This project documents a full security assessment of the Damn Vulnerable Web Application (DVWA) in a controlled lab environment.
The goal was to simulate real-world penetration testing engagements, identify vulnerabilities, and provide actionable remediation steps.
- Identify security vulnerabilities following the OWASP Top 10 methodology.
- Practice and demonstrate professional penetration testing skills.
- Produce a business-friendly audit report suitable for client deliverables.
- OWASP ZAP β Automated and manual vulnerability scanning
- Burp Suite (Community Edition) β Intercepting proxy & manual exploitation
- Nmap β Network discovery and port scanning
- Nikto β Web server scanning
- Browser Developer Tools β Manual inspection and testing
Testing followed a hybrid manual + automated approach:
- Reconnaissance & Enumeration
- Automated Scanning
- Manual Exploitation
- Proof of Concept Documentation
- Remediation Recommendations
- SQL Injection (Critical) β Login bypass using unsanitized input.
- Reflected XSS (High) β Arbitrary JavaScript execution via search parameter.
- Cross-Site Request Forgery (Medium) β Lack of CSRF tokens in sensitive requests.
- (Additional vulnerabilities included in the report.)
- DVWA_Security_Audit_Report.pdf β Full consulting-style security report.
- /screenshots/ β Visual proof of exploitation.
- /tools_used.md β Detailed tool usage documentation.
β Disclaimer: This project was conducted in a local lab environment on an intentionally vulnerable application.
Do not attempt these techniques on systems without explicit authorization.