DVWA Web Application Vulnerability Research & Reporting
Organization: Cryptonic Area
Duration: 9 - 18 February 2026
This project is part of the Cyber Security & Ethical Hacking Research Module (v2026.02).
A manual security assessment was performed on Damn Vulnerable Web Application (DVWA) in a controlled Kali Linux lab environment.
The objective was to identify, exploit, analyze, and document web application vulnerabilities aligned with OWASP Top 10 categories.
Component
Details
Application
Damn Vulnerable Web Application (DVWA)
Platform
Kali Linux
Hosting
Localhost
Security Level
Low
Testing Type
Manual Penetration Testing
Reference Standard
OWASP Top 10
Objective ID
Objective Description
OBJ-01
Identify web application vulnerabilities
OBJ-02
Exploit vulnerabilities in controlled environment
OBJ-03
Capture Proof-of-Concept evidence
OBJ-04
Perform impact analysis
OBJ-05
Classify severity level
OBJ-06
Suggest remediation strategies
DVWA-Pentest-Project/
│
├── README.md
│
├── poc/
│ ├── Brute-Force.png
│ ├── Weak-Password.png
│ ├── XSS-Reflected.png
│ ├── XSS-Stored.png
│ ├── command.png
│ └── sql-injection.png
│
└── reports/
├── Brute-Force.md
├── Command-Injection.md
├── Final-Summary.md
├── SQL-injection.md
├── XSS-Reflected.md
├── XSS-Stored.md
└── weak-password-authentication.md
5. Vulnerability Summary Table
ID
Vulnerability
OWASP Category
Severity
Exploitable
Risk Impact
V-01
SQL Injection
Injection
Critical
Yes
Database Compromise
V-02
Command Injection
Injection
Critical
Yes
Remote Code Execution
V-03
Stored XSS
Cross-Site Scripting
High
Yes
Persistent Script Execution
V-04
Reflected XSS
Cross-Site Scripting
Medium
Yes
Session Hijacking
V-05
Brute Force
Authentication Failures
High
Yes
Account Takeover
V-06
Weak Password Authentication
Authentication Failures
High
Yes
Increased Attack Success Rate
6. Detailed Vulnerability Breakdown
📄 View Report
Attribute
Details
Severity
Critical
Attack Type
Injection
Impact
Unauthorized database access
Risk
Data leakage, authentication bypass
🔴 V-02: Command Injection
📄 View Report
Attribute
Details
Severity
Critical
Attack Type
OS Command Injection
Impact
Remote command execution
Risk
Full system compromise
📄 View Report
Attribute
Details
Severity
High
Attack Type
Persistent XSS
Impact
Malicious script execution
Risk
Session hijacking, credential theft
📄 View Report
Attribute
Details
Severity
Medium
Attack Type
Reflected XSS
Impact
Requires victim interaction
Risk
Social engineering exploitation
📄 View Report
Attribute
Details
Severity
High
Attack Type
Credential Guessing
Impact
Account takeover
Risk
Unauthorized admin access
🟠 V-06: Weak Password Authentication
📄 View Report
Attribute
Details
Severity
High
Attack Type
Weak Credential Policy
Impact
Increased brute-force success
Risk
Authentication bypass
7. Severity Classification Matrix
Severity Level
Description
Example
Critical
Direct system/database compromise
SQL Injection
High
Authentication bypass or persistent exploitation
Stored XSS
Medium
Requires user interaction
Reflected XSS
8. Security Weakness Observed
Security Control
Status
Input Validation
Not Implemented
Output Encoding
Not Implemented
Password Complexity
Not Enforced
Account Lockout
Not Implemented
Rate Limiting
Not Implemented
Secure Coding Practices
Weak
Skill Category
Description
Web Security Testing
Manual exploitation techniques
Vulnerability Research
Identifying root causes
Risk Assessment
Severity classification
Documentation
Professional reporting
Authentication Analysis
Password & brute-force testing
This project demonstrates hands-on experience in web application security assessment and professional vulnerability reporting.
The assessment highlights the importance of:
Secure input handling
Strong authentication mechanisms
Secure coding practices
Regular security testing
11. Risk Scoring (CVSS-Like Assessment)
To better quantify the security impact, a CVSS-inspired risk scoring model was applied based on:
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Impact on Confidentiality, Integrity, Availability
ID
Vulnerability
Severity
Likelihood (1–5)
Impact (1–5)
Risk Score (L×I)
Risk Level
V-01
SQL Injection
Critical
5
5
25
Critical
V-02
Command Injection
Critical
5
5
25
Critical
V-03
Stored XSS
High
4
4
16
High
V-04
Reflected XSS
Medium
3
3
9
Medium
V-05
Brute Force
High
4
4
16
High
V-06
Weak Password Authentication
High
5
4
20
High
Risk Level Interpretation
Score Range
Risk Level
20–25
Critical
15–19
High
8–14
Medium
1–7
Low
12. Attack Flow Diagram (High-Level Representation)
Below is a simplified attack flow illustrating how vulnerabilities were exploited during testing:
Attacker
│
├──> Identify Input Field
│
├──> Craft Malicious Payload
│
├──> Submit Payload to Application
│
├──> Application Processes Without Validation
│
├──> Vulnerability Triggered
│
├──> Unauthorized Access / Code Execution / Data Exposure
│
└──> Capture Proof-of-Concept Evidence
Example – SQL Injection Flow
User Input → Unsanitized Query → Database Execution → Data Disclosure
Example – Brute Force Flow
Login Form → Unlimited Attempts → Weak Password Accepted → Account Compromise
13. Security Maturity Assessment
A high-level security maturity evaluation was performed based on observed controls.
Security Domain
Status
Maturity Level
Input Validation
Not Implemented
Very Low
Output Encoding
Not Implemented
Very Low
Authentication Controls
Weak
Low
Password Policy
Not Enforced
Very Low
Rate Limiting
Not Implemented
Very Low
Secure Coding Practices
Poor
Low
Monitoring & Logging
Minimal
Low
Overall Security Maturity: 🔴 Very Low
The application under Low configuration lacks fundamental defensive controls, making exploitation straightforward.
14. Research Portfolio Series
This project is part of an ongoing structured cybersecurity research portfolio.
Project ID
Title
Focus Area
Status
Project 01
Linux Fundamentals & Security Basics
System Security
Completed
Project 02
DVWA Vulnerability Research & Reporting
Web Application Security
Completed
Project 03
Network Scanning & Enumeration Lab
Network Security
Planned
Project 04
Secure Coding & Defensive Controls
Application Security
Upcoming
The goal of this research series is to:
Build practical cybersecurity expertise
Develop structured vulnerability assessment methodology
Strengthen professional reporting skills
Demonstrate hands-on experience aligned with industry standards
DVWA Installation Steps (Kali Linux)
sudo apt update
sudo apt install dvwa
Open browser:
Mohan Singh Parmar
Cyber Security & Ethical Hacking Research – 2026