Deliberately misconfigured web app on a Raspberry Pi for hands-on recon, scanning, and exploitation exercises.
Web apps are a major attack surface. This project builds a custom site on a Raspberry Pi (Apache + WebDAV) with intentional misconfigurations, then demonstrates reconnaissance, vulnerability scanning, and analysis & reporting workflows in a safe lab.
nmap
, WhatWeb, and Burp Suite; run dirb
, dirbuster
, gobuster
.nmap
and nikto
.nmap
, whatweb
, dirb
, dirbuster
, gobuster
, Burp Suitenmap
, nikto
Deliberate misconfigurations make the target interesting for tools like Nmap, Nikto, and Burp Suite. WebDAV is enabled for file uploads.
Enable WebDAV with Basic Auth and intentionally weak credentials.
Apache Options Indexes
exposes directory listings when no default index is present.
Hidden and obvious paths are created under /var/www/html
to surface during directory busting and manual browsing.
Example: a public config.php
containing sensitive information.
Convert index.html
to index.php
and inject reflected XSS via unsanitized query parameter.
Create a Bash helper script to run initial Nmap sweeps, then save results; run WhatWeb for tech fingerprinting.
Discover hidden/interesting paths with Dirb, Dirbuster, and Gobuster.
Intercept a GET
request, send to Repeater, and probe different HTTP methods.
--script vuln
Exploit the vulnerable index.php
by passing a crafted ?query=
value.
http://192.168.1.103/index.php?query=test
Sanitize and encode user input before output. Example using htmlspecialchars()
:
Also consider strict input validation and a defensive Content-Security-Policy.
Weak Basic Auth on /webdav
can be brute forced—or discovered via scanning. Once credentials are known, upload a PHP payload and gain a shell.
This lab demonstrates how misconfigurations are identified, exploited, and mitigated. It also reinforces a methodical workflow and clear documentation.
htmlspecialchars()
), validate input, set CSP.Indexes
in Apache; restrict access to sensitive files.X-Frame-Options
, Content-Security-Policy
, X-Content-Type-Options
.Hands-on practice with a purposely vulnerable app sharpens recon, scanning, exploitation, and remediation skills—end-to-end.