nuclei-templates/http/default-logins/dvwa/dvwa-default-login.yaml

61 lines
1.6 KiB
YAML

id: dvwa-default-login
info:
name: DVWA Default Login
author: pdteam
severity: critical
description: Damn Vulnerable Web App (DVWA) is a test application for security professionals. The hard coded credentials are part of a security testing scenario.
reference:
- https://opensourcelibs.com/lib/dvwa
classification:
cwe-id: CWE-798
metadata:
max-request: 2
tags: dvwa,default-login
http:
- raw:
- |
GET /login.php HTTP/1.1
Host: {{Hostname}}
Accept-Language: en-GB,en-US;q=0.9,en;q=0.8
Connection: close
- |
POST /login.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
Cookie: PHPSESSID={{session}}; security=low
Connection: close
username={{username}}&password={{password}}&Login=Login&user_token={{token}}
payloads:
username:
- admin
password:
- password
attack: pitchfork
extractors:
- type: regex
name: token
group: 1
internal: true
part: body
regex:
- "hidden' name='user_token' value='([0-9a-z]+)'"
- type: kval
name: session
internal: true
part: body
kval:
- PHPSESSID
host-redirects: true
matchers:
- type: word
words:
- "You have logged in as 'admin'"
# digest: 490a00463044022045f5835991e9296cd7ed9bdca15bba2bb5a2c5f7f36071fa10441e2b91eddb5102205eb559de4798a34aa57c1816eef56160104d0ed92ce27f1a122ab3db664fddca:922c64590222798bb761d5b6d8e72950