DVWA
DVWA - Brute Force Attack and Prevention Explained
This detailed guide explains Brute Force Attacks, how they work, and ways to prevent them. You can also explore a demo to understand the concept better and discover effective prevention mechanisms to safeguard your online security.
Mitigating Command Injection
Mitigation Recommendations for Command Injection Vulnerability
DVWA Brute Force Attack - High Severity
This detailed post explains Brute-Force Attacks' High severity using DVWA and how improper security fixes can be bypassed. You can also explore a demo to understand the concept better and discover and optimize your attack with the BurpSuite tool.
DVWA Brute Force Attack - Medium Severity
This detailed post explains Brute-Force Attacks' Medium severity using DVWA and how partial security fixes can be bypassed. You can also explore a demo to better understand the concept and discover and optimize your attack with the BurpSuite tool.
Lab Setup - Docker DVWA
This post will walk you through setting up the lab environment of the DVWA docker image, which is one of the practical vulnerable applications for learning web application security skills.