Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Damn Vulnerable Web Application (DVWA) - Complete Security Testing Walkthrough

CryptoCat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn ethical hacking and web application security through comprehensive walkthroughs of the Damn Vulnerable Web Application (DVWA), a deliberately vulnerable web application designed for educational purposes and commonly used in university cybersecurity courses. Master essential penetration testing techniques by working through 18 different vulnerability categories, each presented at low, medium, and high difficulty levels to progressively build your skills. Explore critical security concepts including brute force attacks, command injection, Cross Site Request Forgery (CSRF), file inclusion vulnerabilities (LFI/RFI), insecure file uploads, captcha bypassing, SQL injection techniques, blind SQL injection, session management weaknesses, and various Cross-Site Scripting (XSS) attacks including DOM-based, reflected, and stored variants. Advance to more sophisticated topics such as Content Security Policy (CSP) bypass techniques, JavaScript security issues, authorization bypass methods, open redirect vulnerabilities, cryptographic weaknesses, and API security testing. Gain hands-on experience with each vulnerability type through practical demonstrations that show how to identify, exploit, and understand the security implications of common web application flaws, preparing you for real-world cybersecurity challenges and ethical hacking scenarios.

Syllabus

0 - Intro/Setup - Damn Vulnerable Web Application (DVWA)
1 - Brute Force (low/med/high) - Damn Vulnerable Web Application (DVWA)
2 - Command Injection (low/med/high) - Damn Vulnerable Web Application (DVWA)
3 - Cross Site Request Forgery (CSRF) (low/med/high) - Damn Vulnerable Web Application (DVWA)
4 - File Inclusion (LFI/RFI) (low/med/high) - Damn Vulnerable Web Application (DVWA)
5 - File Upload (low/med/high) - Damn Vulnerable Web Application (DVWA)
6 - Insecure Captcha (low/med/high) - Damn Vulnerable Web Application (DVWA)
7 - SQL Injection (low/med/high) - Damn Vulnerable Web Application (DVWA)
8 - Blind SQL Injection (low/med/high) - Damn Vulnerable Web Application (DVWA)
9 - Weak Session IDs (low/med/high) - Damn Vulnerable Web Application (DVWA)
10 - XSS (DOM) (low/med/high) - Damn Vulnerable Web Application (DVWA)
11 - XSS (Reflected) (low/med/high) - Damn Vulnerable Web Application (DVWA)
12 - XSS (Stored) (low/med/high) - Damn Vulnerable Web Application (DVWA)
13 - CSP Bypass (low/med/high) - Damn Vulnerable Web Application (DVWA)
14 - JavaScript (low/med/high) - Damn Vulnerable Web Application (DVWA)
15 - Authorisation Bypass (low/med/high) - Damn Vulnerable Web Application (DVWA)
16 - Open Redirect (low/med/high) - Damn Vulnerable Web Application (DVWA)
17 - Cryptography (low/med/high) - Damn Vulnerable Web Application (DVWA)
18 - API Security (low/med/high) - Damn Vulnerable Web Application (DVWA)

Taught by

CryptoCat

Reviews

Start your review of Damn Vulnerable Web Application (DVWA) - Complete Security Testing Walkthrough

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.