T9 šŸ

Practical 5

Aim: Web Application Testing using DVWA (Damn Vulnerable Web Application)

Introduction to DVWA

  • PHP/MySQL web app
  • Intentionally vulnerable
  • Used for legal penetration testing practice

GitHub: https://github.com/digininja/DVWA


Setup Steps

Step 1: Install Kali Linux in VirtualBox

Follow: golinuxcloud.com/install-kali-virtualbox

Step 2: Install DVWA

git clone https://github.com/digininja/DVWA.git
cd DVWA
cp config/config.inc.php.dist config/config.inc.php
# Edit DB credentials
sudo nano config/config.inc.php
sudo systemctl start mysql apache2

Access: http://localhost/dvwa


DVWA Modules

ModuleVulnerability
Brute ForceLogin form
Command InjectionOS commands
CSRFToken bypass
File InclusionLFI/RFI
SQL InjectionClassic & Blind
UploadUnrestricted
XSS (Reflected/Stored)Cross-site scripting

Security Level Configuration

DVWA Security → [ Low | Medium | High | Impossible ]

Important Notes

  • Run only in VM
  • Never on production
  • Ensure MySQL & Apache running
  • Edit config.inc.php with correct DB user/password