This part covers several aspects of application security - mainly web application security. For this, we will use DVWA - Damn Vulnerable Web Application.
Introduction
Setup
Web Applications Vulnerabilities Testing
Brute-force attacks
Command Injection
File inclusion
File upload
SQL Injection
SQL Injection (Blind)
XSS (Reflected)
XSS (Stored)
Last updated 2 years ago