0

Mutillidae II is a free, open source, deliberately vulnerable web-application providing a target for web-security enthusiest. Mutillidae can be installed on Linux and Windows using LAMP, WAMP, and XAMMP. Mutillide gives you penetration testing environment where you can check your skill in a legal way. This is an easy-to-use web hacking environment designed for labs, security enthusiast, classrooms, CTF, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, corporate web sec training courses, and as an "assess the assessor" target for vulnerability assessment software.


Features
  • Has over 35 vulnerablities and challenges. Contains at least one vulnearbility for each of the OWASP Top Ten 2007 and 2010
  • Actually Vulnerable (User not asked to enter “magic” statement)
  • Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. Mutillidae is confirmed to work on XAMPP, WAMP, and LAMP. XAMPP is the "default" deployment.
  • Installs easily by dropping project files into the "htdocs" folder of XAMPP.
  • Will attempt to detect if the MySQL database is available for the user
  • Preinstalled on Rapid7 Metasploitable 2, Samurai Web Testing Framework (WTF), and OWASP Broken Web Apps (BWA)
  • Contains 2 levels of hints to help users get started
  • Includes bubble-hints to help point out vulnerable locations
  • Bubble-hints automatically give more information as hint level incremented
  • System can be restored to default with single-click of "Setup" button
  • User can switch between secure and insecure modes
  • Secure and insecure source code for each page stored in the same PHP file for easy comparison
  • Provides data capture page and stores captured data in database and file
  • Allows SSL to be enforced in order to practice SSL stripping
  • Used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software
  • Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools
1. Download Mutillidae : Click Here
(Click image for large view)

2. Downloaded Zip File

3. Unzip download file

4. Go to Latest-mutillidae-2.6.10 → var → www → mutillidae then copy "mutillidae" folder. We will paste this folder in our Kali Linux OS. If your Host OS is not shared with your Guest OS then you can use a Pendrive for moving this folder. (If your folder has different name then rename it as mutillidae)

5. In Kali Linux Go to Computer → File system → var → www then Paste mutillidae folder. Please be sure your folder path is same as mine and Folder name should be also same.


6. Set permission of mutillidae into 0777. Open Terminal and type
chmod -R 0777 /var/www/mutillidae and Press enter

7. Run Apache, Go to Application → Kali Linux → System Service → HTTP → apache2start

8. Apache run successfully

9. Run My SQL, Go to Application → Kali Linux → System Service → MySQL → mysql start

10. My SQL run successfully

11. Now Create Database for mutilliade
→ Open Terminal  
→ type mysql –u root –p  and Press enter
→ when it ask for Password leave it blank and simply Press enter
→ now type create database mutillidae; and Press enter
→ Type exit and Press enter

12. Open Your Internet Browser and Write 127.0.0.1/mutillidae in your web address then Press Enter. If You have done everything correct you will get the Mutillidae Interface. Now, Click on Reset DB

13. Click OK
(Click image for large view)

14. Done

Note - You have to repeat Step 7 - Step 10 each time whenever you will restart your Kali Linux only then 127.0.0.1/mutillidae will be work in your browser. 

Like it ? Share it.

Post a Comment

Comment Rules :
1. Do not post Adult/illegal Links.
2. Try to comment in only English Language.
3. Do not post other website's links which are useless.
4. Your Comment should be based on the Topic for other queries Kindly Visit our Contact Us Page.
5. Do not use Abusive Language.
6. Respect each other.
Thank You for following the rules. Please Comment....

 
Top