

The DVWA web application contains the following vulnerability types: On the left side of the application there’s a menu which we can use to navigate through the application. When we’ve successfully authenticated into the application, the web application will look like the picture below: The next picture shows the DVWA login web page. Those two tables are users table and guestbook table.Īfterwards, we can successfully login with the default username admin and password password that were automatically created by the DVWA web application. Two tables were also created and popularized in that database. We can see that the database dvwa has been successfully created. To do that we need to press on the “Create/Reset Database” button as presented in the picture below: When we first connect to the URI we’ll have to set up the database. The relevant part of the configuration file is presented below: On Backtrack Linux distribution the default username and password for MySQL are root: toor. The last two configuration variables, db_user and db_password specify the username and password for MySQL database. The db_database specifies the name of the database to use the database will be created once we’ve successfully set-up the DVWA web application. We have to change the following settings: db_server specifies the server host, which is localhost. To start both of them we need to issue the commands below:Īfterwards we also need to edit DVWA configuration file /var/so the DVWA will be able to connect to the MySQL database. WebGoat: J2EE web application maintained by OWASP, designed to teach web application security lessons.įirst we need to download the Damn Vulnerable Web Application, extract it, and move it into the Apache document root folder:ĭVWA needs Apache web server and MySQL database server to function correctly, which is why we need to start them.Damn Vulnerable Web Applications (DVWA): PHP/MySQL web applications that contain various vulnerabilities.They are web applications, which require a webserver to run. Those two applications can be categorized as shown in the picture below. These two applications exist for one purpose only: to contain web vulnerabilities which we can exploit. In this article we’ll introduce two applications: the Damn Vulnerable Web Application (DVWA) and WebGoat.
