TIWAP - Totally Insecure Web Application Project

#444
Topic created · 1 Posts · 1 Views

  • TIWAP is a web security testing lab made using Flask for budding security enthusiasts to learn about various web vulnerabilities. Inspired by DVWA, the contributors have tried their best to regenerate various web vulnerabilities
    The application is solely made for educational purpose and to learn web hacking in a legal environment.
    Disclaimer
    We highly recommend installing the lab on a Virtual Machine instead of a live web server (Internal or External).
    We do not take responsibility for the way in which anyone uses this application (TIWAP). The application has been made for educational purpose only and should not be used maliciously. If your web servers are compromised due to installation of this application, it is not our responsibility, it is the responsibility of the person/s who uploaded and installed it.
    Setup and Installation
    To keep the installation and setup easy, we have configured everything for you. All you need is Docker on your system.
    Once you are done with docker installation, run the following commands.

    git clone https://github.com/tombstoneghost/TIWAP
    cd TIWAP
    docker-compose up

    Note: It works only on Linux as of now and windows compatibility is work under progress
    Once the lab is started, you can log in using the default credentials.
    Username: admin
    Password: admin
    Tech Stack
    Front-End: HTML, CSS and JavaScript
    Back-End: Python - Flask
    Databases: SQLite3 and MongoDB
    Vulnerabilities
    Currently, we have 20 vulnerabilities in the lab. All listed below:

    • SQL Injection
    • Blind SQL Injection
    • NoSQL Injection
    • Command Injection
    • Business Logic Flaw
    • Sensitive Data Exposure
    • XML External Entities
    • Security Misconfiguration
    • Reflected XSS
    • Stored XSS
    • DOM Based XSS
    • HTML Injection
    • Improper Certificate Validation
    • Hardcoded Credentials
    • Insecure File Upload
    • Brute Force
    • Directory Traversal
    • Cross-Site Request Forgery (CSRF)
    • Server-Side Request Forgery (SSRF)
    • Server-Side Template Injection (SSTI)
      Each vulnerability is having 3 difficulty levels, namely Low, Medium and Hard. These levels can be set from the settings page.
      Bugs and Issues
      If you find any bugs or issues with the project, kindly raise the same on the below link.
      https://github.com/tombstoneghost/TIWAP/issues
      Contributors
    1. Simardeep Singh - LinkedIn | Twitter
    2. Yash Giri - LinkedIn
    3. Sakshi Aggarwal - LinkedIn | Twitter
      Want to be a contributor?
    4. Star this repository
    5. Fork this repository
    6. Clone the forked repository
    7. Navigate to the project directory
    8. Create a new branch with your name
    9. Make changes
    10. Stage your changes and commit
    11. Push your local changes to remote
    12. Create a Pull Request
    13. Congratulations! You did it.
      License
      This project is under the MIT License - Click here for details.
      Happy Hacking! 🙂
      Download TIWAP
Log in to reply