Monday, January 14, 2013

bWAPP - Metasploitable

In the previous article I described the necessary steps to install bWAPP or a buggy web application. That was pretty easy.

In this article I will demonstrate the installation and configuration of bWAPP on Metasploitable.

Metasploitable is an intentionally vulnerable Linux virtual machine. The VM can also be used to provide security training, test security tools, and practice common penetration testing techniques. It runs on any recent VMware product and other visualization technologies such as VirtualBox, VMFusion, Hyper-V,... Thank you HD Moore and Rapid7!

You can download the image file of Metasploitable 2 from here. The default login and password is msfadmin/msfadmin.

Once you have booted the Metasploitable VM you can copy the tar file to the temp directory. Extract it from here. A new directory 'bWAPP' will be created. 
cd /tmp

Move the directory 'bWAPP' and its entire content to the folder '/var/www'. You need root privileges!
sudo su
mv /tmp/bWAPP /var/www

Go to the bWAPP directory and give full permission to the directories 'passwords' and 'images'. This step is optional but it will give you so much fun when exploiting bWAPP with tools like sqlmap and Metasploit!

chmod 777 images/
chmod 777 passwords/

Edit the file 'admin/settings.php'. Use the Metasploitable MySQL settings.
Yeah you're right, there's nothing to change. The MySQL root user on Metasploitable has a blank password.

Browse to the file 'install.php' in the directory 'bWAPP'. Click 'here'.
The database 'bWAPP' will be created and populated.

Go to the login page. You can login with the default credentials (bee/bug) or you can make a new user. It's up to you!

You are ready to explore and exploit the bee!
Choose your favorite bug and a security level (low - medium - high).

If you have questions or if you want to help me with this project, don't hesitate to contact me! I speak human...



Malik Mesellem