvwa/dvwa/ .

    I will not be writing a guide on how to do any of the above steps. With all due respect, if you can't get this far, pentesting probably isn't for you just yet. Don't feel bad though! I'm an IT security professional and still regularly run into issues, or have to re-look up how to do the simplest things. It's just the way the world works for people like us. I'll be happy to provide hints if you need them, in private. Otherwise, I'd recommend coming back to this when you're comfortable doing all of the above yourself.

  2. This is not comprehensive by any means. I'm mostly just uploading my notes as I get to each module, and I have no real intention to complete all aspects of the DVWA. It's all for fun, as things like this should be.
  3. I try to put names in "quotes", URLs and URL parameters in bold, and commands and code as code. If you need to input custom data, I put what you need to replace in [brackets].
  4. Please try and attempt each challenge before referencing my notes. It will be more difficult and take longer, but you'll learn much more.
  5. Don't use my text or my particular solutions in any other forms of media, or attempt to pass off anything I write here as your own. I understand that solutions are often done in a similar manner as what I put here, so I understand that the commands and tools you use may be the same as mine. That's fine. Just don't copy my other notes or stuff that is clearly generated by me.
  6. These notes should be for personal use only. Educational, commercial, or governmental use is expressly prohibited without my written consent.
  7. Don't use any of this for illegal purposes. I understand that not all IT security people feel the need to stay white-hat. However, I myself am purely white-hat, and I expect you to be the same. Don't use my notes - or the skills you learn by using my solutions - for anything that could even be concievably mistaken as illegal activity. If you wouldn't do it in front of an FBI agent or your mom, don't do it at all. I will go out of my way to help law enforcement if they reach out to me about something I post here.

Any questions, comments, concerns? Let me know. Have fun!

-Mark
Twitter: @markrudnitsky

About

Solutions and notes for the Damn Vulnerable Web App pentesting tool, intended to be accurate as of 2Q 2019.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published