Linchakin

TIWAP - Totally Insecure Web Application Project

 November 03, 2021     No comments   

TIWAP is a web security testing lab made using Flask for budding security enthusiasts to learn about various web vulnerabilities. Inspired by DVWA, the contributors have tried their best to regenerate various web vulnerabilities

The application is solely made for educational purpose and to learn web hacking in a legal environment.

Disclaimer

We highly recommend installing the lab on a Virtual Machine instead of a live web server (Internal or External).

We do not take responsibility for the way in which anyone uses this application (TIWAP). The application has been made for educational purpose only and should not be used maliciously. If your web servers are compromised due to installation of this application, it is not our responsibility, it is the responsibility of the person/s who uploaded and installed it.


Setup and Installation

To keep the installation and setup easy, we have configured everything for you. All you need is Docker on your system.

Once you are done with docker installation, run the following commands.

git clone https://github.com/tombstoneghost/TIWAP
cd TIWAP
docker-compose up

Note: It works only on Linux as of now and windows compatibility is work under progress

Once the lab is started, you can log in using the default credentials.
Username: admin
Password: admin


Tech Stack

Front-End: HTML, CSS and JavaScript
Back-End: Python - Flask
Databases: SQLite3 and MongoDB


Vulnerabilities

Currently, we have 20 vulnerabilities in the lab. All listed below:

  • SQL Injection
  • Blind SQL Injection
  • NoSQL Injection
  • Command Injection
  • Business Logic Flaw
  • Sensitive Data Exposure
  • XML External Entities
  • Security Misconfiguration
  • Reflected XSS
  • Stored XSS
  • DOM Based XSS
  • HTML Injection
  • Improper Certificate Validation
  • Hardcoded Credentials
  • Insecure File Upload
  • Brute Force
  • Directory Traversal
  • Cross-Site Request Forgery (CSRF)
  • Server-Side Request Forgery (SSRF)
  • Server-Side Template Injection (SSTI)

Each vulnerability is having 3 difficulty levels, namely Low, Medium and Hard. These levels can be set from the settings page.


Bugs and Issues

If you find any bugs or issues with the project, kindly raise the same on the below link.

https://github.com/tombstoneghost/TIWAP/issues


Contributors
  1. Simardeep Singh - LinkedIn | Twitter
  2. Yash Giri - LinkedIn
  3. Sakshi Aggarwal - LinkedIn | Twitter

Want to be a contributor?
  1. Star this repository
  2. Fork this repository
  3. Clone the forked repository
  4. Navigate to the project directory
  5. Create a new branch with your name
  6. Make changes
  7. Stage your changes and commit
  8. Push your local changes to remote
  9. Create a Pull Request
  10. Congratulations! You did it.

License

This project is under the MIT License - Click here for details.

Happy Hacking! :)

Adblock test (Why?)


You may be interested in:
>> Is a Chromebook worth replacing a Windows laptop?
>> Find out in detail the outstanding features of Google Pixel 4a
>> Top 7 best earbuds you should not miss

Related Posts:
>> Recognizing 12 Basic Body Shapes To Choose Better Clothes
>>Ranking the 10 most used smart technology devices
>> Top 5+ Best E-readers: Compact & Convenient Pen
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook

Related Posts:

  • Introducing the World’s First Free Cloud WAF to Secure Your Web Applications A web application firewall is a firewall that monitors, filters, and blocks statistics packets as they journey to and from an internet site… Read More
  • PS2EXE - Module To Compile Powershell Scripts To Executables Overworking of the great script of Ingo Karstein with GUI support. The GUI output and input is activated with one switch, real windows executables ar… Read More
  • Top Benefits of NetSuite ERP Integration Running a business today is easy if you know how to use the perks of digital solutions. Not using the very best technology is like trying to find a… Read More
  • Microsoft Researches Ransomware Attack Targeting App Developers Stories of ransomware assaults are common in many headlines worldwide. The attacks target both large and small businesses alike. Research suggests th… Read More
  • CCSP vs. Professional Cloud Security Manager: How Do They Compare?Cybersecurity isn’t only a national security issue making headlines almost daily — it’s at the top of the list of imperatives for organizations, publi… Read More
Newer Post Older Post Home

0 Comments:

Post a Comment


Copyright © 2025 Linchakin | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates