zhaojp0 2019-06-21
DVWA ( Dam Vulnerable Web Application ) DVWA 是用 PHP + Mysql 编写的一套用于常规 WEB 漏洞教学和检测的WEB脆弱性测试程序。包含了 SQL 注入、 XSS 、盲注等常见的一些安全漏洞。Kali 已自带了平台所需的环境,所以搭建非常简单。
service mysql start
运行 mysql -u root
连接 MySQL 并设置 MySQL root 密码
mysql -u root Welcome to the MariaDB monitor. Commands end with ; or \g. Your MariaDB connection id is 43 Server version: 10.1.21-MariaDB-5+b1 Debian 9.0 Copyright (c) 2000, 2016, Oracle, MariaDB Corporation Ab and others. Type 'help;' or '\h' for help. Type '\c' to clear the current input statement. MariaDB [(none)]> use mysql \\使用数据库 mysql Reading table information for completion of table and column names You can turn off this feature to get a quicker startup with -A Database changed MariaDB [mysql]> update user set password=PASSWORD('xxxxxx') where User='root'; \\更改 root 密码为 xxxxxx Query OK, 4 rows affected (0.00 sec) Rows matched: 4 Changed: 4 Warnings: 0 MariaDB [mysql]> flush privileges; \\刷新 MySQL 的系统权限相关表 Query OK, 0 rows affected (0.00 sec) MariaDB [mysql]> create database dvwa; \\创建数据库 dvwa Query OK, 1 row affected (0.00 sec) MariaDB [mysql]> quit \\退出 Bye
GD 支持
apt-get install php7.0-gd
编辑 /etc/php/7.0/apache2/php.ini 修改 824 行 allow_url_include = Off
为 allow_url_include = On
保存退出
vim /etc/php/7.0/apache2/php.ini
service apache2 start
wget https://github.com/ethicalhack3r/DVWA/archive/master.zip
mv master.zip /var/www/html cd /var/www/html unzip master.zip mv DVWA-master dvwa chown www-data:www-data /var/www/html/dvwa/hackable/uploads chown www-data:www-data /var/www/html/dvwa/external/phpids/0.6/lib/IDS/tmp/phpids_log.txt cd dvwa/config vim config.inc.php \\编辑配置文件
修改第 18 行 $_DVWA[ 'db_password' ] = 'p@ssw0rd';
将p@ssw0rd改为你前面设置的 MySQL root 密码 如 xxxxxx ,保存退出。
打开浏览器输入 ip/dvwa/setup.php 如本机 127.0.0.1/dvwa/setup.php
点击 Create/Reset Database
输入Username admin
Password password
登录