Skip to content

Latest commit

 

History

History
96 lines (80 loc) · 3.03 KB

File metadata and controls

96 lines (80 loc) · 3.03 KB

bWAPP docker

使用 Docker 部署的 bWAPP, build 后直接使用即可。系统基于 ubuntu 14.04 版本, 服务器采用 apache2 + mysql + php5 搭建。

Changelog

2017-01-05

  • 添加 supervisor 服务监控

如何使用

  1. 创建 docker 镜像(image)
# 这里的 bwapp 就是镜像名称
$ docker build -t bwapp .
  1. 创建 docker 容器(container)

2.1 交互式

# 交互创建一个容器, 本容器 80 端口映射到宿主机的 8080 端口上
$ docker run -it --name bwapp_vul -p 0.0.0.0:8080:80 bwapp /bin/bash
$ /usr/bin/supervisord

2.2 后台运行

# 交互创建一个容器, 本容器 80 端口映射到宿主机的 8080 端口上
$ docker run -d --name bwapp_vul -p 0.0.0.0:8080:80 bwapp

配置说明

  • mysql 账号

root/bug

  • apache2 工作目录

/var/www/html/

  • bWAPP 账号

bee/bug

bWAPP 特性

  • SQL, HTML, iFrame, SSI, OS Command, PHP, XML, XPath, LDAP and SMTP injections
  • Blind SQL injection and Blind OS Command injection
  • Boolean-based and time-based Blind SQL injections
  • Drupal SQL injection (Drupageddon)
  • AJAX and Web Services issues (JSON/XML/SOAP)
  • Heartbleed vulnerability (OpenSSL) + detection script included
  • Shellshock vulnerability (CGI)
  • Cross-Site Scripting (XSS) and Cross-Site Tracing (XST)
  • phpMyAdmin BBCode Tag XSS
  • Cross-Site Request Forgery (CSRF)
  • Information disclosures: favicons, version info, custom headers,...
  • Unrestricted file uploads and backdoor files
  • Old, backup & unreferenced files
  • Authentication, authorization and session management issues
  • Password and CAPTCHA attacks
  • Insecure DistCC, FTP, NTP, Samba, SNMP, VNC, WebDAV configurations
  • Arbitrary file access with Samba
  • Directory traversals and unrestricted file access
  • Local and remote file inclusions (LFI/RFI)
  • Server Side Request Forgery (SSRF)
  • XML External Entity attacks (XXE)
  • Man-in-the-Middle attacks (HTTP/SMTP)
  • HTTP parameter pollution and HTTP verb tampering
  • Denial-of-Service (DoS) attacks: Slow Post, SSL-Exhaustion, XML Bomb,...
  • POODLE vulnerability
  • BREACH/CRIME/BEAST SSL attacks
  • HTML5 ClickJacking and web storage issues
  • Insecure iFrame (HTML5 sandboxing)
  • Insecure direct object references (parameter tampering)
  • Insecure cryptographic storage
  • Cross-Origin Resource Sharing (CORS) issues
  • Cross-domain policy file attacks (Flash/Silverlight)
  • Local privilege escalations: udev, sendpage
  • Cookie and password reset poisoning
  • Host header attacks: password reset poisoning en cache pollutions
  • PHP CGI remote code execution
  • Dangerous PHP Eval function
  • Local and remote buffer overflows (BOF)
  • phpMyAdmin and SQLiteManager vulnerabilities
  • Nginx web server vulnerabilities
  • HTTP response splitting, unvalidated redirects and forwards
  • WSDL SOAP vulnerabilities
  • Form-based authentication and No-authentication modes
  • Active Directory LDAP integration
  • Fuzzing possibilities
  • and much more...
  • HINT: download our bee-box VM > it has ALL necessary extensions
  • bee-box is compatible with VMware and VirtualBox!
  • Enjoy it little bees ;)