About This Project

This web application is a deliberately vulnerable platform developed as part of a university project aimed at educating developers and cybersecurity students on common security issues.


It intentionally exhibits the OWASP Top 10 vulnerabilities, a set of the most critical security risks identified by the Open Web Application Security Project (OWASP). Through this platform, developers and students can understand how these vulnerabilities are introduced, identified, and the potential impact they can have on web applications.


Purpose


The primary goal of this project is to foster a practical understanding of web application security risks and to promote secure coding practices. By experimenting with this vulnerable application, users gain insights into how attackers exploit these common vulnerabilities, bridging the gap between theory and real-world application security.


Learning Objectives



Vulnerabilities Covered


  • Injection (e.g., SQL Injection)

    Manipulating input to execute unintended commands.

  • Broken Authentication

    Exploiting flaws in authentication to compromise credentials.

  • Sensitive Data Exposure

    Inadequate protection of sensitive information.

  • XML External Entities (XXE)

    Processing external entities in XML, leading to data breaches.

  • Broken Access Control

    Unauthorized access to restricted resources.

  • Security Misconfiguration

    Improper configurations that lead to security gaps.

  • Cross-Site Scripting (XSS)

    Injection of malicious scripts into webpages.

  • Insecure Deserialization

    Deserialization of untrusted data, leading to remote code execution.

  • Using Components with Known Vulnerabilities

    Reliance on outdated or vulnerable libraries.

  • Insufficient Logging and Monitoring

    Lack of comprehensive logging and detection mechanisms.

  • Important Notice: This project is strictly for educational purposes and should not be used in any production environment. Unauthorized exploitation or distribution outside a controlled environment is not allowed and may violate ethical and legal standards.


    Future Development


    Future enhancements could include mitigation strategies for each vulnerability, enabling users to learn both the attack and defense aspects of web security, building a well-rounded foundation in secure application development.