Skip to content

Commit c0f2689

Browse files
authored
Merge pull request #2 from santosomar/patch-1
Adding information about Docker Container
2 parents d03f54d + 9f73fad commit c0f2689

File tree

1 file changed

+26
-14
lines changed

1 file changed

+26
-14
lines changed

README.md

+26-14
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
![VulnWeb](https://github.com/OWASP/Vulnerable-Web-Application/blob/master/Resources/VulnWeb.png)
44

5-
<h2>What is Vulnerable-Web-Application</h2>
5+
## What is Vulnerable-Web-Application
66

77
Vulnerable-Web-Application is a website that is prepared for people who are interested in web penetration and who want to have
88
information about this subject or to be working. In fact, the website is quite simple to install and use.
@@ -11,7 +11,7 @@ Vulnerable-Web-Application categorically includes Command Execution, File Inclus
1111
categories, it creates a database under localhost with one button during setup. In case of corrupted or changed databases, you can
1212
create a database again.
1313

14-
<h2>Installation Guide</h2>
14+
## Installation Guide
1515

1616
If you want to run this tool, first of all you need to download web server solution like "xampp"- you can download xampp from
1717
[Xampp](https://www.apachefriends.org/tr/download.html). After your installation;
@@ -23,20 +23,32 @@ For Mac Os you need to install mampp and copy the files into the mamp/htdocs f
2323

2424
For Linux after download our files first you need to open apache server and copy the files to /var/www/html
2525

26-
<b>Other Configurations:</b>
26+
## Docker Container
27+
You can also run the **Vulnerable Web Application** in Docker with the folowing command:
2728

28-
The php.ini file should be altered. You can find the location of your php.ini file under the folder which php is installed.
29-
* allow_url_include = on - Allows for Remote File Inclusion
30-
* allow_url_fopen = on - Allows for Remote File Inclusion
31-
* safe_mode = off - (If PHP <= v5.4) Allows for SQL Injection
32-
* magic_quotes_gpc = off - (If PHP <= v5.4) Allows for SQL Injection
29+
```
30+
docker run -it --name vuln_app -p 9991:80 santosomar/vuln_app:latest /bin/bash
31+
```
32+
**Note**: You can change the port 9991 to any port you desire depending your implementation.
3333

34-
<b>Installation</b>
34+
### Other Configurations:
3535

36-
After all these configurations, firstly, open Xampp Control Panel and start Apache,MySQL. Your MySQL credentials have to be default.<b>[username:root <-> password:""]</b> Then open up our index.php file in the <b>Vulnerable Web Application</b> directory. Follow the directions and create database. If you messed up with database, you can reset the database. If database is ready, you can go to homepage and start hacking.
36+
The `php.ini` file should be altered. You can find the location of your `php.ini` file under the folder which php is installed.
37+
- `allow_url_include` = on - Allows for Remote File Inclusion
38+
- `allow_url_fopen` = on - Allows for Remote File Inclusion
39+
- `safe_mode` = off - (If PHP <= v5.4) Allows for SQL Injection
40+
- `magic_quotes_gpc` = off - (If PHP <= v5.4) Allows for SQL Injection
3741

38-
<h2>License</h2>
39-
The contents of this repository are licensed under the GNU General Public License v3.0.
42+
## Application Setup
43+
44+
- After editing the previous configuration, open the Xampp Control Panel and start Apache,MySQL.
45+
- Your MySQL credentials must stay the default credentials (e.g., username:root <-> password:"")
46+
- Open up the `index.php` file in the <b>Vulnerable Web Application</b> directory. Follow the directions and create database.
47+
48+
**Note**: You can reset the database at any time, if needed or if you run into any problems. Once the database is ready, you can go to homepage and start hacking.
49+
50+
## License
51+
The contents of this repository are licensed under the GNU General Public License v3.0.
4052

41-
<h2>Version</h2>
42-
1.0.0
53+
## Version
54+
1.0.0

0 commit comments

Comments
 (0)