This web application has been developed to demonstrate possible vulnerabilities of web applications and to compare tools for pentesting.
- Modification of Transferred Data
- Unpublished Web Page
- SQL Injection
- XSS (Reflected & Stored)
- Possible Username enumeration
- Possible Username and Password Brute-Force
- Outdated Hashing Functions for Passwords
- Upload with Path Traversal
- Clone repository with
git clone https://github.com/pentest-tool-comparison/demo-app.git
- Navigate to the directory
- Run
docker-compose up
(If it fails on first start, try restarting it) - Open your Web Browser and navigate to http://localhost:3000
- Clone repository with
git clone https://github.com/pentest-tool-comparison/demo-app.git
- Navigate to the directory and run
npm install
- Build and run Database by executing
docker build -t demo-app-db ./mysql
docker run --name demo-app-db -p 3306:3306 -d demo-app-db
- Start web-app
npm run start
- Open your Web Browser and navigate to http://localhost:3000
- The default data inside the database is set inside the file:
./mysql/2_default_data.sql
. All user accounts with their according password can be found here. - The default database password for the user "demo-app" is "12345678". It can be changed in the file
./mysql/0_init.sql
and by setting the environment variable "DB_PASSWORD" in./Dockerfile
.