Contents

OWASP TOP 10 Vulnerabilities Project

/images/Firewall-layout.webp
Firewall Layout

On our previous project:

  • We learned how to create a captive portal
  • How to create user role management
  • How to implement least privilege roles
  • Creates Firewall Rules

So what next?

Our next step is incorporating Suricata with pfSense, installing DVWA into the tech subnet, and attacking it from the WAN (Outside).

What is the goal of this project:

  • To learn how some of these attacks look like from a PCAP perspective
  • Get a refresher on what these attacks are
  • Write Suricata rules to detect these attacks
  • Write Suricata rules to block these attacks

Our next step is Installing DVWA

For DVWA installation, I recommend you follow this video:

After you have DVWA installed, Let put it in our Tech subnet.

/images/image.webp
DVWA VM

Then, we will try to ping the DVWA machine to the firewall.

/images/image-1.webp
DVWA to Firewall

Look like we have a connection. That means we can communicate to the firewall with DVWA and vice versa

Friendly Reminder to start DVWA

1
sudo service apache2 start
1
sudo service mysql start

Default credentials are:

admin/password

This is what it should look like:

/images/image-2.webp
DVWA Homepage

Now, we’re ready to attack this vulnerable web application and improve our cybersecurity skills :)