Deliberately misconfigured web app on a Raspberry Pi for hands-on recon, scanning, and exploitation exercises.
Web apps are a major attack surface. This project builds a custom site on a Raspberry Pi (Apache + WebDAV) with intentional misconfigurations, then demonstrates reconnaissance, vulnerability scanning, and analysis & reporting workflows in a safe lab.
nmap, WhatWeb, and Burp Suite; run dirb, dirbuster, gobuster.nmap and nikto.nmap, whatweb, dirb, dirbuster, gobuster, Burp Suitenmap, niktoDeliberate misconfigurations make the target interesting for tools like Nmap, Nikto, and Burp Suite. WebDAV is enabled for file uploads.
Enable WebDAV with Basic Auth and intentionally weak credentials.


Apache Options Indexes exposes directory listings when no default index is present.


Hidden and obvious paths are created under /var/www/html to surface during directory busting and manual browsing.
Example: a public config.php containing sensitive information.

Convert index.html to index.php and inject reflected XSS via unsanitized query parameter.




Create a Bash helper script to run initial Nmap sweeps, then save results; run WhatWeb for tech fingerprinting.
Discover hidden/interesting paths with Dirb, Dirbuster, and Gobuster.
Intercept a GET request, send to Repeater, and probe different HTTP methods.



--script vulnExploit the vulnerable index.php by passing a crafted ?query= value.
http://192.168.1.103/index.php?query=test




Sanitize and encode user input before output. Example using htmlspecialchars():

Also consider strict input validation and a defensive Content-Security-Policy.


Weak Basic Auth on /webdav can be brute forced—or discovered via scanning. Once credentials are known, upload a PHP payload and gain a shell.






.png)
This lab demonstrates how misconfigurations are identified, exploited, and mitigated. It also reinforces a methodical workflow and clear documentation.
htmlspecialchars()), validate input, set CSP.Indexes in Apache; restrict access to sensitive files.X-Frame-Options, Content-Security-Policy, X-Content-Type-Options.Hands-on practice with a purposely vulnerable app sharpens recon, scanning, exploitation, and remediation skills—end-to-end.