Title:

Vulnerability Scanner using DVWA Testing Command Injection, SQL Injection, CSRF, XSS, and Brute Force

Poster

Preview Converted Images may contain errors

Abstract

Modern web applications are increasingly exposed to security threats that exploit common vulnerabilities. This project presents the development of a Python-based automated vulnerability scanner designed to detect five critical web security flaws: Command Injection, SQL Injection, Cross-Site Request Forgery (CSRF), Brute Force attacks, and DOM-based Cross-Site Scripting (XSS). To test these vulnerabilities safely, the Damn Vulnerable Web Application (DVWA) was used as a controlled environment. The scanner interacts with DVWA by sending requests that simulate malicious behavior and analyzes responses to determine exploit success. For example, command injection was identified by detecting unintended command execution results, while SQL Injection was verified through login bypasses. CSRF and Brute Force detection relied on session manipulation and repeated login attempts, respectively, and DOM-based XSS was confirmed via JavaScript payload execution. The project demonstrates how web applications respond differently to the same input depending on their security settings, emphasizing the importance of input validation, token checks, and request lifecycle awareness.

Authors

First Name Last Name
Jameson Dunsford

File Count: 1


Leave a comment

Comments are viewable only by submitter



Submission Details

Conference URC
Event Interdisciplinary Science and Engineering (ISE)
Department Computer Science (ISE)
Group Infrastructure
Added April 22, 2025, 11:23 a.m.
Updated April 22, 2025, 11:23 a.m.
See More Department Presentations Here