Sunday, June 4, 2023

Learning Web Pentesting With DVWA Part 1: Installation



In this tutorial series I'm going to walk you through the damn vulnerable web application (DVWA) which is damn vulnerable. Its main goal according to the creators is "to aid security professionals to test thier skills and tools in a legal environment, help web developers better understand the process of securing web applications and to aid both students & teachers to learn about web application security in a controlled class room environment."

I am going to install DVWA in docker so the prerequisite for this tutorial will be an installation of docker (Docker is not the only way to install DVWA but if you have docker already installed then it may be the easiest way to install DVWA).

To install DVWA in docker run your docker deamon if it's not running already and open a terminal or powershell and type:

docker rum --rm -it -p 8080:80 vulnerables/web-dvwa




It will take some time to pull the image from docker hub depending on your internet speed and after it is complete it will start the dvwa application. In the command we have mapped the image instance's port 80 to our hosts port 8080 so we should be able to access the web application from our host at http://localhost:8080

Now open your favorite web browser and go to http://localhost:8080
You should be prompted with a login screen like this:



login with these creds:
username: admin
password: password

After login you'll see a database setup page since this is our first run. Click on Create / Reset Database button at the bottom. It will setup database and redirect you to login page. Now login again and you'll see a welcome page.



Now click on DVWA Security link at the bottom of the page navigation and make sure the security level is set to Low. If it is not click on the dropdown, select Low and then click submit.




Now our setup is complete, so lets try a simple SQL attack to get a taste of whats about to come.

Click on SQL Injection in navigation menu.
You'll be presented with a small form which accepts User ID.
Enter a single quote (') in the User ID input field and click Submit.
You'll see an SQL error like this:



From the error message we can determine that the server has a MariaDB database and we can see the point of injection.
Since there are many quotes we are not able to determine the exact location of our injection. Lets add some text after our single quote to see exactly where our injection point is.
Now I am going to enter 'khan in the User ID field and click Submit.



Now we can see exactly where the point of injection is. Determining the point of injection is very important for a successful SQL injection and is sometimes very hard too, though it might not be that much useful here in this exercise.

Now lets try the very basic SQL Injection attack.
In the User ID field enter ' or 1=1-- - and click Submit.



We will explain what is going on here in the next article.


References:-
1. DVWA Official Website: http://www.dvwa.co.uk/

More info


  1. How To Install Pentest Tools In Ubuntu
  2. Hacker
  3. Hacking Tools For Pc
  4. Hacking Tools For Games
  5. Hacking Tools Free Download
  6. Hacker Tools Hardware
  7. Hacking Tools Kit
  8. Hacker Tool Kit
  9. Pentest Tools Online
  10. Pentest Tools Kali Linux
  11. Tools Used For Hacking
  12. New Hacker Tools
  13. Github Hacking Tools
  14. Pentest Tools Subdomain
  15. Pentest Tools Bluekeep
  16. Hacking Tools 2020
  17. Pentest Tools Find Subdomains
  18. Hacker Tools
  19. How To Hack
  20. Hacker Tools Mac
  21. Hack Tools Github
  22. Pentest Tools For Windows
  23. Hacker Tools
  24. Nsa Hacker Tools
  25. Pentest Tools Apk
  26. Pentest Tools Download
  27. Hack Tools
  28. Hacker Tools
  29. Pentest Recon Tools
  30. Hacking Tools Hardware
  31. Hacker Tools For Ios
  32. Nsa Hack Tools
  33. Pentest Tools For Android
  34. Pentest Tools Nmap
  35. Hack Rom Tools
  36. Hack Tools Online
  37. Nsa Hack Tools Download
  38. Hak5 Tools
  39. Hacker Tools Online
  40. Hack Tools For Ubuntu
  41. Hack Tools Download
  42. Hack Tools 2019
  43. Pentest Tools Open Source
  44. Hack Tools For Mac
  45. Hacking Tools
  46. Best Pentesting Tools 2018
  47. Nsa Hacker Tools
  48. Hacker Tools Free
  49. Top Pentest Tools
  50. Hacking Tools For Windows Free Download
  51. Pentest Automation Tools
  52. Pentest Tools Windows
  53. Hacker Tools 2020
  54. Hacking Tools Software
  55. Install Pentest Tools Ubuntu
  56. Hack Tools Github
  57. Hackrf Tools
  58. How To Install Pentest Tools In Ubuntu
  59. Hack Tools For Mac
  60. Pentest Tools Kali Linux
  61. Pentest Box Tools Download
  62. Pentest Tools Find Subdomains
  63. Pentest Tools Android
  64. Hacking Tools For Beginners
  65. Pentest Tools Github
  66. Hacking Tools Usb
  67. Pentest Tools For Ubuntu
  68. Game Hacking
  69. Pentest Tools Android
  70. Pentest Recon Tools
  71. Game Hacking
  72. Hack Tools
  73. Pentest Tools Website Vulnerability
  74. Hacking Tools Pc
  75. How To Hack
  76. Usb Pentest Tools
  77. Hacker Tools Mac
  78. Easy Hack Tools
  79. Pentest Tools Port Scanner
  80. Hacking Tools For Pc
  81. Hacking Tools Online
  82. Blackhat Hacker Tools
  83. Hack Tools For Ubuntu
  84. Best Pentesting Tools 2018
  85. Hacker Techniques Tools And Incident Handling
  86. Wifi Hacker Tools For Windows
  87. Game Hacking
  88. Hack Tools
  89. Usb Pentest Tools
  90. Hackers Toolbox
  91. Hacker Tools Hardware
  92. Install Pentest Tools Ubuntu
  93. Hacking Tools 2019
  94. Game Hacking
  95. How To Hack
  96. Hacking Tools For Pc
  97. Hack Tools Download
  98. Hacker Tools Hardware
  99. Hacker Tools Free Download
  100. Pentest Tools Apk
  101. Tools Used For Hacking
  102. World No 1 Hacker Software
  103. New Hack Tools
  104. Hacking Apps
  105. Hack Tools For Pc
  106. Hacking Tools And Software
  107. Easy Hack Tools
  108. Physical Pentest Tools
  109. Pentest Tools Linux
  110. Pentest Tools Kali Linux
  111. Hacker Tools For Mac
  112. Hacking Tools Pc
  113. Pentest Tools Download
  114. Hacking Tools For Games
  115. Pentest Tools Apk
  116. Nsa Hack Tools
  117. Hacker Tools
  118. Game Hacking
  119. Hack Tools Download
  120. Hacking Tools For Mac
  121. Hacking Tools Github
  122. Usb Pentest Tools
  123. Hacker Tools Free Download
  124. Hacking Tools Windows
  125. Hacker Tools
  126. Pentest Tools Android
  127. Hack Rom Tools
  128. How To Make Hacking Tools
  129. Free Pentest Tools For Windows
  130. Hacker Tools Github
  131. Hacking Tools
  132. Hacking Tools Name
  133. Pentest Tools Website
  134. Hack Tools For Mac
  135. Pentest Tools List

TOP 10 HACKING MOVIES YOU SHOULD WATCH

Technology and hacking gave a new horizon to the science fiction movies. As hacking is getting common and every online thing is at risk whether it's 10% or 90%, not a system is 100% secure over the internet. Every day new security holes are getting discovered. So, now most of the sci-fi movies have the tech and hack stuff to grow awareness in everybody's mind about the online privacy and risk to their information. Here I am sharing top 10 hacking movies that worth a watch.

TOP 10 HACKING MOVIES

Here I have listed top 10 hacking movies that you should watch.

1. HACKERS (1995)

In Hackers, Angelina Jolie and Jonny Lee Miller portray two youthful and hip hackers. Miller portrays a hacker who got caught as a very young child at an age of 11 years after crashing thousands of computers and has been sentenced to zero computer access until his 18th birthday.

2. LIVE FREE OR DIE HARD (2007)

Live Free or Die Hard (also known as Die Hard 4 and released as Die Hard 4.0 outside North America) is a 2007 American action film, and the fourth in the Die Hard film series depicts a scenario where a hacker played by Timothy Olyphant (of Justified fame) takes down nearly the entire U.S. infrastructure in an attempt to transfer trillions of dollars from the Federal Reserve to his account. This movie gives a complete idea of how actually these blackhat hackers operate.

3. EAGLE EYE (2008)

In this movie, two people get a call from an unknown number by a woman. They get a task on the phone that if they don't follow the phone call they would die. This movie displays supercomputer hack on all networks and military networks. This is just an amazing movie on how artificial intelligence computer hacks our real life for bad motives.

4. ALGORITHM (2014)

The film 'Algorithm' tracks the travails of Will, who is the freelance computer hacker who hacks into a top-secret government contractor agency and downloads all their recently developed programs." You can see the full movie below

5. WARGAMES (1983)

The film features David Lightman (Broderick), a young high school student hacker who accidentally hacks into a military supercomputer and starts the countdown to World War III.

6. THE MATRIX (1999)

This is one of the greatest science fiction movies. In this movie, reality, as perceived by most humans, is actually a simulated reality called "the Matrix", created by machines to subdue the human population, while their bodies' heat and electrical activity are used as an energy source.
A character named "Neo", who is a computer Hacker, learns this truth and is drawn into a rebellion against the machines, which involves other people who have been freed from the "dream world". The Matrix franchise is a trilogy movie series.

7. TAKEDOWN (2000)

This movie is based on famous computer U.S. hacker Kevin David Mitnick. Based upon the book and written by his nemesis, Tsutomu Shimomura, the story tends to glorify Shimomura. Mitnick operated in the 1980s and '90s and eventually went to prison for a couple of years. Now, he is a highly paid IT security consultant, speaker, and writer.

8. BLACKHAT (2015)

Blackhat is newly released movie by Chris Hemsworth. In this movie, hackers hack the Chinese nuclear power plant to start a nuclear reaction. Simultaneously, they also hack the stock exchange and steal millions of dollars from the bank. This movie shows how a black hat hackers threaten governments.

9. THE ITALIAN JOB (2003)

Although the MINI Coopers are really the stars of The Italian Job (a remake of the 1969 film of the same name), Seth Green plays Lyle, a hacker among a group of elite thieves, who is able to manipulate traffic signals, among other devices, that make this grand theft possible.

10. UNTRACEABLE (2008)

This film involves a serial killer who rigs contraptions that kill his victims based on the number of hits received by a website KillWithMe.com that features a live streaming video of the victim. Millions of people log on, hastening the victims' deaths.

There may be more exciting hacking movies but I found these top 10 hacking movies that you should watch for once.
You can also find out the top 5 most dangerous hackers in the real world living.
Related links

USE OF CRYPTOGRAPHY IN HACKING

WHAT IS CRYPTOGRAPHY?

The Cryptography is derived from the Greek words "Kryptos". This is the study of secure communication techniques that allow only the sender and recipient of a message to view it's contents of transforming information into nonhuman readable form or vice versa is called cryptography.

As we know that information plays a vital role in running of any business and organizations etc, sensitive details in the wrong hands can leads to loss of business.

Cryptography is the science of ciphering and deciphering messages.To secure communication organizations use cryptology to cipher information .

                            Or

Cryptography is a method of protecting information and communication through the use of codes so that only those whom the information is intended can read and process it.

In Computer Science, Cryptography refers to secure information and communication techniques derived from mathematical concepts , a set of rule based calculations called algorithm to transform message in ways the hard to readable for human.

This is one of the secure way of communications for a hacker with the help of virtual private network(VPN) like Tor Browser which is also very helpful to change the IP Address(Location of the sender ) for illegal purpose to perform crime in cyberspace . I will discuss in brief about the VPN .



How to Encrypt and Decrypt the text in Cryptography?

Open this website with the help of internert surfing for encryption-"http://wwwmd5online.org" 

Open the link for Decrypt the code text-"http://www.md5online.org/md5-decrypt.html"

Type whatever you want for encryption and it will crypt in the code form, copy that code and forward to the intended person whom you want for secure communication and then he/she will Decrypt in the real form.




               
       







Related word