DVWA ( Dam Vulnerable Web Application ) DVWA 是用 PHP + Mysql 編寫的一套用於常規 WEB 漏洞教學和檢測的WEB脆弱性測試程序。包含了 SQL 注入、 XSS 、盲注等常見的一些安全漏洞。Kali 已自帶了平臺所需的環境,因此搭建很是簡單。php
service mysql start
運行 mysql -u root
鏈接 MySQL 並設置 MySQL root 密碼html
mysql -u root Welcome to the MariaDB monitor. Commands end with ; or \g. Your MariaDB connection id is 43 Server version: 10.1.21-MariaDB-5+b1 Debian 9.0 Copyright (c) 2000, 2016, Oracle, MariaDB Corporation Ab and others. Type 'help;' or '\h' for help. Type '\c' to clear the current input statement. MariaDB [(none)]> use mysql \\使用數據庫 mysql Reading table information for completion of table and column names You can turn off this feature to get a quicker startup with -A Database changed MariaDB [mysql]> update user set password=PASSWORD('xxxxxx') where User='root'; \\更改 root 密碼爲 xxxxxx Query OK, 4 rows affected (0.00 sec) Rows matched: 4 Changed: 4 Warnings: 0 MariaDB [mysql]> flush privileges; \\刷新 MySQL 的系統權限相關表 Query OK, 0 rows affected (0.00 sec) MariaDB [mysql]> create database dvwa; \\建立數據庫 dvwa Query OK, 1 row affected (0.00 sec) MariaDB [mysql]> quit \\退出 Bye
GD 支持mysql
apt-get install php7.0-gd
編輯 /etc/php/7.0/apache2/php.ini 修改 824 行 allow_url_include = Off
爲 allow_url_include = On
保存退出git
vim /etc/php/7.0/apache2/php.ini
service apache2 start
wget https://github.com/ethicalhack3r/DVWA/archive/master.zip
mv master.zip /var/www/html cd /var/www/html unzip master.zip mv DVWA-master dvwa chown www-data:www-data /var/www/html/dvwa/hackable/uploads chown www-data:www-data /var/www/html/dvwa/external/phpids/0.6/lib/IDS/tmp/phpids_log.txt cd dvwa/config vim config.inc.php \\編輯配置文件
修改第 18 行 $_DVWA[ 'db_password' ] = 'p@ssw0rd';
將p@ssw0rd改成你前面設置的 MySQL root 密碼 如 xxxxxx ,保存退出。github
打開瀏覽器輸入 ip/dvwa/setup.php 如本機 127.0.0.1/dvwa/setup.phpsql
點擊 Create/Reset Database
shell
輸入Username admin
Password password
登陸數據庫