diff --git a/CSP Bypass/README.md b/CSP Bypass/README.md new file mode 100644 index 0000000..6bf2eef --- /dev/null +++ b/CSP Bypass/README.md @@ -0,0 +1,11 @@ +# Low +```javascript +console.log("Welcome the the hacking word"); +``` +> Upload this script to pastebin + +# Medium +> In progress + +# High +> In progress \ No newline at end of file diff --git a/CSP Bypass/low.js b/CSP Bypass/low.js deleted file mode 100644 index 20f03b6..0000000 --- a/CSP Bypass/low.js +++ /dev/null @@ -1,2 +0,0 @@ -console.log("Welcome the the hacking word"); -// Export this script to pastebin \ No newline at end of file diff --git a/Command Injection/README.md b/Command Injection/README.md new file mode 100644 index 0000000..a786274 --- /dev/null +++ b/Command Injection/README.md @@ -0,0 +1,10 @@ +# Low +```bash +127.0.0.1 && ls +``` + +# Medium +> In progress + +# High +> In progress diff --git a/File injection/README.md b/File injection/README.md new file mode 100644 index 0000000..38bda9d --- /dev/null +++ b/File injection/README.md @@ -0,0 +1,8 @@ +# Low +Just upload the file `file-inject-low.png` and you will get the flag. + +# Medium +> In progress + +# High +> In progress \ No newline at end of file diff --git a/Javascript/low.js b/Javascript/README.md similarity index 50% rename from Javascript/low.js rename to Javascript/README.md index 7e8bdff..ac3f81a 100644 --- a/Javascript/low.js +++ b/Javascript/README.md @@ -1,3 +1,12 @@ +# Low +```javascript const phrase = document.getElementById("phrase").value; const token = md5(rot13(phrase)); -console.log(token); \ No newline at end of file +console.log(token); +``` + +# Medium +> In progress + +# High +> In progress \ No newline at end of file diff --git a/README.md b/README.md new file mode 100644 index 0000000..2a69f62 --- /dev/null +++ b/README.md @@ -0,0 +1,9 @@ +# EPITA-DVWA + +My journey through application vulnerability using Damn Vulnerable Web Application (DVWA). + +## What is DVWA? +DVWA is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment. + +## How this repository is organized? +This repository is organized by the different vulnerabilities that I have found in DVWA. Each vulnerability has its own folder and contains a README.md file that explains the vulnerability and how to exploit it. \ No newline at end of file diff --git a/SQL Injection/README.md b/SQL Injection/README.md new file mode 100644 index 0000000..901e82f --- /dev/null +++ b/SQL Injection/README.md @@ -0,0 +1,7 @@ +# Low +Full url : http://localhost:4280/vulnerabilities/sqli/?id=test%27+OR+1=1--%27&Submit=Submit# + +# Medium +> In progress +# High +> In progress \ No newline at end of file diff --git a/SQL Injection/low.txt b/SQL Injection/low.txt deleted file mode 100644 index 03116cf..0000000 --- a/SQL Injection/low.txt +++ /dev/null @@ -1 +0,0 @@ -Full url : http://localhost:4280/vulnerabilities/sqli/?id=test%27+OR+1=1--%27&Submit=Submit# \ No newline at end of file diff --git a/XSS (DOM)/README.md b/XSS (DOM)/README.md new file mode 100644 index 0000000..74acb03 --- /dev/null +++ b/XSS (DOM)/README.md @@ -0,0 +1,8 @@ +# Low +Full URL : [http://localhost:4280/vulnerabilities/xss_d/?default=French]() + +# Medium +> In progress + +# High +> In progress \ No newline at end of file diff --git a/XSS (DOM)/low.txt b/XSS (DOM)/low.txt deleted file mode 100644 index 4700b3c..0000000 --- a/XSS (DOM)/low.txt +++ /dev/null @@ -1 +0,0 @@ -http://localhost:4280/vulnerabilities/xss_d/?default=French \ No newline at end of file diff --git a/XSS (Stored)/README.md b/XSS (Stored)/README.md new file mode 100644 index 0000000..19fa1d3 --- /dev/null +++ b/XSS (Stored)/README.md @@ -0,0 +1,9 @@ +# Low +```javascript + +```` +# Medium +> In progress + +# High +> In progress \ No newline at end of file