OWASP TOP 10 Vulnerabilities Project
Contents
On our previous project:
- We learned how to create a captive portal
- How to create user role management
- How to implement least privilege roles
- Creates Firewall Rules
So what next?
Our next step is incorporating Suricata with pfSense, installing DVWA into the tech subnet, and attacking it from the WAN (Outside).
What is the goal of this project:
- To learn how some of these attacks look like from a PCAP perspective
- Get a refresher on what these attacks are
- Write Suricata rules to detect these attacks
- Write Suricata rules to block these attacks
Our next step is Installing DVWA
For DVWA installation, I recommend you follow this video:
After you have DVWA installed, Let put it in our Tech subnet.
Then, we will try to ping the DVWA machine to the firewall.
Look like we have a connection. That means we can communicate to the firewall with DVWA and vice versa
Friendly Reminder to start DVWA
|
|
|
|
Default credentials are:
admin/password
This is what it should look like:
Now, we’re ready to attack this vulnerable web application and improve our cybersecurity skills :)