The document provides an overview and instructions for installing and using the Damn Vulnerable Web Application (DVWA). DVWA is a PHP/MySQL web application designed to be vulnerable for testing security skills. It contains vulnerabilities like SQL injection, XSS, file inclusion, and more. The document outlines how to install DVWA using XAMPP, describes the different security levels and vulnerabilities, and provides instructions for accessing the vulnerabilities and practicing attacks. It emphasizes that DVWA should only be used on localhost for legal and safe security testing.
+ Background & Basics of Web App Security, The HTTP Protocol, Web.
+ Application Insecurities, OWASP Top 10 Vulnerabilities (XSS, SQL Injection, CSRF, etc.)
+ Web App Security Tools (Scanners, Fuzzers, etc), Remediation of Web App
+ Vulnerabilities, Web Application Audits and Risk Assessment.
Web Application Security 101 was conducted by:
Vaibhav Gupta, Vishal Ashtana, Sandeep Singh from Null.
Penetration testing reporting and methodologyRashad Aliyev
This paper covering information about Penetration testing methodology, standards reporting formats and comparing reports. Explained problem of Cyber Security experts when they making penetration tests. How they doing current presentations.
We will focus our work in penetration testing methodology reporting form and detailed information how to compare result and related work information.
Threat modeling web application: a case studyAntonio Fontes
TAM is a security activity conducted early in the development lifecycle, when we only have ideas, early design specifications and no source code is produced yet. It helps identify major threats to your web application and their appropriate countermeasures.
This session focuses on an introduction to the threat modeling technique through a case study on an online newspaper platform.
Event: Confoo 2011 Montreal
details of tools and methods used in cyber crime & how to protect your system from crimes...
detail study of password cracking, Denial of service, DDoS, steganography, keylogger, proxy server, phishing etc..
+ Background & Basics of Web App Security, The HTTP Protocol, Web.
+ Application Insecurities, OWASP Top 10 Vulnerabilities (XSS, SQL Injection, CSRF, etc.)
+ Web App Security Tools (Scanners, Fuzzers, etc), Remediation of Web App
+ Vulnerabilities, Web Application Audits and Risk Assessment.
Web Application Security 101 was conducted by:
Vaibhav Gupta, Vishal Ashtana, Sandeep Singh from Null.
Penetration testing reporting and methodologyRashad Aliyev
This paper covering information about Penetration testing methodology, standards reporting formats and comparing reports. Explained problem of Cyber Security experts when they making penetration tests. How they doing current presentations.
We will focus our work in penetration testing methodology reporting form and detailed information how to compare result and related work information.
Threat modeling web application: a case studyAntonio Fontes
TAM is a security activity conducted early in the development lifecycle, when we only have ideas, early design specifications and no source code is produced yet. It helps identify major threats to your web application and their appropriate countermeasures.
This session focuses on an introduction to the threat modeling technique through a case study on an online newspaper platform.
Event: Confoo 2011 Montreal
details of tools and methods used in cyber crime & how to protect your system from crimes...
detail study of password cracking, Denial of service, DDoS, steganography, keylogger, proxy server, phishing etc..
Introduction to Web Application Penetration TestingAnurag Srivastava
Web Application Pentesting
* Process to check and penetrate the security of a web application or a website
* process involves an active analysis of the application for any weaknesses, technical flaws, or vulnerabilities
* Any security issues that are found will be presented to the system owner, together with an assessment of the impact, a proposal for mitigation or a technical solution.
Vulnerabilities in modern web applicationsNiyas Nazar
Microsoft powerpoint presentation for BTech academic seminar.This seminar discuses about penetration testing, penetration testing tools, web application vulnerabilities, impact of vulnerabilities and security recommendations.
Application Security - Your Success Depends on itWSO2
Traditional information security mainly revolves around network and operating system (OS) level protection. Regardless of the level of security guarding those aspects, the system can be penetrated and the entire deployment can be brought down if your application's security isn't taken into serious consideration. Information security should ideally start at the application level, before network and OS level security is ensured. To achieve this, security needs to be integrated into the application at the software development phase.
In this session, Dulanja will discuss the following:
The importance of application security - why network and OS security is insufficient.
Challenges in securing your application.
Making security part of the development lifecycle.
Malware Detection Using Machine Learning TechniquesArshadRaja786
Malware viruses can be easily detected using machine learning Techniques such as K-Mean Algorithms, KNN algorithm, Boosted J48 Decision Tree and other Data Mining Techniques. Among them J48 proved to be more effective in detecting computer virus and upcoming networks worms...
Network sniffers & injection tools
Network Threats Attack
Specific Attack Types
Network Sniffer
How does a Sniffer Work?
How can I detect a packet sniffer?
Packet Sniffer Mitigation
Injection Tools
Introduction to Web Application Penetration TestingAnurag Srivastava
Web Application Pentesting
* Process to check and penetrate the security of a web application or a website
* process involves an active analysis of the application for any weaknesses, technical flaws, or vulnerabilities
* Any security issues that are found will be presented to the system owner, together with an assessment of the impact, a proposal for mitigation or a technical solution.
Vulnerabilities in modern web applicationsNiyas Nazar
Microsoft powerpoint presentation for BTech academic seminar.This seminar discuses about penetration testing, penetration testing tools, web application vulnerabilities, impact of vulnerabilities and security recommendations.
Application Security - Your Success Depends on itWSO2
Traditional information security mainly revolves around network and operating system (OS) level protection. Regardless of the level of security guarding those aspects, the system can be penetrated and the entire deployment can be brought down if your application's security isn't taken into serious consideration. Information security should ideally start at the application level, before network and OS level security is ensured. To achieve this, security needs to be integrated into the application at the software development phase.
In this session, Dulanja will discuss the following:
The importance of application security - why network and OS security is insufficient.
Challenges in securing your application.
Making security part of the development lifecycle.
Malware Detection Using Machine Learning TechniquesArshadRaja786
Malware viruses can be easily detected using machine learning Techniques such as K-Mean Algorithms, KNN algorithm, Boosted J48 Decision Tree and other Data Mining Techniques. Among them J48 proved to be more effective in detecting computer virus and upcoming networks worms...
Network sniffers & injection tools
Network Threats Attack
Specific Attack Types
Network Sniffer
How does a Sniffer Work?
How can I detect a packet sniffer?
Packet Sniffer Mitigation
Injection Tools
Problems With Parameters - A high-level overview of common vulnerabilities identified in web applications, techniques to mitigate these vulnerabilities, and thoughts on incorporating secure webapp development practices into your organization's development culture.
In the last couple of years, security has become a bigger focus point and it hasn’t been different for WordPress. During this talk, I dive into this a bit more by focusing on our role in making sure that projects are delivered as secure as they can be. This by going over several security issues that were discovered this year and ways how you can prevent yourself.
Apache struts vulnerabilities compromise corporate web servers Jeff Suratt
Critical security vulnerabilities in the Apache Struts software has enabled hackers to compromise corporate Web servers, putting sensitive corporate data at risk.
Here Be Dragons: Security Maps of the Container New WorldC4Media
Video and slides synchronized, mp3 and slide download available at URL http://bit.ly/1KjxPiO.
Josh Bregman explores some of the unique security challenges created by both the development workflow and application runtime, explains why and how the current approaches in SecDevOps 1.0 are insufficient, and how SecDevOps 2.0 techniques including Software Defined Firewalls (SDF) provide a promising path forward for all parties involved. Filmed at qconnewyork.com.
Josh Bregman is Information Security Architect and Executive Vice President for Technical Sales at Conjur Inc.
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfaquacareser
Web sever environment:
A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files that
form Web pages to users, in response to their requests, which are forwarded by their computers\'
HTTP clients. Dedicated computers and appliances may be referred to as Web servers as
well.The process is an example of the client/server model. All computers that host Web sites
must have Web server programs. Leading Web servers include Apache (the most widely-
installed Web server), Microsoft\'s Internet Information Server (IIS) and nginx
(pronouncedengine X) from NGNIX. Other Web servers include Novell\'s NetWare server,
Google Web Server (GWS) and IBM\'s family of Domino servers. Web servers often come as
part of a larger package of Internet- and intranet-related programs for serving email,
downloading requests for File Transfer Protocol (FTP) files, and building and publishing Web
pages. Considerations in choosing a Web server include how well it works with the operating
system and other servers, its ability to handle server-side programming, security characteristics,
and the particular publishing, search engine and site building tools that come with it.
Advantages of using a web server within your development environment:
Problems posed by web server environment and methods to solve:
Various high-profile hacking attacks have proven that web security remains the most critical
issue to any business that conducts its operations online. Web servers are one of the most
targeted public faces of an organization, because of the sensitive data they usually host. Securing
a web server is as important as securing the website or web application itself and the network
around it. If you have a secure web application and an insecure web server, or vice versa, it still
puts your business at a huge risk. Your company’s security is as strong as its weakest point.
Although securing a web server can be a daunting operation and requires specialist expertise, it is
not an impossible task. Long hours of research and an overdose of coffee and take away food,
can save you from long nights at the office, headaches and data breaches in the future. Irrelevant
of what web server software and operating system you are running, an out of the box
configuration is usually insecure. Therefore one must take some necessary steps in order to
increase web server security. Below is a list of tasks one should follow when securing a web
server.
1. Remove Unnecessary Services
Default operating system installations and configurations, are not secure. In a typical default
installation, many network services which won’t be used in a web server configuration are
installed, such as remote registry services, print server service, RAS etc. The more services
running on an operating system, the more ports will be left open, thus leaving more open doors
for malicious users to abuse. Switch off all unnecessary services and disable them, so next time
the server is rebooted, they .
Analysis of the quality of libraries in the Packagist universe. Introduction to some tools for assessing package quality. Concepts associated with quality.
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld
VMworld 2013
Merritte Stidston, McKesson
James Wiese, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Affrontare la sicurezza di una web application è uno dei compiti più difficili che uno sviluppatore deve considerare durante le fasi di sviluppo ed integrazione di un software o di un semplice sito web.
Le minacce presenti sul web sono sempre più numerose e ricercare vulnerabilità e metodi di attacco diventa sempre più semplice, anche per i meno esperti.
Il talk mira a fornire indicazioni utili per cercare di evitare al massimo attacchi sulle proprie applicazioni, analizzando le principali vulnerabilità dei più famosi progetti Open Source.
Running Java Applications on Cloud FoundryVMware Tanzu
SpringOne Platform 2017
Ben Hale, Pivotal
From a developer's perspective, running a Java application on Cloud Foundry appears to consist of pushing a compiled artifact and getting a running process. From the platform's perspective though, there's a whole lot more going on. In this talk, the lead developer of the Java Buildpack will walk you through what goes on during application staging and what the buildpack can do for you. It will cover everything from dependency resolution to memory calculation and will even discuss how to integrate with marketplace services with no application configuration.
No company is safe from a Ransomware attack (malicious forms of software programmed to steal company data and hold it for "ransom"). However, technology has allowed us to mitigate these attacks by implementing proper recovery systems that can ensure that cyber criminals will never see a dime from your business.
Similar to DVWA(Damn Vulnerabilities Web Application) (20)
In this PDF you will find the basics of Turbo Prolog 2.0 with some good program and it's output. Also it's second part is coming in next month or week.
For any query ------------------> sohupatel8828@gmail.com
For programs ----------------> https://github.com/UltraHopeful/Turbo-Prolog-2.0
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
Even though at surface level ‘java.lang.OutOfMemoryError’ appears as one single error; underlyingly there are 9 types of OutOfMemoryError. Each type of OutOfMemoryError has different causes, diagnosis approaches and solutions. This session equips you with the knowledge, tools, and techniques needed to troubleshoot and conquer OutOfMemoryError in all its forms, ensuring smoother, more efficient Java applications.
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
Strategies for Successful Data Migration Tools.pptxvarshanayak241
Data migration is a complex but essential task for organizations aiming to modernize their IT infrastructure and leverage new technologies. By understanding common challenges and implementing these strategies, businesses can achieve a successful migration with minimal disruption. Data Migration Tool like Ask On Data play a pivotal role in this journey, offering features that streamline the process, ensure data integrity, and maintain security. With the right approach and tools, organizations can turn the challenge of data migration into an opportunity for growth and innovation.
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Designing for Privacy in Amazon Web ServicesKrzysztofKkol1
Data privacy is one of the most critical issues that businesses face. This presentation shares insights on the principles and best practices for ensuring the resilience and security of your workload.
Drawing on a real-life project from the HR industry, the various challenges will be demonstrated: data protection, self-healing, business continuity, security, and transparency of data processing. This systematized approach allowed to create a secure AWS cloud infrastructure that not only met strict compliance rules but also exceeded the client's expectations.
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns
Unlocking Business Potential: Tailored Technology Solutions by Prosigns
Discover how Prosigns, a leading technology solutions provider, partners with businesses to drive innovation and success. Our presentation showcases our comprehensive range of services, including custom software development, web and mobile app development, AI & ML solutions, blockchain integration, DevOps services, and Microsoft Dynamics 365 support.
Custom Software Development: Prosigns specializes in creating bespoke software solutions that cater to your unique business needs. Our team of experts works closely with you to understand your requirements and deliver tailor-made software that enhances efficiency and drives growth.
Web and Mobile App Development: From responsive websites to intuitive mobile applications, Prosigns develops cutting-edge solutions that engage users and deliver seamless experiences across devices.
AI & ML Solutions: Harnessing the power of Artificial Intelligence and Machine Learning, Prosigns provides smart solutions that automate processes, provide valuable insights, and drive informed decision-making.
Blockchain Integration: Prosigns offers comprehensive blockchain solutions, including development, integration, and consulting services, enabling businesses to leverage blockchain technology for enhanced security, transparency, and efficiency.
DevOps Services: Prosigns' DevOps services streamline development and operations processes, ensuring faster and more reliable software delivery through automation and continuous integration.
Microsoft Dynamics 365 Support: Prosigns provides comprehensive support and maintenance services for Microsoft Dynamics 365, ensuring your system is always up-to-date, secure, and running smoothly.
Learn how our collaborative approach and dedication to excellence help businesses achieve their goals and stay ahead in today's digital landscape. From concept to deployment, Prosigns is your trusted partner for transforming ideas into reality and unlocking the full potential of your business.
Join us on a journey of innovation and growth. Let's partner for success with Prosigns.
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
In this slide, we show the simulation example and the way to compile this solver.
In this solver, the Helmholtz equation can be solved by helmholtzFoam. Also, the Helmholtz equation with uniformly dispersed bubbles can be simulated by helmholtzBubbleFoam.
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Experience our free, in-depth three-part Tendenci Platform Corporate Membership Management workshop series! In Session 1 on May 14th, 2024, we began with an Introduction and Setup, mastering the configuration of your Corporate Membership Module settings to establish membership types, applications, and more. Then, on May 16th, 2024, in Session 2, we focused on binding individual members to a Corporate Membership and Corporate Reps, teaching you how to add individual members and assign Corporate Representatives to manage dues, renewals, and associated members. Finally, on May 28th, 2024, in Session 3, we covered questions and concerns, addressing any queries or issues you may have.
For more Tendenci AMS events, check out www.tendenci.com/events
In software engineering, the right architecture is essential for robust, scalable platforms. Wix has undergone a pivotal shift from event sourcing to a CRUD-based model for its microservices. This talk will chart the course of this pivotal journey.
Event sourcing, which records state changes as immutable events, provided robust auditing and "time travel" debugging for Wix Stores' microservices. Despite its benefits, the complexity it introduced in state management slowed development. Wix responded by adopting a simpler, unified CRUD model. This talk will explore the challenges of event sourcing and the advantages of Wix's new "CRUD on steroids" approach, which streamlines API integration and domain event management while preserving data integrity and system resilience.
Participants will gain valuable insights into Wix's strategies for ensuring atomicity in database updates and event production, as well as caching, materialization, and performance optimization techniques within a distributed system.
Join us to discover how Wix has mastered the art of balancing simplicity and extensibility, and learn how the re-adoption of the modest CRUD has turbocharged their development velocity, resilience, and scalability in a high-growth environment.
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
2. INDEX
• Introduction
• License &Warning
• Installation
• Vulnerabilities
• How to login (Steps for Solve the problem)
• Homepage (attacks)
• DVWA security
• User Security
• Usage
28-09-2017 Preapared By:Soham Kansodaria 2
3. Introduction
• DamnVulnerableWeb Application (DVWA) is a PHP/MySQL web application that is
damn vulnerable.
• Its main goals are to be an aid for security professionals to test their skills and tools
in a legal environment, help web developers better understand the processes of
securing web applications and aid teachers/students to teach/learn web application
security in a class room environment.
• The DVWA project started in December 2008 and has steadily grown in popularity.
• It is now used by thousands of security professionals, students and teachers world
wide.
• DVWA is now included in popular penetration testing Linux distributions such as
SamuraiWebTesting Framework and many others.
28-09-2017 Preapared By:Soham Kansodaria 3
4. License & Warning
• License
• DamnVulnerable Web Application (DVWA) is free software: you can
redistribute it and/or modify it under the terms of the GNU General
Public License.
• Warning
• DamnVulnerable Web App is damn vulnerable! Do not upload it to
your hosting provider's public html folder or any working web server
as it will be compromised.
• We recommend downloading and installing XAMPP onto a local
machine inside your LAN which is used solely for testing.
28-09-2017 Preapared By:Soham Kansodaria 4
5. Installation
• DVWA is a web application coded in PHP that uses a MySQL
back-end database.
• DVWA needs a web server, PHP and MySQL installed in order
to run.The easiest way to install DVWA is to download and
install 'XAMPP' if you do not already have a web server setup.
• XAMPP can be downloaded from:
http://www.apachefriends.org/en/xampp.html
• Then download DVWA from:
https://github.com/ethicalhack3r/DVWA/archive/master.zip
28-09-2017 Preapared By:Soham Kansodaria 5
6. Cont. Installation
• After download DVWA uncompressed it.
• Linux
• Now put the uncompressed folder DVWA into ʻ/opt/lampp/htdocs’.
Start Apache with the following command; ʻsudo /opt/lampp/lamp
start’.And then DVWA should be accessible from your browser at
http://127.0.0.1/dvwa.
• Windows
• Now put the uncompressed folder DVWA into ʻC:XAMPPhtdocs’.And
then DVWA should be accessible from your browser at
http://127.0.0.1/dvwa.
28-09-2017 Preapared By:Soham Kansodaria 6
7. Vulnerbilities
• DVWA as the name suggests is vulnerable to the most common
types of web application vulnerabilities.
• DVWA incorporates most of the Open Web Application Security
Project's (OWASP) top 10 web application security risks for
2010 as reported in the OWASPTOP 10 document.
• The OWASPTop 10 Web Application Security Risks for 2017 are
in next slide:
28-09-2017 Preapared By:Soham Kansodaria 7
8. OWASP top 10 2017
• A1 :SQL Injection
• A2 :Broken Authentication and Session Management
• A3 :Cross-Site Scripting (XSS)
• A4 :Broken Access Control
• A5 :Security Misconfiguration
• A6 :Sensitive Data Exposure
• A7 :Insufficient Attack Protection (+T10)
• A8 :Cross-Site Request Forgery (CSRF)
• A9 :Using Components with Known Vulnerabilities
• A10 :Underprotected APIs
• Find OWASP top 10 of 2017 at : https://github.com/OWASP/Top10/issues
28-09-2017 Preapared By:Soham Kansodaria 8
9. Vulnerbilities
Some of the web application vulnerabilities which DVWA contains;
• Brute Force: HTTP Form Brute Force login page; used to test password brute
force tools and show the insecurity of weak passwords.
• Command Execution: Executes commands on the underlying operating
system.
• Cross Site Request Forgery (CSRF): Enables an ʻattackerʼ to change the
applications admin password.
• File Inclusion: Allows an ʻattackerʼ to include remote/local files into the web
application.
• SQL Injection: Enables an ʻattackerʼ to inject SQL statements into an HTTP
form input box. DVWA includes Blind and Error based SQL injection.
• Insecure File Upload: Allows an ʻattackerʼ to upload malicious files on to the
web server.
• Cross Site Scripting (XSS): An ʻattackerʼ can inject their own scripts into the
web application/database. DVWA includes Reflected and Stored XSS.
• Easter eggs: Full path Disclosure,Authentication bypass and some others.
28-09-2017 Preapared By:Soham Kansodaria 9
10. How to Login
28-09-2017 Preapared By:Soham Kansodaria 10
After put the folder as above say when you open http://127.0.0.1/dvwa this then show as below which say that
DVWA System error - config file not found. Copy config/config.inc.php.dist to config/config.inc.php and
configure to your environment.
Means rename the file config.inc.php.dist to config.inc.php
11. Cont. Login
28-09-2017 Preapared By:Soham Kansodaria 11
After rename the file again open http://127.0.0.1/dvwa then you find like this in your browser.So, now following the
below steps
12. Steps for Solve the problem
• Step 1: First create the database name dvwa in
http://localhost/phpmyadmin/
• Step 2:Remove the password from config.inc.php file
find this line
$_DVWA[ 'db_password' ] = 'p@ssword';
and remove ‘p@ssword’
• Step 3:Go to the C:xamppphp and find php.ini and open in
notepad and find this line: allow_url_include=Off and remove
Off and write On
• Step 4:Provide recaptcha key in config.inc.php
$_DVWA[ 'recaptcha_public_key' ] = '6LdK7xITAAzzAAJQTfL7fu6I-0aPl8KHHieAT_yJg';
$_DVWA[ 'recaptcha_private_key' ] = '6LdK7xITAzzAAL_uw9YXVUOPoIHPZLfw2K1n5NVQ';
Note:After all step please restart your apache and mysql in xammp which is mandatory.
28-09-2017 Preapared By:Soham Kansodaria 12
13. Login
• After following all above steps click on create/reset Database button then
successfully create the database and now you redirect to login page
automatically after some time.
28-09-2017 Preapared By:Soham Kansodaria 13
14. Cont. Login
28-09-2017 Preapared By:Soham Kansodaria 14
Now enter the login credentials as below
Login : admin
Password : password
17. Cont. Attacks
• Insecure File Upload
• http://127.0.0.1/dvwa/vulnerabilities/upload/
• Reflected Cross Site Scripting
• http://127.0.0.1/dvwa/vulnerabilities/xss_r/
• Stored Cross Site Scripting
• http://127.0.0.1/dvwa/vulnerabilities/xss_s/
• Full path Disclosure
• Site wide. Set PHPSESSID to NULL. (Null Session Cookie)
http://www.owasp.org/index.php/Full_Path_Disclosure
• Authentication bypass
• If the admin changes the default password (password) and the 'attacker'
knows what the default password is.The 'attacker' may access
http://127.0.0.1/dvwa/setup.php to reset the database including the
password.
28-09-2017 Preapared By:Soham Kansodaria 17
18. BruteForce ,Command Execution and other attacks
• For BruteForce ,Command Execution and other attacks use Software like
burpsuite, w3af,Vega, Skipfish, Netsparker, WebSurgery, IBM Rational
AppScan and etc.
• Burpsuite download: https://portswigger.net/burp/freedownload
• W3af download: w3af - Open SourceWeb Application Security Scanner
• Vega download: Free and Open SourceWeb ApplicationVulnerability
Scanner
• Skipfish download: Downloads - skipfish - web application security
scanner - Google Project Hosting
• Netsparker download: Download aTrial of NetsparkerWeb Application
Security Scanner
• Websurgery download: SunriseTechnologies
• IBM Rational AppScan download: IBM Security AppScan
28-09-2017 Preapared By:Soham Kansodaria 18
19. SQL Injection
• LETS DUMPTHE DATABASE
• CHECK IFVULNERABLE : 1’
• EXTRACTTHE DATA (means write in USER ID)
• 1’ OR 1 = 1#
• 1’ OR 1 = 1 UNION SELECT NULL, TABLE_NAME FROM
INFORMATION_SCHEMA.TABLES#
• USER,PASSWORD FROM USERS#
• MD5 USING JOHNTHE RIPPER
28-09-2017 Preapared By:Soham Kansodaria 19
20. DVWA Security
• As well as being vulnerable, DVWA has some other features
which aid in the teaching or learning of web application
security. DVWAs Security features can be divided into two
parts, one is the security levels and the other is PHP-IDS.
• The security levels are named low, medium and high. Each
level changes the vulnerability state of DVWA throughout the
application. By default when DVWA is loaded the security level
is set to High. Below is an explanation of each security level and
its purpose.
28-09-2017 Preapared By:Soham Kansodaria 20
21. Security Levels
• High-This level is to give an example to the user of good coding
practises. This level should be secure against all vulnerabilities. It
used to compare the vulnerable source code to the secure source
code.
• Medium- This security level is mainly to give an example to the
user of bad security practices, where the developer has tried but
failed to secure an application. It also acts as a challenge to
refine their exploitation techniques.
• Low- This security level is completely vulnerable and has no
security at all.It's use is to be as an example of how web
vulnerabilities manifest through bad coding practices and to
as a platform to teach or learn basic exploitation techniques.
• Impossible- You can’t attacked it.
28-09-2017 Preapared By:Soham Kansodaria 21
22. PHP-IDS
• PHP-IDS is a popular PHP Intrusion Detection System (IDS) also
known as aWebApplication Firewall (WAF).
• PHP-IDS works by filtering any user supplied input against a
blacklist of potentially malicious code.
• PHP-IDS is used in DVWA to serve as a live example of howWAFs
can help improve security in web applications and in some cases
howWAFs can be circumvented.
• PHP-IDS can be enabled or disabled at the click of a button.
• DVWA has explicit written permission from the owner of PHPIDS
Mario Heiderich for it to be included and distributed within DVWA
as long as the licensing is left intact.
• For further information on PHP-IDS please visit; http://www.php-
ids.org
28-09-2017 Preapared By:Soham Kansodaria 22
23. User Security
28-09-2017 Preapared By:Soham Kansodaria 23
• DVWA does not emulate web application vulnerabilities, the
vulnerabilities within DVWA are real and therefore great care should be
taken on where it is installed.
• DVWA takes a proactive approach in protecting its users wherever
possible.
• This is done by bold written warnings at the download of the
application and within the application itself.
• DVWA can only be accessed from the localhost and not from remote
machines, this is done by setting certain rules within the .htaccess file
which is part of the application.
• User security is of up most importance to the DVWA project. If users do
not disable any of these features and follow the advice given, installing
and using DVWA will not compromise the security of the machine it is
installed on.
24. Usage
• DVWA can be used in a variety of ways. It can be used to teach web
application security by showing practical examples and setting challenges
for the students.
• It can be used as just a learning aid, DVWA is designed as such to be as
easy as possible to set up and use.
• There is plenty of information within DVWA to help the beginner get
started. DVWA can also be used as a reference to secure coding, if a
developer is not quite sure if they have protected their application against
XSS for example, they can view DVWAs source code as a reference.
• After all the DVWA source code has been peer reviewed by thousands of
security professionals and students.
28-09-2017 Preapared By:Soham Kansodaria 24
25. Refernce for learn DVWA
• dvwa video tutorial series:
• 1-installation of dvwa https://youtu.be/fc7nzhdrcui
• 2-bruteforce attack low | medium | high https://youtu.be/6h3nb7rwpvc
• 3-command injection low | medium | high https://youtu.be/0ln7nscqlai
• 4-file inclusion low | medium | high https://youtu.be/f9oxaenez_e
• 5-file upload low | medium | high https://youtu.be/zajcl2hdoey
• 6-sql injection low | medium | high https://youtu.be/q2ekwm9kfke
28-09-2017 Preapared By:Soham Kansodaria 25