Go to file
2020-09-06 17:31:48 +02:00
dvwa@435f94dae3 [fix] convert dvwa to submodule part 2: add submodule 2020-09-06 12:02:40 +02:00
.gitmodules [fix] convert dvwa to submodule part 2: add submodule 2020-09-06 12:02:40 +02:00
config.inc.php updated debian to 9.2 and migrated to mariadb 2018-10-12 17:44:03 +00:00
Dockerfile updated debian to 9.2 and migrated to mariadb 2018-10-12 17:44:03 +00:00
main.sh dvwa updated 2018-10-12 15:49:58 +00:00
php.ini updated debian to 9.2 and migrated to mariadb 2018-10-12 17:44:03 +00:00
README.md [fix] derivative mention and howto 2020-09-06 17:31:48 +02:00
setup-dificulty.png dificulty image 2017-01-02 19:31:15 -02:00
setup.png setup added 2017-01-02 19:17:06 -02:00
sqli.png sqlinjection print added 2017-01-02 19:40:03 -02:00

Damn Vulnerable Web Application Docker container

Caution

This is a derivative of the original project.

To build your own image :

git clone https://git.interhacker.space/alban/docker-vulnerable-dvwa
cd docker-vulnerable-dvwa
git submodule init
git submodule update
docker build . -t dvwa:latest

To use the image:

docker run albancrommer/dvwa:latest

About

Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goal is to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and to aid both students & teachers to learn about web application security in a controlled class room environment.

The aim of DVWA is to practice some of the most common web vulnerability, with various difficultly levels, with a simple straightforward interface. Please note, there are both documented and undocumented vulnerability with this software. This is intentional. You are encouraged to try and discover as many issues as possible.

WARNING This image is vulnerable to several kinds of attacks, please don't deploy it to any public servers.

Run this image

To run this image you need docker installed. Just run the command:

docker run --rm -it -p 80:80 albancrommer/dvwa

And wait until it download the image and start it, after that you can see the image running in your local machine:

Just click on the Create / Reset database button and it will generate any aditional configuration needed.

Login with default credentials

To login you can use the following credentials:

  • Username: admin
  • Password: password

Set the dificulty level

The default dificulty level is the impossible level, you can change it in DVWA Security item in the left menu.

Hack and have fun !

If you are playing it in low dificulty, just to have a taste of how exploit a flaw in this app, go to SQL Injection in the left menu. In the id field, add this query:

%' and 1=0 union select null, concat(user,':',password) from users #

There are several other ways and other vulnerabilities do exploit, go ahead, have fun !

About DVWA

You can visit DVWA official website and official github repository if you want more information.

Disclaimer

This or previous program is for Educational purpose ONLY. Do not use it without permission. The usual disclaimer applies, especially the fact that me (opsxcq) is not liable for any damages caused by direct or indirect use of the information or functionality provided by these programs. The author or any Internet provider bears NO responsibility for content or misuse of these programs or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss, system crash, system compromise, etc.) caused by the use of these programs is not opsxcq's responsibility.