Skip to main content

One publication tagged with "dvwa"

View all tags

New OSDO Web Application Security Section

· 2 min reading time
Rafael Otal Simal
Maintainer of OSDO

Header news

We are excited to announce a new section on the OSDO blog dedicated to web application security! In this new series of articles, we will explore the different types of attacks that can affect web applications and how to defend against them using the Damn Vulnerable Web Application (DVWA) training software.

What is DVWA?

DVWA, or Damn Vulnerable Web Application, is a web application created for the purpose of helping security professionals test their skills and tools in a legal and controlled environment. It is an invaluable tool for learning about web application vulnerabilities and how to mitigate them.

Challenges solved

So far, we have solved and documented the following challenges in DVWA:

  • **Command Injection: Learn how attackers can execute system commands on the server and how to prevent this type of attack.
  • CSRF (Cross-Site Request Forgery): Discover how attackers can perform actions on behalf of authenticated users without their consent.
  • File Upload: Explores the risks associated with file upload and measures to secure this functionality.
  • **SQL Injection: Understand how attackers can manipulate SQL queries to access sensitive information and how to protect your application.
  • XSS (Cross-Site Scripting): Learn about the different forms of script injection in web pages and strategies to prevent these attacks.

What can you expect?

Each extension of the new attacks section will include a detailed explanation of the attack, how it can be carried out, practical examples using DVWA and, most importantly, how to defend your web application against these attacks. Our goal is to provide our readers with practical and applicable knowledge that will improve the security of their applications.

Don't miss our next posts and stay up to date with the best practices in web application security!

We hope you enjoy this new section and find it very useful!