in , , ,

Getting to know web applications on a vulnerable VM

Web App Penetration Testing – Kali Linux – Web App on Vulnerable Virtual Machine

Web Applications on a Vulnerable Virtual Machine – Penetration Testing

OWASP-bwa contains many web applications, intentionally made vulnerable to the most common attacks. Some of them are focused on the practice of some specific technique while others try to replicate real-world applications that happen to have vulnerabilities. In this recipe, we will take a tour of our vulnerable_vm and get to know some of the applications it includes.

Getting ready

We need to have our vulnerable_vm running and its network correctly configured. For this tutorial, we will be using as its IP address.

How to do it…

1. With vulnerable_vm running, open your Kali Linux host’s web browser and go to You will see a list of all applications the server contains:

2. Let’s go to Damn Vulnerable Web Application.

3. Use admin as a user name and admin as a password. We can see a menu on the left; this menu contains links to all the vulnerabilities that we can practice in this application: Brute Force, Command Execution, SQL Injection, and so on. Also, the DVWA Security section is where we can configure the security (or complexity) levels of the vulnerable inputs.

4. Log out and return to the server’s homepage.

5. Now we click on OWASP WebGoat.NET. This is a .NET application where we will be able to practice file and code injection attacks, cross-site scripting, and encryption vulnerabilities. It also has a WebGoat Coins Customer Portal that simulates a shopping application and can be used to practice not only the exploitation of vulnerabilities but also their identification.

6. Now return to the server’s home page.

7. Another interesting application included in this virtual machine is BodgeIt, which is a minimalistic version of an online store based on JSP—it has a list of products that we can add to a shopping basket, a search page with advanced options, a registration form for new users, and a login form.

There is no direct reference to vulnerabilities; instead, we will need to look for them.

8. We won’t be able to look at all the applications in a single recipe, but we will be using some of them.

How it works…

The applications in the home page are organized in the following six groups:

  • Training applications: These are the ones that have sections dedicated to practice-specific vulnerabilities or attack techniques; some of them include tutorials, explanations, or other kind of guidance.
  • Realistic, intentionally vulnerable applications: Applications that act as real-world applications (stores, blogs, and social networks) and are intentionally left vulnerable by their developers for the sake of training.
  • Old (vulnerable) versions of real applications: Old versions of real applications, such as WordPress and Joomla are known to have exploitable vulnerabilities; these are useful to test our vulnerability identification skills.
  • Applications for testing tools: The applications in this group can be used as a benchmark for automated vulnerability scanners.
  • Demonstration pages / small applications: These are small applications that have only one or a few vulnerabilities, for demonstration purposes only.
  • OWASP demonstration application: OWASP AppSensor is an interesting application, it simulates a social network and could have some vulnerabilities in it. But it will log any attack attempts, which is useful when trying to learn; for example, how to bypass some security devices such as a web application firewall.

If you have encountered a problem or you have any questions or remarks please feel free to set a comment.

If this article helped you to solve your problem please feel free to share it with your friends … with love and prosperity K4LINUXTEAM.

With Love and Prosperity K4LINUX-TEAM.


What do you think?

1079 points
Upvote Downvote

Total votes: 3

Upvotes: 2

Upvotes percentage: 66.666667%

Downvotes: 1

Downvotes percentage: 33.333333%

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Web application penetration testing with kali linux

Configuring virtual machines for correct communication – Web App Penetration Testing

penetration testing with kali linux nmap

Nmap – Scanning and identifying services