JGillam / Samurai-Dojo

Part of the SamuraiWTF project, this is a set of simple vulnerable web apps used primarily for instruction during web penetration testing classes.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Samurai-Dojo

Samurai-Dojo is a set of vulnerable web applications created by and for the Samurai security testing distributions like SamuraiSTFU and SamuraiWTF. These vulnerabile applications include:

  • Dojo Basic: A simple PHP app that can be used for demos and exercises
  • Dojo Scavenger: A student CTF-like challenge to test penesting skills
  • Dojo Control: An application to simulate a HMI for a control system

Each app is located in its respective folder, than can be moved the the appropriate location for web root on your server. Sample apache configuration files (needed at least for scavenger's challenge) are also provided and need to be moved to the /etc/apache2/sites-available/ folder on Debian/Ubuntu or integrated in your apache configuration file on other distributions.

Vagrant

For ease of development a Vagrant configuration are available. The Vagrant configuration and deployment are stored in the following files:

  • Vagrantfile : contains a standard Vagrant config (no plugins required)
  • bootstrap.sh : contains the installation script to get Samurai-Dojo up and running on Apache

The one configuration item that is necessary is on your local host (i.e. not the Vagrant guest) add the following mappings to your hosts file.

127.0.0.1       dojo-basic
127.0.0.1       dojo-scavenger

The two apps are setup with virtual hosting on ports 42080 and 42443. Therefore to access them over http, you would point a browser to any of:

About

Part of the SamuraiWTF project, this is a set of simple vulnerable web apps used primarily for instruction during web penetration testing classes.


Languages

Language:PHP 99.1%Language:CSS 0.5%Language:HTML 0.2%Language:JavaScript 0.1%Language:Shell 0.1%Language:ApacheConf 0.0%