Skip to main content
Project HomeLab Intermediate

Deploying Vulnerable Applications

Jason J. Boderebe
2 min tutorial
#homelab #vulnerable-apps #practice

Deploying Vulnerable Applications

Now that your home lab is set up, it’s time to deploy some intentionally vulnerable applications. These applications are designed for learning and practicing cybersecurity skills in a safe environment.

DVWA (Damn Vulnerable Web Application)

  • Purpose: Web application security testing
  • Technologies: PHP, MySQL
  • Vulnerabilities: SQL injection, XSS, CSRF, and more

WebGoat

  • Purpose: Java-based vulnerable application
  • Technologies: Java, Spring Framework
  • Features: Interactive lessons with practical exercises

Metasploitable

  • Purpose: Intentionally vulnerable Linux distribution
  • Services: Multiple vulnerable services
  • Use Cases: Network penetration testing

Deployment Methods

Docker Containers

Benefits:

  • Easy deployment and cleanup
  • Isolated environments
  • Version control
# DVWA
docker run --rm -it -p 80:80 vulnerables/web-dvwa

# WebGoat
docker run -p 8080:8080 webgoat/webgoat

# OWASP Juice Shop
docker run --rm -p 3000:3000 bkimminich/juice-shop

Virtual Machines

  • More realistic environment
  • Full operating system
  • Better for system-level testing

Local Installation

  • Direct installation on lab systems
  • Faster performance
  • More customization options

Safety Considerations

Network Isolation

  • Use isolated network segments
  • No internet access for vulnerable systems
  • Separate from production networks

Access Control

  • Strong authentication for lab management
  • Regular password changes
  • Limited access to authorized personnel

Documentation

  • Track all deployed applications
  • Document vulnerabilities and fixes
  • Maintain testing logs

Testing Scenarios

Web Application Testing

  1. SQL injection attacks
  2. Cross-site scripting (XSS)
  3. Authentication bypass
  4. File upload vulnerabilities

Network Penetration Testing

  1. Port scanning and enumeration
  2. Service exploitation
  3. Privilege escalation
  4. Lateral movement

Social Engineering

  1. Phishing simulations
  2. Physical security testing
  3. Information gathering

Learning Resources

Online Platforms

  • TryHackMe
  • HackTheBox
  • VulnHub
  • OverTheWire

Books and Guides

  • “The Web Application Hacker’s Handbook”
  • “Penetration Testing: A Hands-On Introduction to Hacking”
  • OWASP Testing Guide

Certifications

  • CEH (Certified Ethical Hacker)
  • OSCP (Offensive Security Certified Professional)
  • GPEN (GIAC Penetration Tester)

Conclusion

Vulnerable applications provide a safe and legal way to practice cybersecurity skills. Always ensure you’re testing in an isolated environment and never test against systems you don’t own or have explicit permission to test.

Remember: The goal is to learn and improve security, not to cause harm!