Giter VIP home page Giter VIP logo

docker-vulnerable-dvwa's Introduction

Damn Vulnerable Web Application Docker container

Docker Pulls License

Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goal is to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and to aid both students & teachers to learn about web application security in a controlled class room environment.

The aim of DVWA is to practice some of the most common web vulnerability, with various difficultly levels, with a simple straightforward interface. Please note, there are both documented and undocumented vulnerability with this software. This is intentional. You are encouraged to try and discover as many issues as possible.

WARNING This image is vulnerable to several kinds of attacks, please don't deploy it to any public servers.

Run this image

To run this image you need docker installed. Just run the command:

docker run --rm -it -p 80:80 vulnerables/web-dvwa

And wait until it download the image and start it, after that you can see the image running in your local machine:

setup

Just click on the Create / Reset database button and it will generate any aditional configuration needed.

Login with default credentials

To login you can use the following credentials:

  • Username: admin
  • Password: password

Set the dificulty level

The default dificulty level is the impossible level, you can change it in DVWA Security item in the left menu.

dificulty

Hack and have fun !

If you are playing it in low dificulty, just to have a taste of how exploit a flaw in this app, go to SQL Injection in the left menu. In the id field, add this query:

%' and 1=0 union select null, concat(user,':',password) from users #

sqli

There are several other ways and other vulnerabilities do exploit, go ahead, have fun !

About DVWA

You can visit DVWA official website and official github repository if you want more information.

Disclaimer

This or previous program is for Educational purpose ONLY. Do not use it without permission. The usual disclaimer applies, especially the fact that me (opsxcq) is not liable for any damages caused by direct or indirect use of the information or functionality provided by these programs. The author or any Internet provider bears NO responsibility for content or misuse of these programs or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss, system crash, system compromise, etc.) caused by the use of these programs is not opsxcq's responsibility.

docker-vulnerable-dvwa's People

Contributors

opsxcq avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar

docker-vulnerable-dvwa's Issues

Is it still active

Is this still active and/or maintained. I am seeing a lot of timelapse in terms of commits from the official repo for dvwa.

Docker Version in Docker file is outdated

https://github.com/opsxcq/docker-vulnerable-dvwa/blob/master/Dockerfile

The FROM debian:9.2
is causing my Docker Jenkins pipeline to fail with Error :
The error mentions you're using debian:9.2. Consider using a more recent Debian base image, such as debian:stretch, which is a general tag that should provide access to the package repositories.

�[91mW: The repository 'http://security.debian.org stretch/updates Release' does not have a Release file.

Could you please update :
FROM debian:stretch

Split services

  • Create another docker image with only the DVWA code, without the database.
  • Parameterize the database connection information using environment variables
  • Setup an example docker-compose.yml

Changing Security Level

When I run 2 instances of vulnerables/web-dvwa in docker and I change the security level of one of them, the other also change. Can you tell me why is this happening? and how can I fix it?

not db

when click on setup it say cannot connect to db.
can I help fix or I do somethign wrong?

Starting MySQL database server: mysqld

The problem remains in the version of Nov 1.

[+] Starting mysql...
[FAIL] Starting MySQL database server: mysqld . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . failed!
[+] Starting apache
[....] Starting web server: apache2AH00558: apache2: Could not reliably determine the server's fully qualified domain name, using 172.17.0.2. Set the 'ServerName' directive globally to suppress this message
. ok
==> /var/log/apache2/access.log <==
tail: unrecognized file system type 0x794c7630 for '/var/log/apache2/access.log'. please report this to [email protected]. reverting to polling

==> /var/log/apache2/error.log <==
[Mon Nov 06 08:24:21.797744 2017] [mpm_prefork:notice] [pid 782] AH00163: Apache/2.4.10 (Debian) configured -- resuming normal operations
[Mon Nov 06 08:24:21.797789 2017] [core:notice] [pid 782] AH00094: Command line: '/usr/sbin/apache2'
tail: unrecognized file system type 0x794c7630 for '/var/log/apache2/error.log'. please report this to [email protected]. reverting to polling

==> /var/log/apache2/other_vhosts_access.log <==
tail: unrecognized file system type 0x794c7630 for '/var/log/apache2/other_vhosts_access.log'. please report this to [email protected]. reverting to polling

sql injection failed because the input value will be url encode

the input box value is 1' or '1'=1

and the url search is change to: http://localhost:8080/vulnerabilities/sqli/index.php?id=1%27%20or%20%271%27=1&Submit=Submit&user_token=ba3b32ef112b359efab6bc6be2a5b335#

now matter how i change the url, it will also encode the query string

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.