Set up your own web application pentesting lab

by Shashwat Chaudhary
1 comment Pen Testing & Audits kali

In this tutorial, we will be installing Damn Vulnerable Web Application (DVWA) on a Ubuntu virtual machine. Our attacker machine would be Kali Linux, which is also installed as a virtual machine (or virtual box). The host can be any OS, and doesn't matter since we won't be using it at all. An alternate configuration is when your host is either Kali or Ubuntu, in which case you need only one VM, to install their the other OS. Alternatively, you could just use a single Kali machine both as attacker as well as victim (running the vulnerable application). However, that makes things less realistic.

Steven Ulm 8 months ago

I don't understand why Ubuntu is such a mystery for the most users. It is an amazing working envirnoment...