Skip to content

Commit 08f744e

Browse files
committed
cleanup - formatting issues
1 parent 75d2bde commit 08f744e

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

47 files changed

+448
-476
lines changed

CHANGELOG.md

+51-51
Original file line numberDiff line numberDiff line change
@@ -4,30 +4,30 @@ DAMN VULNERABLE WEB APPLICATION
44
v1.9 (*Not Yet Released*)
55
======
66

7-
+ Added CSRF token to pre-auth forms (login/setup/security pages). (g0tmi1k + Shinkurt)
8-
+ Added HTTPOnly cookie flag on impossible levels. (g0tmi1k)
9-
+ Added PDO for the impossible examples in SQLi & SQLi Blind. (g0tmi1k)
10-
+ Added system check to setup. (g0tmi1k)
11-
+ Changed brute force medium to be harder due to sleep. (g0tmi1k)
12-
+ Changed file include landing page + added 3x example pages. (g0tmi1k)
13-
+ Changed file include medium to be harder due to more filters. (g0tmi1k)
14-
+ Changed HTTP REFERER check for medium level CSRF. (g0tmi1k)
15-
+ Changed input box for medium level with SQLi + SQLi Blind. (g0tmi1k)
16-
+ Changed SQLi + SQLi Blind to be $_POST rather than $_GET. (g0tmi1k)
17-
+ Changed SQLi Blind to be a real example of the vulnerability. (g0tmi1k)
18-
+ Fixed brute force and file upload impossible levels, as they were vulnerable. (g0tmi1k + Shinkurt)
19-
+ Fixed bug with file fnclude page not loading. (g0tmi1k)
20-
+ Fixed CAPTCHA bug to read URL parameters on impossible. (g0tmi1k)
21-
+ Fixed CAPTCHA bug where the form wouldn't be visible. (g0tmi1k)
22-
+ Fixed CAPTCHA bug where the URL parameters were not being used for low + medium. (g0tmi1k)
23-
+ Fixed CSRF medium level bug when not on localhost. (g0tmi1k)
24-
+ Fixed setup bug with custom URL path. (g0tmi1k)
25-
+ Removed PostgreSQL DB support. (g0tmi1k)
26-
+ Renamed 'Command Execution' to 'Command Injection'. (g0tmi1k)
27-
+ Renamed 'high' level to 'impossible' and created new vectors for 'high'. (g0tmi1k)
28-
+ Updated README and documentation. (g0tmi1k)
29-
+ Various code cleanups in the core PHP files+CSS & Verbosed the documentation. (g0tmi1k)
30-
+ Various setup improvements (e.g. redirection + limited menu links). (g0tmi1k)
7+
+ Added CSRF token to pre-auth forms (login/setup/security pages). (@g0tmi1k + @Shinkurt)
8+
+ Added HTTPOnly cookie flag on impossible levels. (@g0tmi1k)
9+
+ Added PDO for the impossible examples in SQLi & SQLi Blind. (@g0tmi1k)
10+
+ Added system check to setup. (@g0tmi1k)
11+
+ Changed brute force medium to be harder due to sleep. (@g0tmi1k)
12+
+ Changed file include landing page + added 3x example pages. (@g0tmi1k)
13+
+ Changed file include medium to be harder due to more filters. (@g0tmi1k)
14+
+ Changed HTTP REFERER check for medium level CSRF. (@g0tmi1k)
15+
+ Changed input box for medium level with SQLi + SQLi Blind. (@g0tmi1k)
16+
+ Changed SQLi + SQLi Blind to be $_POST rather than $_GET. (@g0tmi1k)
17+
+ Changed SQLi Blind to be a real example of the vulnerability. (@g0tmi1k)
18+
+ Fixed brute force and file upload impossible levels, as they were vulnerable. (@g0tmi1k + @Shinkurt)
19+
+ Fixed bug with file fnclude page not loading. (@g0tmi1k)
20+
+ Fixed CAPTCHA bug to read URL parameters on impossible. (@g0tmi1k)
21+
+ Fixed CAPTCHA bug where the form wouldn't be visible. (@g0tmi1k)
22+
+ Fixed CAPTCHA bug where the URL parameters were not being used for low + medium. (@g0tmi1k)
23+
+ Fixed CSRF medium level bug when not on localhost. (@g0tmi1k)
24+
+ Fixed setup bug with custom URL path. (@g0tmi1k)
25+
+ Removed PostgreSQL DB support. (@g0tmi1k)
26+
+ Renamed 'Command Execution' to 'Command Injection'. (@g0tmi1k)
27+
+ Renamed 'high' level to 'impossible' and created new vectors for 'high'. (@g0tmi1k)
28+
+ Updated README and documentation. (@g0tmi1k)
29+
+ Various code cleanups in the core PHP files+CSS & Verbosed the documentation. (@g0tmi1k)
30+
+ Various setup improvements (e.g. redirection + limited menu links). (@g0tmi1k)
3131

3232
v1.8 (2013-05-01)
3333
======
@@ -40,42 +40,42 @@ v1.8 (2013-05-01)
4040
v1.0.7 (2010-09-08)
4141
======
4242

43-
+ Re-designed the login page + made some other slight cosmetic changes. 06/06/2010 (ethicalhack3r)
44-
+ Started PostgreSQL implementation. 15/03/2010 (ethicalhack3r)
45-
+ A few small cosmetic changes. 15/03/2010 (ethicalhack3r)
46-
+ Improved the help information and look. 15/03/2010 (ethicalhack3r)
47-
+ Fixed a few bugs thanks to Digininja. 15/03/2010 (ethicalhack3r)
43+
+ Re-designed the login page + made some other slight cosmetic changes. 06/06/2010 (@ethicalhack3r)
44+
+ Started PostgreSQL implementation. 15/03/2010 (@ethicalhack3r)
45+
+ A few small cosmetic changes. 15/03/2010 (@ethicalhack3r)
46+
+ Improved the help information and look. 15/03/2010 (@ethicalhack3r)
47+
+ Fixed a few bugs thanks to @Digininja. 15/03/2010 (@ethicalhack3r)
4848
+ Show logged in username. 05/02/2010 (Jason Jones)
49-
+ Added new info on RandomStorm. 04/02/2010 (ethicalhack3r)
50-
+ Added 'SQL Injection (Blind)'. 04/02/2010 (ethicalhack3r)
51-
+ Added official documentation. 21/11/2009 (ethicalhack3r)
52-
+ Implemented view all source functionality. 16/10/2009 (tmacuk, craig, ethicalhack3r)
49+
+ Added new info on RandomStorm. 04/02/2010 (@ethicalhack3r)
50+
+ Added 'SQL Injection (Blind)'. 04/02/2010 (@ethicalhack3r)
51+
+ Added official documentation. 21/11/2009 (@ethicalhack3r)
52+
+ Implemented view all source functionality. 16/10/2009 (tmacuk, craig, @ethicalhack3r)
5353

5454
v1.0.6 (2009-10-05)
5555
======
5656

57-
+ Fixed a bug where the logo would not show on first time use. 03/09/2009 (ethicalhack3r)
58-
+ Removed 'current password' input box for low+med CSRF security. 03/09/2009 (ethicalhack3r)
59-
+ Added an article which was written for OWASP Turkey. 03/10/2009 (ethicalhack3r)
60-
+ Added more toubleshooting information. 02/10/2009 (ethicalhack3r)
61-
+ Stored XSS high now sanitises output. 02/10/2009 (ethicalhack3r)
62-
+ Fixed a 'bug' in XSS stored low which made it not vulnerable. 02/10/2009 (ethicalhack3r)
63-
+ Rewritten command execution high to use a whitelist. 30/09/09 (ethicalhack3r)
64-
+ Fixed a command execution vulnerability in exec high. 17/09/09 (ethicalhack3r)
65-
+ Added some troubleshooting info for PHP 5.2.6 in readme.txt. 17/09/09 (ethicalhack3r)
66-
+ Added the upload directory to the upload help. 17/09/09 (ethicalhack3r)
57+
+ Fixed a bug where the logo would not show on first time use. 03/09/2009 (@ethicalhack3r)
58+
+ Removed 'current password' input box for low+med CSRF security. 03/09/2009 (@ethicalhack3r)
59+
+ Added an article which was written for OWASP Turkey. 03/10/2009 (@ethicalhack3r)
60+
+ Added more toubleshooting information. 02/10/2009 (@ethicalhack3r)
61+
+ Stored XSS high now sanitises output. 02/10/2009 (@ethicalhack3r)
62+
+ Fixed a 'bug' in XSS stored low which made it not vulnerable. 02/10/2009 (@ethicalhack3r)
63+
+ Rewritten command execution high to use a whitelist. 30/09/09 (@ethicalhack3r)
64+
+ Fixed a command execution vulnerability in exec high. 17/09/09 (@ethicalhack3r)
65+
+ Added some troubleshooting info for PHP 5.2.6 in readme.txt. 17/09/09 (@ethicalhack3r)
66+
+ Added the upload directory to the upload help. 17/09/09 (@ethicalhack3r)
6767

6868
v1.0.5 (2009-09-03)
6969
======
7070

71-
+ Made IE friendly as much as possible. 30/08/2009 (ethicalhack3r)
72-
+ Removed the acunetix scan report. 30/08/2009 (ethicalhack3r)
73-
+ Added 'Clear Log' button to PHPIDS parser. 27/08/2009 (ethicalhack3r)
74-
+ Implemented PHPIDS log parser. 27/08/2009 (ethicalhack3r)
75-
+ Implemented Stored XSS vulnerability. 27/08/2009 (ethicalhack3r)
76-
+ Added htaccess rule for localhost access only. 22/08/2009 (ethicalhack3r)
77-
+ Added CSRF. 01/08/2009 (ethicalhack3r)
78-
+ Implemented sessions/login. 01/08/2009 (ethicalhack3r)
71+
+ Made IE friendly as much as possible. 30/08/2009 (@ethicalhack3r)
72+
+ Removed the acunetix scan report. 30/08/2009 (@ethicalhack3r)
73+
+ Added 'Clear Log' button to PHPIDS parser. 27/08/2009 (@ethicalhack3r)
74+
+ Implemented PHPIDS log parser. 27/08/2009 (@ethicalhack3r)
75+
+ Implemented Stored XSS vulnerability. 27/08/2009 (@ethicalhack3r)
76+
+ Added htaccess rule for localhost access only. 22/08/2009 (@ethicalhack3r)
77+
+ Added CSRF. 01/08/2009 (@ethicalhack3r)
78+
+ Implemented sessions/login. 01/08/2009 (@ethicalhack3r)
7979
+ Complete recode. (jamesr)
8080
+ Complete redesign. (jamesr)
8181
+ Delimited 'dvwa' in session- minimising the risk of clash with other projects running on localhost. 01/08/2009 (jamesr)

README.md

+11-11
Original file line numberDiff line numberDiff line change
@@ -42,9 +42,9 @@ along with Damn Vulnerable Web Application (DVWA). If not, see http://www.gnu.o
4242

4343
DVWA is available either as a package that will run on your own web server or as a Live CD:
4444

45-
+ DVWA v1.9 (Testing) - (1.3 MB) [Download ZIP](https://github.com/RandomStorm/DVWA/archive/master.zip) - `git clone https://github.com/RandomStorm/DVWA`
46-
+ DVWA v1.8 (Stable) - (1.3 MB) [Download ZIP](https://github.com/RandomStorm/DVWA/archive/v1.0.8.zip)
47-
+ DVWA v1.0.7 LiveCD - (480 MB) [Download ISO](http://www.dvwa.co.uk/DVWA-1.0.7.iso)
45+
+ DVWA v1.9 Source (Testing) - \[1.3 MB\] [Download ZIP](https://github.com/RandomStorm/DVWA/archive/master.zip) // `git clone https://github.com/RandomStorm/DVWA`
46+
+ DVWA v1.8 Source (Stable) - \[1.3 MB\] [Download ZIP](https://github.com/RandomStorm/DVWA/archive/v1.0.8.zip) - Released 2013-05-01
47+
+ DVWA v1.0.7 LiveCD - \[480 MB\] [Download ISO](http://www.dvwa.co.uk/DVWA-1.0.7.iso) - Released 2010-09-08
4848

4949
- - -
5050

@@ -90,22 +90,22 @@ $_DVWA[ 'db_database' ] = 'dvwa';
9090
Depening on your Operating System as well as version of PHP, you may wish to alter the default configuration. The location of the files will be different on a per-machine basis.
9191
Note, You are unable to use PHP v7.0 or later with DVWA.
9292

93-
**Folders Permissions**:
93+
**Folder Permissions**:
9494

9595
* `./hackable/uploads/` - Needs to be writable by the web service (for File Upload).
96-
* `./external/phpids/0.6/lib/IDS/tmp/` - Needs to be writable by the web service (if you wish to use PHPIDS).
96+
* `./external/phpids/0.6/lib/IDS/tmp/phpids_log.txt` - Needs to be writable by the web service (if you wish to use PHPIDS).
9797

98-
**PHP**:
98+
**PHP configuration**:
9999

100100
* `allow_url_include = on` - Allows for Remote File Inclusions (RFI) [[allow_url_include](https://secure.php.net/manual/en/filesystem.configuration.php#ini.allow-url-include)]
101101
* `allow_url_fopen = on` - Allows for Remote File Inclusions (RFI) [[allow_url_fopen](https://secure.php.net/manual/en/filesystem.configuration.php#ini.allow-url-fopen)]
102102
* `safe_mode = off` - (If PHP <= v5.4) Allows for SQL Injection (SQLi) [[safe_mode](https://secure.php.net/manual/en/features.safe-mode.php)]
103103
* `magic_quotes_gpc = off` - (If PHP <= v5.4) Allows for SQL Injection (SQLi) [[magic_quotes_gpc](https://secure.php.net/manual/en/security.magicquotes.php)]
104104
* `display_errors = off` - (Optional) Hides PHP warning messages to make it less verbose [[display_errors](https://secure.php.net/manual/en/errorfunc.configuration.php#ini.display-errors)]
105105

106-
**`config/config.inc.php`**:
106+
**File: `config/config.inc.php`**:
107107

108-
* `$_DVWA[ 'recaptcha_public_key' ]` & `$_DVWA[ 'recaptcha_private_key' ]` - Need to be generated from: https://www.google.com/recaptcha/admin/create
108+
* `$_DVWA[ 'recaptcha_public_key' ]` & `$_DVWA[ 'recaptcha_private_key' ]` - These values need to be generated from: https://www.google.com/recaptcha/admin/create
109109

110110
### Default Credentials
111111

@@ -122,9 +122,9 @@ Login URL: http://127.0.0.1/dvwa/login.php
122122
For the latest troubleshooting information please visit:
123123
https://github.com/RandomStorm/DVWA/issues
124124

125-
+Q. SQL Injection wont work on PHP version 5.2.6.
125+
+Q. SQL Injection wont work on PHP v5.2.6.
126126

127-
-A.If you are using PHP version 5.2.6 you will need to do the following in order for SQL injection and other vulnerabilities to work.
127+
-A.If you are using PHP v5.2.6 you will need to do the following in order for SQL injection and other vulnerabilities to work.
128128

129129
In `.htaccess`:
130130

@@ -154,7 +154,7 @@ With:
154154

155155
+Q. My XSS payload won't run in IE.
156156

157-
-A. If your running IE8 or above IE actively filters any XSS. To disable the filter you can do so by setting the HTTP header `X-XSS-Protection: 0` or disable it from internet options. There may also be ways to bypass the filter.
157+
-A. If your running IE8 or above, IE actively filters any XSS. To disable the filter you can do so by setting the HTTP header `X-XSS-Protection: 0` or disable it from internet options. There may also be ways to bypass the filter.
158158

159159
- - -
160160

about.php

+21-22
Original file line numberDiff line numberDiff line change
@@ -1,59 +1,58 @@
11
<?php
22

33
define( 'DVWA_WEB_PAGE_TO_ROOT', '' );
4-
require_once DVWA_WEB_PAGE_TO_ROOT.'dvwa/includes/dvwaPage.inc.php';
4+
require_once DVWA_WEB_PAGE_TO_ROOT . 'dvwa/includes/dvwaPage.inc.php';
55

66
dvwaPageStartup( array( 'phpids' ) );
77

88
$page = dvwaPageNewGrab();
9-
$page[ 'title' ] = 'About'.$page[ 'title_separator' ].$page[ 'title' ];
9+
$page[ 'title' ] = 'About' . $page[ 'title_separator' ].$page[ 'title' ];
1010
$page[ 'page_id' ] = 'about';
1111

1212
$page[ 'body' ] .= "
1313
<div class=\"body_padded\">
1414
<h1>About</h1>
15-
<p>Version ".dvwaVersionGet()." (Release date: ".dvwaReleaseDateGet().")</p>
15+
<p>Version " . dvwaVersionGet() . " (Release date: " . dvwaReleaseDateGet() . ")</p>
1616
<p>Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment</p>
1717
<p>The official documentation for DVWA can be found <a href=\"docs/DVWA_v1.3.pdf\">here</a>.</p>
1818
<p>DVWA is a RandomStorm OpenSource project. All material is copyright 2008-2015 RandomStorm & Ryan Dewhurst.</p>
1919
2020
<h2>Links</h2>
2121
<ul>
22-
<li>Homepage: ".dvwaExternalLinkUrlGet( 'http://www.dvwa.co.uk/' )."</li>
23-
<li>Project Home: ".dvwaExternalLinkUrlGet( 'https://github.com/RandomStorm/DVWA' )."</li>
24-
<li>Bug Tracker: ".dvwaExternalLinkUrlGet( 'https://github.com/RandomStorm/DVWA/issues' )."</li>
25-
<li>Souce Control: ".dvwaExternalLinkUrlGet( 'https://github.com/RandomStorm/DVWA/commits/master' )."</li>
26-
<li>Wiki: ".dvwaExternalLinkUrlGet( 'https://github.com/RandomStorm/DVWA/wiki' )."</li>
22+
<li>Homepage: " . dvwaExternalLinkUrlGet( 'http://www.dvwa.co.uk/' ) . "</li>
23+
<li>Project Home: " . dvwaExternalLinkUrlGet( 'https://github.com/RandomStorm/DVWA' ) . "</li>
24+
<li>Bug Tracker: " . dvwaExternalLinkUrlGet( 'https://github.com/RandomStorm/DVWA/issues' ) . "</li>
25+
<li>Souce Control: " . dvwaExternalLinkUrlGet( 'https://github.com/RandomStorm/DVWA/commits/master' ) . "</li>
26+
<li>Wiki: " . dvwaExternalLinkUrlGet( 'https://github.com/RandomStorm/DVWA/wiki' ) . "</li>
2727
</ul>
2828
2929
<h2>Credits</h2>
3030
<ul>
31-
<li>Craig: ".dvwaExternalLinkUrlGet( 'http://www.youreadmyblog.info/','www.youreadmyblog.info' )."</li>
32-
<li>Jamesr: ".dvwaExternalLinkUrlGet( 'https://www.creativenucleus.com/','www.creativenucleus.com' )." / ".dvwaExternalLinkUrlGet( 'http://www.designnewcastle.co.uk/','www.designnewcastle.co.uk' )."</li>
33-
<li>Ryan Dewhurst: ".dvwaExternalLinkUrlGet( 'http://www.ethicalhack3r.co.uk/','www.ethicalhack3r.co.uk' )."</li>
34-
<li>Tedi Heriyanto: ".dvwaExternalLinkUrlGet( 'http://tedi.heriyanto.net/','http://tedi.heriyanto.net' )."</li>
35-
<li>Tom Mackenzie: ".dvwaExternalLinkUrlGet( 'https://www.tmacuk.co.uk/','www.tmacuk.co.uk' )."</li>
36-
<li>RandomStorm: ".dvwaExternalLinkUrlGet( 'https://www.randomstorm.com/','www.randomstorm.com' )."</li>
37-
<li>Jason Jones: ".dvwaExternalLinkUrlGet( 'http://www.linux-ninja.com/','www.linux-ninja.com' )."</li>
38-
<li>Brooks Garrett: ".dvwaExternalLinkUrlGet( 'http://brooksgarrett.com/','www.brooksgarrett.com' )."</li>
39-
<li>g0tmi1k: ".dvwaExternalLinkUrlGet( 'https://blog.g0tmi1k.com/','g0tmi1k.com' )."</li>
40-
<li>Shinkurt: ".dvwaExternalLinkUrlGet( 'http://www.paulosyibelo.com/','www.paulosyibelo.com' )."</li>
31+
<li>Craig: " . dvwaExternalLinkUrlGet( 'http://www.youreadmyblog.info/','www.youreadmyblog.info' ) . "</li>
32+
<li>Jamesr: " . dvwaExternalLinkUrlGet( 'https://www.creativenucleus.com/','www.creativenucleus.com' ) . " / " . dvwaExternalLinkUrlGet( 'http://www.designnewcastle.co.uk/','www.designnewcastle.co.uk' ) . "</li>
33+
<li>Ryan Dewhurst: " . dvwaExternalLinkUrlGet( 'http://www.ethicalhack3r.co.uk/','www.ethicalhack3r.co.uk' ) . "</li>
34+
<li>Tedi Heriyanto: " . dvwaExternalLinkUrlGet( 'http://tedi.heriyanto.net/','http://tedi.heriyanto.net' ) . "</li>
35+
<li>Tom Mackenzie: " . dvwaExternalLinkUrlGet( 'https://www.tmacuk.co.uk/','www.tmacuk.co.uk' ) . "</li>
36+
<li>RandomStorm: " . dvwaExternalLinkUrlGet( 'https://www.randomstorm.com/','www.randomstorm.com' ) . "</li>
37+
<li>Jason Jones: " . dvwaExternalLinkUrlGet( 'http://www.linux-ninja.com/','www.linux-ninja.com' ) . "</li>
38+
<li>Brooks Garrett: " . dvwaExternalLinkUrlGet( 'http://brooksgarrett.com/','www.brooksgarrett.com' ) . "</li>
39+
<li>g0tmi1k: " . dvwaExternalLinkUrlGet( 'https://blog.g0tmi1k.com/','g0tmi1k.com' ) . "</li>
40+
<li>Shinkurt: " . dvwaExternalLinkUrlGet( 'http://www.paulosyibelo.com/','www.paulosyibelo.com' ) . "</li>
4141
</ul>
4242
<ul>
43-
<li>PHPIDS - Copyright (c) 2007 ".dvwaExternalLinkUrlGet( 'https://github.com/PHPIDS/PHPIDS', 'PHPIDS group' )."</li>
43+
<li>PHPIDS - Copyright (c) 2007 " . dvwaExternalLinkUrlGet( 'https://github.com/PHPIDS/PHPIDS', 'PHPIDS group' ) . "</li>
4444
</ul>
4545
4646
<h2>License</h2>
4747
<p>Damn Vulnerable Web Application (DVWA) is free software: you can redistribute it and/or modify
4848
it under the terms of the GNU General Public License as published by
4949
the Free Software Foundation, either version 3 of the License, or
5050
(at your option) any later version.</p>
51-
<p>The PHPIDS library is included, in good faith, with this DVWA distribution. The operation of PHPIDS is provided without support from the DVWA team. It is licensed under <a href=\"".DVWA_WEB_PAGE_TO_ROOT."instructions.php?doc=PHPIDS-license\">separate terms</a> to the DVWA code.</p>
51+
<p>The PHPIDS library is included, in good faith, with this DVWA distribution. The operation of PHPIDS is provided without support from the DVWA team. It is licensed under <a href=\"" . DVWA_WEB_PAGE_TO_ROOT . "instructions.php?doc=PHPIDS-license\">separate terms</a> to the DVWA code.</p>
5252
5353
<h2>Development</h2>
5454
<p>Everyone is welcome to contribute and help make DVWA as successful as it can be. All contributors can have their name and link (if they wish) placed in the credits section. To contribute pick an Issue from the Project Home to work on or submit a patch to the Issues list.</p>
55-
</div>
56-
";
55+
</div>\n";
5756

5857
dvwaHtmlEcho( $page );
5958
exit;

config/config.inc.php

+5-4
Original file line numberDiff line numberDiff line change
@@ -17,17 +17,18 @@
1717
$_DVWA[ 'db_user' ] = 'root';
1818
$_DVWA[ 'db_password' ] = 'p@ssw0rd';
1919

20-
# Only used for PostgreSQL/PGSQL
20+
# Only used with PostgreSQL/PGSQL database selection.
2121
$_DVWA[ 'db_port '] = '5432';
2222

2323
# ReCAPTCHA settings
24-
# Get your keys at https://www.google.com/recaptcha/admin/create
24+
# Used for the 'Insecure CAPTCHA' module
25+
# You'll need to generate your own keys at: https://www.google.com/recaptcha/admin/create
2526
$_DVWA[ 'recaptcha_public_key' ] = '';
2627
$_DVWA[ 'recaptcha_private_key' ] = '';
2728

2829
# Default security level
29-
# The default is impossible, you may wish to set this to either low, medium or high.
30-
# If you specify an invalid level, DVWA will default to impossible.
30+
# Default value for the secuirty level with each session.
31+
# The default is 'impossible'. You may wish to set this to either 'low', 'medium', 'high' or impossible'.
3132
$_DVWA[ 'default_security_level' ] = 'impossible';
3233

3334
?>

0 commit comments

Comments
 (0)