From a561e17f5a2596b2bd2f1b12fa49688594995cd5 Mon Sep 17 00:00:00 2001 From: zeus Date: Mon, 21 Feb 2022 19:28:25 +0200 Subject: [PATCH] add docs --- docs/modules/ROOT/pages/index.adoc | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/docs/modules/ROOT/pages/index.adoc b/docs/modules/ROOT/pages/index.adoc index fac616b..d9e6c76 100644 --- a/docs/modules/ROOT/pages/index.adoc +++ b/docs/modules/ROOT/pages/index.adoc @@ -33,19 +33,22 @@ Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is da - The aim of DVWA is to practice some of the most common web vulnerability, with various difficultly levels, with a simple straightforward interface. Please note, there are both documented and undocumented vulnerability with this software. This is intentional. You are encouraged to try and discover as many issues as possible. -# **WARNING** This Instance is vulnerable to several kinds of attacks, please don't deploy it to any public servers. +DANGER: **WARNING** This Instance is vulnerable to several kinds of attacks, please don't deploy it to any public servers. -## Damn Vulnerable Web Application is damn vulnerable! **Do not upload it to your hosting provider's public html folder or any Internet facing servers, as they will be compromised** +DANGER: Damn Vulnerable Web Application is damn vulnerable! **Do not upload it to your hosting provider's public html folder or any Internet facing servers, as they will be compromised** -# Disclaimer (*) +[TIP] +==== +Disclaimer (*) We do not take responsibility for the way in which any one uses this application (DVWA). We have made the purposes of the application clear and it should not be used maliciously. We have given warnings and taken measures to prevent users from installing DVWA on to live web servers. If your web server is compromised via an installation of DVWA, it is not our responsibility, it is the responsibility of the person/s who uploaded and installed it. (*) https://github.com/digininja/DVWA +==== -## Quickstart +== Web login Login with default credentials