From a4dbe0e5dc2f1563a9397bce5faf2dd5729c0f01 Mon Sep 17 00:00:00 2001 From: Louis Date: Fri, 8 Dec 2023 11:06:11 +0100 Subject: [PATCH] feat: :truck: Create readme for each categories and clean repo --- CSP Bypass/README.md | 11 +++++++++++ CSP Bypass/low.js | 2 -- Command Injection/README.md | 10 ++++++++++ File injection/README.md | 8 ++++++++ Javascript/{low.js => README.md} | 11 ++++++++++- README.md | 9 +++++++++ SQL Injection/README.md | 7 +++++++ SQL Injection/low.txt | 1 - XSS (DOM)/README.md | 8 ++++++++ XSS (DOM)/low.txt | 1 - XSS (Stored)/README.md | 9 +++++++++ 11 files changed, 72 insertions(+), 5 deletions(-) create mode 100644 CSP Bypass/README.md delete mode 100644 CSP Bypass/low.js create mode 100644 Command Injection/README.md create mode 100644 File injection/README.md rename Javascript/{low.js => README.md} (50%) create mode 100644 README.md create mode 100644 SQL Injection/README.md delete mode 100644 SQL Injection/low.txt create mode 100644 XSS (DOM)/README.md delete mode 100644 XSS (DOM)/low.txt create mode 100644 XSS (Stored)/README.md diff --git a/CSP Bypass/README.md b/CSP Bypass/README.md new file mode 100644 index 0000000..6bf2eef --- /dev/null +++ b/CSP Bypass/README.md @@ -0,0 +1,11 @@ +# Low +```javascript +console.log("Welcome the the hacking word"); +``` +> Upload this script to pastebin + +# Medium +> In progress + +# High +> In progress \ No newline at end of file diff --git a/CSP Bypass/low.js b/CSP Bypass/low.js deleted file mode 100644 index 20f03b6..0000000 --- a/CSP Bypass/low.js +++ /dev/null @@ -1,2 +0,0 @@ -console.log("Welcome the the hacking word"); -// Export this script to pastebin \ No newline at end of file diff --git a/Command Injection/README.md b/Command Injection/README.md new file mode 100644 index 0000000..a786274 --- /dev/null +++ b/Command Injection/README.md @@ -0,0 +1,10 @@ +# Low +```bash +127.0.0.1 && ls +``` + +# Medium +> In progress + +# High +> In progress diff --git a/File injection/README.md b/File injection/README.md new file mode 100644 index 0000000..38bda9d --- /dev/null +++ b/File injection/README.md @@ -0,0 +1,8 @@ +# Low +Just upload the file `file-inject-low.png` and you will get the flag. + +# Medium +> In progress + +# High +> In progress \ No newline at end of file diff --git a/Javascript/low.js b/Javascript/README.md similarity index 50% rename from Javascript/low.js rename to Javascript/README.md index 7e8bdff..ac3f81a 100644 --- a/Javascript/low.js +++ b/Javascript/README.md @@ -1,3 +1,12 @@ +# Low +```javascript const phrase = document.getElementById("phrase").value; const token = md5(rot13(phrase)); -console.log(token); \ No newline at end of file +console.log(token); +``` + +# Medium +> In progress + +# High +> In progress \ No newline at end of file diff --git a/README.md b/README.md new file mode 100644 index 0000000..2a69f62 --- /dev/null +++ b/README.md @@ -0,0 +1,9 @@ +# EPITA-DVWA + +My journey through application vulnerability using Damn Vulnerable Web Application (DVWA). + +## What is DVWA? +DVWA is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment. + +## How this repository is organized? +This repository is organized by the different vulnerabilities that I have found in DVWA. Each vulnerability has its own folder and contains a README.md file that explains the vulnerability and how to exploit it. \ No newline at end of file diff --git a/SQL Injection/README.md b/SQL Injection/README.md new file mode 100644 index 0000000..901e82f --- /dev/null +++ b/SQL Injection/README.md @@ -0,0 +1,7 @@ +# Low +Full url : http://localhost:4280/vulnerabilities/sqli/?id=test%27+OR+1=1--%27&Submit=Submit# + +# Medium +> In progress +# High +> In progress \ No newline at end of file diff --git a/SQL Injection/low.txt b/SQL Injection/low.txt deleted file mode 100644 index 03116cf..0000000 --- a/SQL Injection/low.txt +++ /dev/null @@ -1 +0,0 @@ -Full url : http://localhost:4280/vulnerabilities/sqli/?id=test%27+OR+1=1--%27&Submit=Submit# \ No newline at end of file diff --git a/XSS (DOM)/README.md b/XSS (DOM)/README.md new file mode 100644 index 0000000..74acb03 --- /dev/null +++ b/XSS (DOM)/README.md @@ -0,0 +1,8 @@ +# Low +Full URL : [http://localhost:4280/vulnerabilities/xss_d/?default=French]() + +# Medium +> In progress + +# High +> In progress \ No newline at end of file diff --git a/XSS (DOM)/low.txt b/XSS (DOM)/low.txt deleted file mode 100644 index 4700b3c..0000000 --- a/XSS (DOM)/low.txt +++ /dev/null @@ -1 +0,0 @@ -http://localhost:4280/vulnerabilities/xss_d/?default=French \ No newline at end of file diff --git a/XSS (Stored)/README.md b/XSS (Stored)/README.md new file mode 100644 index 0000000..19fa1d3 --- /dev/null +++ b/XSS (Stored)/README.md @@ -0,0 +1,9 @@ +# Low +```javascript + +```` +# Medium +> In progress + +# High +> In progress \ No newline at end of file