Web Application Penetration Testing with bWAPP

P { margin-bottom: 0.08in; direction: ltr; color: rgb(0, 0, 0); widows: 2; orphans: 2; }A:link { color: rgb(0, 0, 255); }

application security is today’s most overlooked aspect of securing
the infrastructure. These days, hackers are concentrating their
efforts on our precious websites and web applications. Why? Websites
and web applications are an attractive target for cyber criminality
and hacktivism because they are 24/7 available via the Internet.
Mission-critical business applications, containing sensitive data,
are often published on the Internet through our web applications. In
addition, traditional firewalls and SSL provide no protection against
web attacks, and systems engineers know little about these
sophisticated application-level attacks…

definitely time to improve our web security! Defense is needed…
downloading and playing with bWAPP can be a first start… Wanted:
or a buggy web application, is a deliberately insecure web
application. It helps security enthusiasts, systems engineers,
developers and students to discover and to prevent web
vulnerabilities. bWAPP prepares to conduct successful web application
penetration testing and ethical hacking projects. It is made for
educational purposes.

P { margin-bottom: 0.08in; direction: ltr; color: rgb(0, 0, 0); widows: 2; orphans: 2; }A:link { color: rgb(0, 0, 255); }

makes bWAPP so unique? Well, it has over 60 web bugs! bWAPP covers
all major known web vulnerabilities, including all risks from the
OWASP Top 10 project.
OWASP Top 10 provides an accurate snapshot of the current threat
landscape in application security and reflects the collaborative
efforts and insights of thousands of accomplished security engineers.
To reflect the ongoing changes in technology and common online
business practices, the list is periodically updated.]
of the vulnerabilities included in bWAPP:
  • Injection
    vulnerabilities like SQL, XML/XPath, LDAP, HTML, SSI, Command and
    SMTP injection
  • Cross-Site
    Scripting (XSS), Cross-Site Tracing (XST) and Cross-Site Request
    Forgery (CSRF)
  • AJAX
    and Web Services issues (JSON/XML/SOAP)
  • Malicious,
    unrestricted file uploads and NSA backdoor files 😉
  • Authentication,
    authorization and session management issues
  • Arbitrary
    file access, directory traversals, local and remote file inclusions
  • Configuration
    issues: Man-in-the-Middle, cross-domain policy file, information
  • HTTP
    parameter pollution and HTTP response splitting
  • Denial-of-Service
    (DoS) attacks, insecure WebDAV and FTP configurations
  • HTML5
    ClickJacking, cross-origin resource sharing (CORS) and web storage
  • Unvalidated
    redirects and forwards
  • Parameter
    tampering, cookie poisoning and insecure cryptographic storage
  • And
    much more…
is a PHP application that uses a MySQL database. It can be hosted on
Linux, Windows and Mac with Apache/IIS and MySQL. It can also be
installed with WAMP or XAMPP. Another possibility is to download the
is a custom Linux VMware virtual
machine pre-installed with bWAPP. It is compatible with VMware
Player, Workstation, Fusion, and with Oracle VirtualBox. It requires
zero installation! bee-box gives you several ways to hack and deface
the bWAPP website. Currently there are 10 website defacement
possibilities! It’s even possible to hack the bee-box to get full
root access, using a local privilege escalation exploit… With
bee-box you have the opportunity to explore, and exploit, all bWAPP
vulnerabilities! Hacking, defacing and exploiting without going
to jail… how cool is that?
can download bWAPP from here.
You can download bee-box from here.
are part of the ‘ITSEC Games’ project. The ‘ITSEC Games’ are
a fun approach to IT security education. IT security, ethical
hacking, training and fun… all mixed together!

P { margin-bottom: 0.08in; direction: ltr; color: rgb(0, 0, 0); widows: 2; orphans: 2; }A:link { color: rgb(0, 0, 255); }

a look at our ‘What is bWAPP?
introduction guide, including free training materials and exercises.
There is also a free cheat sheet available… Follow us on Twitter,
and receive this cheat sheet, updated on a regular basis, including
the latest hacks and hardening tweaks.
Have fun with
this free and open source project!
the most powerful weapon which we can use to secure the world.”
Cheers, Malik Mesellem (@MME_IT)
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...