Skip to content

Damn Vulnerable Web Application (DVWA) for testing SQL Injection

Notifications You must be signed in to change notification settings

viruskizz/dvwa-sql-injection

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

DAMN Vulnerable web application for testing

Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goal is to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and to aid both students & teachers to learn about web application security in a controlled class room environment.

The aim of DVWA is to practice some of the most common web vulnerabilities, with various levels of difficulty, with a simple straightforward interface. Please note, there are both documented and undocumented vulnerabilities with this software. This is intentional. You are encouraged to try and discover as many issues as possible.

How to use

  1. create a .env file reference from .env.sample and add values
    DB_NAME=vaccine
    DB_USERNAME=admin
    DB_PASSWORD=password
    
  2. run web server
    make
  3. Access web on port 8000 http://localhost:8000
  4. Access adminer on port 8080 http://localhost:8080

NOTE

+ for 42's Machine, You need run `make fclean` every time
+ before restart to ensure data volume is created by docker user

Site

Base root path to select database type testing

  • /pgsql : Postgresql database testing
  • /mysql : MySQL database Testing
  • /sqlite : SQLite database Testing

Sub path for select method testing

  • /<db_type>/ : method GET testing
  • /<db_type>/login : method POST testing

Demo

DB Driver

Reference