1.DVWA靶机
DVWA(Damn Vulnerable Web Application)是使用PHP+Mysql编写的web安全测试框架,主要用于安全人员在一个合法的环境中测试技能和工具。
2.下载DVWA
从GitHub上将DVWA的源码clone到kali上
git clone https://github.com/digininja/DVWA.git
下载完成后并解压,修改DVWA文件加的操作权限
chmod 777 -R DVWA/
启动apach2和mysql服务
┌──(root㉿kali)-[~/DVWA]
└─# service apache2 start
┌──(root㉿kali)-[~/DVWA]
└─# service mysql start
┌──(root㉿kali)-[~/DVWA]
└─# netstat -ltnup | grep 3306
tcp 0 0 127.0.0.1:3306 0.0.0.0:* LISTEN 7388/mariadbd
┌──(root㉿kali)-[~/DVWA]
└─# netstat -ltnup | grep 80
tcp6 0 0 :::80 :::* LISTEN 7185/apache2
进入MySQL数据库,并创建DVWA数据库
┌──(root㉿kali)-[~/DVWA]
└─# mysql -u root
Welcome to the MariaDB monitor. Commands end with ; or \g.
Your MariaDB connection id is 31
Server version: 10.11.6-MariaDB-1 Debian n/a
Copyright (c) 2000, 2018, Oracle, MariaDB Corporation Ab and others.
Type 'help;' or '\h' for help. Type '\c' to clear the current input statement.
MariaDB [(none)]>