This repository contains a series of my writeups for DVWA (Damn Vulnerable Web Application), a purposefully insecure web application used to practice and learn various web security vulnerabilities.
These walkthroughs were done in a lab environment using:
- Kali Linux
- Both self-hosted DVWA & DVWA in Metasploitable 2
Each writeup contains:
- Step-by-step exploitation
- Tool usage
- Screenshots
- Observations across Low, Medium, and High difficulty levels
- Skills and techniques learned
| Challenges | Difficulty | Status |
|---|---|---|
| Brute Force | Low / Medium / High | ✅ Completed |
| Command Execution | Low / Medium / High | ✅ Completed |
| Cross Site Request Forgery | Low / Medium / High | ✅ Completed |
| File Inclusion | Low / Medium / High | ✅ Completed |
| File Upload | Low / Medium / High | ✅ Completed |
| Insecure CAPTCHA | Low / Medium / High | ✅ Completed |
| SQL Injection | Low / Medium / High | ✅ Completed |
| Blind SQL Injection | Low / Medium / High | ✅ Completed |
| Weak Session IDs | Low / Medium / High | ✅ Completed |
| DOM XSS | Low / Medium / High | ✅ Completed |
| Reflected XSS | Low / Medium / High | ✅ Completed |
| Stored XSS | Low / Medium / High | ✅ Completed |
| CSP Bypass | Low / Medium / High | ✅ Completed |
| JavaScript | Low / Medium / High | ✅ Completed |
| Authentication Bypass | Low / Medium / High | ✅ Completed |
| Open HTTP Redirect | Low / Medium / High | ✅ Completed |
| Cryptography Problems | Low / Medium / High | ✅ Completed |
| API Security | Low / Medium / High | ✅ Completed |
- Exploitation of common web vulnerabilities (e.g., SQLi, XSS, CSRF, File Inclusion) across different difficulty levels with hands-on testing
- Manual and automated testing using Burp Suite, including request manipulation, repeater, intruder, and proxy tools
- Client-side and server-side analysis using browser developer tools and JavaScript debugging to uncover hidden logic or bypasses
- Enumeration and abuse of misconfigured APIs and cryptographic implementations, including IDORs, insecure JWTs, and padding oracles
- Practical understanding of real-world attack chains, from reconnaissance to privilege escalation and persistence
- All activities were performed in a safe lab environment
- Educational purposes only