By @rosinni and other contributors at 4Geeks Academy
Estas instrucciones estan disponibles en español
We need you! These exercises are built and maintained in collaboration with contributors such as yourself. If you find any bugs or misspellings please contribute and/or report them.
Do not clone this repository! Just follow the instructions.
This exercise aims to teach students how to exploit vulnerabilities found in a vulnerable web application (DVWA) using Metasploitable. This includes detecting exploitable vulnerabilities and privilege escalation. Note: No post-exploitation activities will be performed.
This is the third of 4 projects that will give you a comprehensive understanding of pentesting. The focus of this phase is on "Exploitation" in a Vulnerable Web Application.
Introduction
Methodology
Results
Privilege Escalation
Mitigation
Conclusion
If you want to keep practicing and apply your knowledge in another environment, you can use BeeBox with bWAPP. Taking advantage of your previous experience with BeeBox, here's an option to perform the exercise using BeeBox:
Start BeeBox and bWAPP:
Confirm Vulnerabilities:
ifconfig
.1sudo nmap -sV --script=vuln <IP-Target>
Detect Exploitable Vulnerabilities:
Exploit Vulnerabilities:
sqlmap
to exploit vulnerabilities in bWAPP.
1sqlmap -u "http://<IP-Target>/bWAPP/sqli_1.php?id=1" --dbs
Document the Process:
This structure allows students to apply and compare their skills in two different environments, first with Metasploitable and DVWA, and then with BeeBox and bWAPP. The main exercise provides a solid foundation in using Metasploit and exploiting a vulnerable machine, while the plus exercise broadens experience to another environment and tool. By documenting and reflecting on each step, you'll be better prepared to face real-world pentesting challenges.
Thanks goes to these wonderful people (emoji key):
Rosinni Rodríguez (rosinni) contribution: (build-tutorial) ✅, (documentation) 📖
Alejandro Sanchez (alesanchezr), contribution: (bug reports) 🐛
This project follows the all-contributors specification. Contributions of any kind are welcome!