Skip to content

Latest commit

 

History

History
63 lines (42 loc) · 1.36 KB

README-en.md

File metadata and controls

63 lines (42 loc) · 1.36 KB

Vulnerability-goapp

Vulnerable golang Web application for education

Note

This application has some vulnerabilities So, Use for educational or research purposes only

Run-Environmant

  • docker-compose
    • golang
      • Vulnerability Application
      • CSRF-Trap Application
    • MySQL

Image

Image

How to Run

docker-compose

  1. cd Vulnerability-goapp
  2. docker-compose up

Web Application

  1. Access 'http://localhost:9090/login' on browser ( Google Chrome recommended )

CSRF-TRAP-Application

  1. Access 'http://localhost:3030/scrftrap' on browser ( Google Chrome recommended )

Note: If you run this app on SaaS (like EC2), CSRF-TRAP-Application view pages(HTML) need to change redirect form destination suit for running-environmant

./Trap

Note. CSRF will be expressed when you access this page, so please be careful when access this page

First Users

MailAddress: [email protected]
Password : Amuro,Ikima-su!
MailAddress: [email protected]
Password : AkaiSuisei

Admin Pages

  1. login some user and go top page
  2. go 'http://localhost:9090/adminlogin'
AdminMailAddress: [email protected]
Password : Qwerty1234

The Payloads

Payloads