0
OWASP Mutillidae II: Web Pwn in Mass Production
Version: 2.6.30 Security Level: 1 (Client-side Security) Hints: Enabled (1 - 5cr1pt K1dd1e) Not Logged In
Home | Login/Register | Hide Popup Hints | Toggle Security | Enforce SSL | Reset DB | View Log | View Captured Data

 
 
 
 
 
 
 
Usage Instructions
Mutillidae implements vulnerabilities from the OWASP Top 10 2010 and 2007 in PHP. Additionally vulnerabilities from the SANS Top 25 Programming Errors and select information disclosure vulnerabilities have been exposed on various pages.

A project whitepaper is available to explain the features of Mutillidae and suggested use-cases.

Webpwnized Twitter Channel Introduction to OWASP Mutillidae II Web Pen Test Training Environment

The menu on the left is organized by category then vulnerability. Some vulnerabilities will be in more than one category as there is overlap between categories. Each page in Mutillidae will expose multiple vulnerabilities. Some pages have half a dozen and/or multiple critical vulnerabilities on the same page. The page will appear in the menu under each vulnerability.

A listing of vulnerabilities is available in menu under documentation or by clicking here.

Security Modes

Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of making as many challenges as possible, this can be defeated. The mode can be changed using the "Toggle Security" button on the top menu bar.

"Help Me" Button

There are multiple "hint systems" built into each page. The "Help Me" button provides a basic description of the vulnerabilities on the page for which the user should try exploits.

Bubble Hints

If the "Bubble Hints" are enabled (top menu bar), some of the vulnerable locations will have bubble hints pop up when the user hovers the mouse over the vulnerable field or area.

Page Hints

To get more hints, toggle the "Show Hints" button (top menu bar). A hints section will open at the bottom of the page. These are light-red in color. Toggling the "Show Hints" twice will show more detailed hints on some pages. These will be in yellow boxes below the 1st-level hints.

Just give me the exploit

Known exploits that are used in testing Mutillidae are located in /documentation/mutillidae-test-scripts.txt. There is some documentation for each exploit which explains usage and location.

Mutillidae is a "live" system. The vulnerabilities are real rather than emulated. This eliminates the frustration of having to "know what the author wants". Because of this, there are likely undocumented vulnerabilities. Also, this project endangers any machine on which it runs. Best practice is to run Mutillidae in a virtual machine isolated from the network which is only booted when using Mutillidae. Every effort has been made to make Mutillidae run entirely off-line to support best practice.

In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.