Web Application Penetration Testing with bWAPP

P { margin-bottom: 0.08in; direction: ltr; color: rgb(0, 0, 0); widows: 2; orphans: 2; }A:link { color: rgb(0, 0, 255); }

application security is today’s most overlooked aspect of securing
the infrastructure. These days, hackers are concentrating their
efforts on our precious websites and web applications. Why? Websites
and web applications are an attractive target for cyber criminality
and hacktivism because they are 24/7 available via the Internet.
Mission-critical business applications, containing sensitive data,
are often published on the Internet through our web applications. In
addition, traditional firewalls and SSL provide no protection against
web attacks, and systems engineers know little about these
sophisticated application-level attacks…

definitely time to improve our web security! Defense is needed…
downloading and playing with bWAPP can be a first start… Wanted:
or a buggy web application, is a deliberately insecure web
application. It helps security enthusiasts, systems engineers,
developers and students to discover and to prevent web
vulnerabilities. bWAPP prepares to conduct successful web application
penetration testing and ethical hacking projects. It is made for
educational purposes.

P { margin-bottom: 0.08in; direction: ltr; color: rgb(0, 0, 0); widows: 2; orphans: 2; }A:link { color: rgb(0, 0, 255); }

makes bWAPP so unique? Well, it has over 60 web bugs! bWAPP covers
all major known web vulnerabilities, including all risks from the
OWASP Top 10 project.
OWASP Top 10 provides an accurate snapshot of the current threat
landscape in application security and reflects the collaborative
efforts and insights of thousands of accomplished security engineers.
To reflect the ongoing changes in technology and common online
business practices, the list is periodically updated.]
of the vulnerabilities included in bWAPP:
  • Injection
    vulnerabilities like SQL, XML/XPath, LDAP, HTML, SSI, Command and
    SMTP injection
  • Cross-Site
    Scripting (XSS), Cross-Site Tracing (XST) and Cross-Site Request
    Forgery (CSRF)
  • AJAX
    and Web Services issues (JSON/XML/SOAP)
  • Malicious,
    unrestricted file uploads and NSA backdoor files 😉
  • Authentication,
    authorization and session management issues
  • Arbitrary
    file access, directory traversals, local and remote file inclusions
  • Configuration
    issues: Man-in-the-Middle, cross-domain policy file, information
  • HTTP
    parameter pollution and HTTP response splitting
  • Denial-of-Service
    (DoS) attacks, insecure WebDAV and FTP configurations
  • HTML5
    ClickJacking, cross-origin resource sharing (CORS) and web storage
  • Unvalidated
    redirects and forwards
  • Parameter
    tampering, cookie poisoning and insecure cryptographic storage
  • And
    much more…
is a PHP application that uses a MySQL database. It can be hosted on
Linux, Windows and Mac with Apache/IIS and MySQL. It can also be
installed with WAMP or XAMPP. Another possibility is to download the
is a custom Linux VMware virtual
machine pre-installed with bWAPP. It is compatible with VMware
Player, Workstation, Fusion, and with Oracle VirtualBox. It requires
zero installation! bee-box gives you several ways to hack and deface
the bWAPP website. Currently there are 10 website defacement
possibilities! It’s even possible to hack the bee-box to get full
root access, using a local privilege escalation exploit… With
bee-box you have the opportunity to explore, and exploit, all bWAPP
vulnerabilities! Hacking, defacing and exploiting without going
to jail… how cool is that?
can download bWAPP from here.
You can download bee-box from here.
are part of the ‘ITSEC Games’ project. The ‘ITSEC Games’ are
a fun approach to IT security education. IT security, ethical
hacking, training and fun… all mixed together!

P { margin-bottom: 0.08in; direction: ltr; color: rgb(0, 0, 0); widows: 2; orphans: 2; }A:link { color: rgb(0, 0, 255); }

a look at our ‘What is bWAPP?
introduction guide, including free training materials and exercises.
There is also a free cheat sheet available… Follow us on Twitter,
and receive this cheat sheet, updated on a regular basis, including
the latest hacks and hardening tweaks.
Have fun with
this free and open source project!
the most powerful weapon which we can use to secure the world.”
Cheers, Malik Mesellem (@MME_IT)
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Exploit Heartbleed using Metasploit in Kali Linux

Heartbleed vulnerability (registered as CVE-2014-0160) is a security bug present in the older version of OpenSSL cryptographic library. OpenSSL is a cryptographic toolkit used...

How to Install Parrot Security OS on VirtualBox in 2020

Parrot Security OS is a free GNU/LINUX distribution, released on 10th April 2013. It is a mixture of Kali Linux and Frozenbox OS, aims to...

How to Install Kali Linux on VirtualBox [Windows Host] in 2020

Kali Linux is a Debian based Linux distribution, released on the 13th March 2013 as a complete rebuild of BackTrack Linux. It is one of...

Acunetix v13 Release Introduces Groundbreaking Innovations

The newest release of the Acunetix Web Vulnerability Scanner further improves performance and premieres best-of-breed technologies London, United Kingdom – February 5, 2019 – Acunetix,...