Pentester Academy Labs
Pentester Academy labs are entirely browser-based, private, and include access to a Terminal/GUI-based Kali, Ubuntu, or other operating systems, with the necessary tools and scripts pre-installed. You will not need any other software to get started.
Image Source: DVWA
DVWA
Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is intentionally vulnerable. It helps security professionals, developers, students, and educators learn and practice web application security in a legal and controlled environment.
DVWA allows practicing vulnerabilities with different difficulty levels and features a straightforward interface. It is licensed under GPLv3.
While DVWA can be downloaded and run locally, Pentester Academy offers a fully hosted version to save time and effort.
Sample vulnerabilities include:
- Cross-Site Scripting (DOM/Reflected/Stored)
- Command Injection
- CSRF
- Brute Force
- Weak Session IDs
- SQL Injection (Blind)
- File Inclusion/Upload
- Insecure CAPTCHA
Login credentials:
- User:
admin
- Password:
password
Access the labs:
- Sign in: https://attackdefense.pentesteracademy.com/
- Lab: https://attackdefense.pentesteracademy.com/challengedetails?cid=34
Image Source: bWAPP
bWAPP
bWAPP (Buggy Web Application) is a free, open-source PHP application deliberately made vulnerable. It is designed for educational purposes and helps developers, students, and security professionals learn how to identify and prevent web vulnerabilities.
bWAPP includes over 100 web bugs covering all OWASP Top 10 risks and more.
You can run bWAPP on Linux/Windows with Apache/IIS and MySQL, or use preconfigured packages like WAMP/XAMPP. A pre-installed Linux VM version called bee-box is also available.
Sample vulnerabilities include:
- Arbitrary File Access
- SQL Injection
- Code Injection
- Cross-Site Scripting
- Cross-Site Request Forgery
- Heartbleed
- Shellshock
Login credentials:
- User:
bee
- Password:
bug
Access the labs:
- Sign in: https://attackdefense.pentesteracademy.com/
- Lab: https://attackdefense.pentesteracademy.com/challengedetails?cid=33
Support & Follow
🙏 Thank you for reading this post!
If you found this helpful, consider supporting me by buying a cup of Coffee ☕
Follow me:
Resources:
0 Comments