Learn how easy it is to sync an existing GitHub or Google Code repo to a SourceForge project! See Demo

Close

Tree [r70] /
History



File Date Author Commit
Ivey 2010-12-09 trentonivey [r70] Removed old functions.php (kno)
config 2010-12-08 trentonivey [r67] Updating config.inc.php
docs 2010-10-27 ethicalhack3r [r62]
dvwa 2010-09-07 ethicalhack3r [r48]
external 2010-03-15 ethicalhack3r [r8] * Cosmetic changes to help + more.
hackable 2010-02-12 ethicalhack3r [r1] REINSTATED REPOSITOY DUE TO SOME PROBLEMS. INST...
vulnerabilities 2010-08-26 ethicalhack3r [r31]
.htaccess 2010-09-07 ethicalhack3r [r48]
CHANGELOG.txt 2010-06-06 ethicalhack3r [r13] * Changed the look of the login page.
COPYING.txt 2010-02-12 ethicalhack3r [r1] REINSTATED REPOSITOY DUE TO SOME PROBLEMS. INST...
README.txt 2010-02-12 ethicalhack3r [r1] REINSTATED REPOSITOY DUE TO SOME PROBLEMS. INST...
about.php 2010-08-26 ethicalhack3r [r31]
favicon.ico 2010-09-06 ethicalhack3r [r42]
ids_log.php 2010-02-12 ethicalhack3r [r1] REINSTATED REPOSITOY DUE TO SOME PROBLEMS. INST...
index.php 2010-06-06 ethicalhack3r [r13] * Changed the look of the login page.
instructions.php 2010-02-12 ethicalhack3r [r1] REINSTATED REPOSITOY DUE TO SOME PROBLEMS. INST...
login.php 2010-08-26 ethicalhack3r [r31]
logout.php 2010-02-12 ethicalhack3r [r1] REINSTATED REPOSITOY DUE TO SOME PROBLEMS. INST...
php.ini 2010-08-26 ethicalhack3r [r29]
phpinfo.php 2010-02-12 ethicalhack3r [r1] REINSTATED REPOSITOY DUE TO SOME PROBLEMS. INST...
robots.txt 2010-02-12 ethicalhack3r [r1] REINSTATED REPOSITOY DUE TO SOME PROBLEMS. INST...
security.php 2010-02-12 ethicalhack3r [r1] REINSTATED REPOSITOY DUE TO SOME PROBLEMS. INST...
setup.php 2010-03-19 ethicalhack3r [r12] * PostgreSQL now working apart from on the vuln...

Read Me

############################################################
################# DAMN VULNERABLE WEB APP ##################
############################################################

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.

############
# WARNING! #
############

Damn Vulnerable Web App is damn vulnerable! Do not upload it to your hosting provider's public html folder or any working web
server as it will be hacked. I recommend downloading and installing XAMPP onto a local machine inside your LAN which is used solely for testing. 

We do not take responsibility for the way in which any one uses Damn Vulnerable Web App (DVWA). We have made the purposes of the application clear and it should not be used maliciously. We have given warnings and taken measures to prevent users from installing DVWA on to live web servers. If your web server is compromised via an installation of DVWA it is not our responsibility it is the responsibility of the person/s who uploaded and installed it.

###########
# License #
###########

This file is part of Damn Vulnerable Web App (DVWA).

Damn Vulnerable Web App (DVWA) is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.

Damn Vulnerable Web App (DVWA) is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with Damn Vulnerable Web App (DVWA).  If not, see http://www.gnu.org/licenses/.

################
# Installation #
################

Default username = admin
Default password = password

Installation video:
http://www.youtube.com/watch?v=GzIj07jt8rM

The easiest way to install DVWA is to download and install 'XAMPP' if you do not already have a web server setup. 

XAMPP is a very easy to install Apache Distribution for Linux, Solaris, Windows and Mac OS X. The package includes the Apache web server, MySQL, PHP, Perl, a FTP server and phpMyAdmin.

XAMPP can be downloaded from:
http://www.apachefriends.org/en/xampp.html

Simply unzip dvwa.zip, place the unzipped files in your public html folder, then point your browser to http://127.0.0.1/dvwa/index.php


##################
# Database Setup #
##################

To set up the database, simply click on the Setup button in the main menu, then click on the 'Create / Reset Database' button. This will create / reset the database for you with some data in.

If you receive an error while trying to create your database, make sure your database credentials are correct within /config/config.inc.php

The variables are set to the following by default: 

$_DVWA[ 'db_user' ] = 'root';
$_DVWA[ 'db_password' ] = '';
$_DVWA[ 'db_database' ] = 'dvwa';

An explanation of these variables:

$_DVWA[ 'db_user' ] = 'your_database_username';
$_DVWA[ 'db_password' ] = 'your_database_password';
$_DVWA[ 'db_database' ] = 'your_database_name';


###################
# Troubleshooting #
###################

For the latest troubleshooting information please visit: http://www.dvwa.co.uk/forum/viewtopic.php?f=5&t=7


+Q. SQL Injection wont work on PHP version 5.2.6.

-A.If you are using PHP version 5.2.6 you will need to do the following in order for SQL injection and other vulnerabilities to work.

In .htaccess:

	Replace:

	<IfModule mod_php5.c>
	php_flag magic_quotes_gpc off
	#php_flag allow_url_fopen on
	#php_flag allow_url_include on
	</IfModule>

	With:

	<IfModule mod_php5.c>
	magic_quotes_gpc = Off
	allow_url_fopen = On
	allow_url_include = On
	</IfModule>

+Q. Command execution won't work.

-A. Apache may not have high enough priviledges to run commands on the web server. If you are running DVWA under linux make sure you are logged in as root. Under Windows log in as Administrator.
	
+Q. My XSS payload won't run in IE.

-A. If your running IE8 or above IE actively filters any XSS. To disable the filter you can do so by setting the HTTP header 'X-XSS-Protection: 0' or disable it from internet options. There may also be ways to bypass the filter.


# Contact: dvwa@dvwa.co.uk  
# Website: http://www.dvwa.co.uk
# Download: http://sourceforge.net/projects/dvwa/
# SVN: http://dvwa.svn.sourceforge.net/svnroot/dvwa

# Created by: The DVWA team.