WBWiktoria Blomgren Strandberginpentesting-dvwa.hashnode.dev00Weak Session IDs in DVWA5d ago · 16 min read · 1 Introduction In this post, the Weak Session IDs vulnerability in the Damn Vulnerable Web Application (DVWA) is described. The objective for attacks on all levels is to work out how the ID is generatJoin discussion
EEEmma Engströminpentesting-dvwa.hashnode.dev00DOM-Based XSS in DVWA Mar 29 · 14 min read · Introduction This post examines a DOM-based cross-site scripting (XSS) vulnerability in the Damn Vulnerable Web Application (DVWA) and demonstrates how it can be exploited to achieve client-side code Join discussion
WBWiktoria Blomgren Strandberginpentesting-dvwa.hashnode.dev00JavaScript Attacks in DVWAMar 26 · 21 min read · 1 Introduction In this post, the JavaScript Attacks vulnerability in the Damn Vulnerable Web Application (DVWA) is described. The objective for attacks on all levels is to analyse and manipulate the JJoin discussion
WBWiktoria Blomgren Strandberginpentesting-dvwa.hashnode.dev00API Security in DVWAMar 21 · 29 min read · 1 Introduction In this post, the API Security vulnerability in the Damn Vulnerable Web Application (DVWA) is described. The objective for attacks across all security levels is to exploit weaknesses inJoin discussion
EEEmma Engströminpentesting-dvwa.hashnode.dev00Reflected XSS in DVWAMar 19 · 14 min read · Introduction This post demonstrates how a reflected Cross-Site Scripting (XSS) vulnerability in the Damn Vulnerable Web Application (DVWA) can be exploited to execute malicious client-side scripts in Join discussion
WBWiktoria Blomgren Strandberginpentesting-dvwa.hashnode.dev00CSP Bypass in DVWAMar 14 · 16 min read · 1 Introduction In this post, the Content Security Policy (CSP) Bypass vulnerability in the Damn Vulnerable Web Application (DVWA) is described. The objective for attacks on all levels is to bypass theJoin discussion
EEEmma Engströminpentesting-dvwa.hashnode.dev00File Upload in DVWAMar 12 · 15 min read · Introduction This post demonstrates how a file upload vulnerability in the Damn Vulnerable Web Application (DVWA) can be exploited to achieve remote code execution. The objective of the attack is to uJoin discussion
WBWiktoria Blomgren Strandberginpentesting-dvwa.hashnode.dev00Authorisation Bypass in DVWAMar 8 · 13 min read · 1 Introduction In this post, the Authorisation Bypass vulnerability in the Damn Vulnerable Web Application (DVWA) is described. The objective for attacks on all levels is to identify any areas where aJoin discussion
EEEmma Engströminpentesting-dvwa.hashnode.dev00Brute Force in DVWAMar 8 · 16 min read · Introduction This post explores the brute-force vulnerability in the Damn Vulnerable Web Application (DVWA). The objective of the attack is to gain unauthorised access to the application by discoverinJoin discussion
WBWiktoria Blomgren Strandberginpentesting-dvwa.hashnode.dev00SQL Injection in DVWAMar 6 · 21 min read · 1 Introduction In this post, the SQL Injection vulnerability in the Damn Vulnerable Web Application (DVWA) is described. The objective for attacks on all levels is to extract user login credentials. Join discussion