This project demonstrates OWASP Top 10 web application vulnerabilities using DVWA as a attack → detect → document → report workflow on a lightweight multi-VM lab built in VirtualBox.
We simulated Red Team attacks from Kali Linux, Blue Team monitoring on Ubuntu, and documented artifacts as a Purple Team.
Security Level: Low
VMs Used:
- Kali Linux (Attacker)
- Ubuntu 22.04 LTS (Victim, DVWA host)
- Windows 10 (Optional target via RDP connection)
Network: Host-Only subnet 192.168.56.x (for isolation between VMs) NAT (dynamic, for Internet-access)
- Kali Linux: Nmap, Nikto, Hydra, Burp Suite, SQLmap
- Ubuntu Linux: Apache2, MySQL, PHP, DVWA, tcpdump
- Optional: Windows 10 services (RDP/SMB), EventViewer
- Red Team (Attacker)
- SQL Injection (manual + sqlmap)
- XSS (Reflected & Stored)
- Command Injection
- File Upload → Web Shell (RCE)
- Brute Force login attacks (Hydra)
- CSRF demonstration
- Blue Team (Victim)
- Monitor Apache/MySQL logs:
tail -f /var/log/apache2/access.log /var/log/apache2/error.log tail -f /var/log/mysql/error.log - Capture network traffic via tcpdump/Wireshark
- Monitor Apache/MySQL logs:
- Purple Team (Integration)
- Document payloads, logs, screenshots
- Summarize impact and mitigation strategies
- Launch three VMs: Kali, Ubuntu, Win10.
- Configure Host-Only networking.
- Install DVWA on Ubuntu as well as Kali, configure Apache2 & MySQL.
- Install attack tools on Kali.
- Run attacks sequentially on DVWA Low Security: SQLi → XSS → Command Injection → File Upload → Brute Force → CSRF.
- Monitor logs and capture traffic for documentation: \n on Ubuntu: Monitored Ubuntu logs, observed attack evidence, captured traffic using tcpdump/Wireshark, analyzed Apache and system logs. \n on Windows10: Monitored EventVewer -> Security logs for failed login attempts (Event ID 4625).
- Document every attack with screenshots, payloads, logs, PCAPs, and mitigation steps.
- Web application penetration testing basics (SQLi, XSS, CSRF, RCE).
- Log monitoring and traffic capture for security analysis.
- Red/Blue/Purple Team workflow understanding.
- Can be upgraded further to medium and high security levels.
