Vulnerable Web Application Lab
- Mutillidae – Vulnerable Web App (requires XAMPP)
- OWASP Broken Web Application (OWASPBWA)
Vulnerable Targets
- Metasploitable Lab
- Windows Lab
- Damn Vulnerable Linux (DVL)
- OWASP Web Testing Environment (WTW)
- OSCP lab
- megacorpone.com domain represents a fictitious company created by Offensive Security.
Metasploitable 2 Lab
Metasploitable 2 is an intentionally vulnerable Linux virtual machine.
https://sourceforge.net/projects/metasploitable/files/Metasploitable2/
The default login and password is msfadmin:msfadmin
Never expose this VM to an untrusted network (use NAT or Host-only mode if you have any questions what that means).
Exploitation guide (with SPOILERS!):
Download the metasploitable-linux-2.0.0.zip file. It includes Mutillidae.
- In Virtual Box
- Create new VM, Name: Metasploitable2, OS: Linux, Version: Ubuntu 64-bit
- Memory size: 1024 MB
- Use existing virtual hard disk file, select Metasploitable.vmdk
- In a web browser, go to <your IP>/mutillidae
Fix for SQLmap
ssh msfadmin@x.x.x.x (IP for Metasploitable)
[pass: msfadmin]
vi /var/www/mutillidae/config.inc
Make sure that $dbname = ‘owasp10’; (was originally ‘metasploit’)
Mutillidae – Vulnerable Web App (requires XAMPP)
Vulnerable web application
#-------------------------------------------------------------------------------
# Download
#-------------------------------------------------------------------------------
https://sourceforge.net/projects/mutillidae
Click on Download
Alternatively, git is updated more frequently:
git clone git://git.code.sf.net/p/mutillidae/git mutillidae-git
#-------------------------------------------------------------------------------
# Install Mutillidae
#-------------------------------------------------------------------------------
Install XAMPP first. See XAMPP documentation.
Extract downloaded file.
Copy the mutillidae folder in C:\xamp\htdocs
Edit file C:\xamp\htdocs\mutilidae\.htaccess
Add line (assuming network is 10.0.0.0/24, adapt if necessary):
Allow from 10.
In a browser, go to
http://[your machine ip]/mutillidae
Click on setup/reset the DB and Mutillidae will install
OWASP Broken Web Application (OWASPBWA)
#-------------------------------------------------------------------------------
# Download the OWASP Broken Web Application (OWASPBWA) virtual machine
#-------------------------------------------------------------------------------
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project
Download the zip file v 1.2 (will give an .ISO file)
OWASP Broken Web Applications Project is a collection of vulnerable web applications that is distributed on a Virtual Machine.
#-------------------------------------------------------------------------------
# In VMware Fusion
#-------------------------------------------------------------------------------
Click Open a virtual machine
choose file OWASP Broken Web Apps
user: root
pass: owaspbwa
Note that this VM is highly vulnerable. Disable drag & drop, copy/paste, and run in "Host or Internal Network" in the VM settings
#-------------------------------------------------------------------------------
# How to use it
#-------------------------------------------------------------------------------
# OWASPBWA virtual machine doesn't have a graphical interface.
# Get the ip address
ifconfig to get ip address
# In Kali Linux, type the ip address in a browser to access web applications
# OWASPBWA Bricks has a database and login page, so good target to start
#-------------------------------------------------------------------------------
# Setting up a CMS Lab (WordPress)
#-------------------------------------------------------------------------------
Download a wordpress application
www.turnkeylinux.org
In the search box, type "wordpress"
Click on "WordPress - Blog Publishing Platform"
Download it and install in a VM