Skip to content

jehy-security/dvws

 
 

Repository files navigation

Damn Vulnerable Web Services

Damn Vulnerable Web Services is a vulnerable testing environment that can be used to learn real world web service vulnerabilities. The aim of this project is to aid security professionals in testing their skills and tools in a legal environment.

DVWS

This application is designed to exploit the following vulnerabilities.

  • WSDL Enumeration
  • XML External Entity Injection
  • XML Bomb Denial-of-Service
  • XPATH Injection
  • WSDL Scanning
  • Cross Site-Tracing
  • OS Command Injection
  • Server Side Request Forgery
  • REST API SQL Injection

Instructions

DVWS can be used with a XAMPP setup. XAMPP is a free and open source cross-platform web server solution which mainly consists of an Apache Web Server and MySQL database. To setup, download and install the XAMPP setup first. Next, download the dvws folder and copy the folder to your htdocs directory. Lastly, Setup or reset the database by going to http://localhost/dvws/about/instructions.php

Note: Some vulnerabilities such as Command Injection might not work on Windows due to incompatibility.

Disclaimer

Do not host this application on live or production environment.

Copyright

This work is licensed under GNU GENERAL PUBLIC LICENSE Version 3 To view a copy of this license, visit http://www.gnu.org/licenses/gpl-3.0.txt

To do list

  • JSON Hijacking
  • SOAP Injection
  • XML Injection

About

Damn Vulnerable Web Services

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • PHP 99.2%
  • Other 0.8%