{
    "id": "51fee616-610a-380f-9fb7-6d65c95c0fd5",
    "name": "Mutillidae 2",
    "slug": "mutillidae-2",
    "status": "published",
    "lab_type": "pta",
    "is_sample": false,
    "duration_in_seconds": 1800,
    "metadata": {
        "courses": [
            "61376330-1586-4435-b0a1-07d64f68bfcb",
            "1b212166-e0a6-4b76-9111-0e77533801d9",
            "efacbe59-3b96-4634-a80d-4ed02fc396cc",
            "657cf698-108b-45a3-993c-d8e238ebbfaf",
            "c2e4c6a2-26ad-3af0-902a-9b0abc204219"
        ],
        "pta_sdn": "35",
        "collections": [],
        "pta_namespace": "attackdefenselabs",
        "learning_paths": [],
        "has_published_parent": true
    },
    "session": {
        "id": "408aae10-7bf7-4750-8977-4ec1352a727d",
        "user_id": "5dde02c1-353c-4e44-af4d-e217c38efd6a",
        "lab": {
            "id": "51fee616-610a-380f-9fb7-6d65c95c0fd5",
            "name": "Mutillidae 2",
            "lab_type": "pta"
        },
        "pta_url": "https://f2ff5mdtpmihe3n3r7wpnyefb.us-east-10.attackdefensecloudlabs.com",
        "last_started_at": "2024-11-05T10:36:27.958874Z",
        "terminated_at": "2024-11-05T10:43:12.178823Z",
        "running_time": 404,
        "metadata": {
            "layout": "tr-tr-qwerty",
            "region": "US-East",
            "context": {
                "parent_id": "1b212166-e0a6-4b76-9111-0e77533801d9",
                "parent_name": "Web Application Penetration Testing: SQL Injection Attacks",
                "parent_type": "course"
            }
        },
        "status": "terminated",
        "created": "2024-11-05T10:36:27.958900Z",
        "modified": "2024-11-05T10:43:12.183322Z",
        "duration_in_seconds": 392,
        "shutdown_time": 10800
    },
    "company": "a491bc32-c056-4946-9169-cc053387bada",
    "created": "2022-03-17T11:44:43.575591Z",
    "modified": "2024-12-30T22:21:33.518056Z",
    "is_beta": false,
    "lab_objectives": [],
    "main_learning_area": "3e1aa06f-2e9f-4789-b50d-aa027ad8dcfa",
    "learning_areas": [
        {
            "id": "3e1aa06f-2e9f-4789-b50d-aa027ad8dcfa",
            "name": "Cyber Security",
            "slug": "cyber-security"
        }
    ],
    "categories": [
        {
            "id": "f77fc016-f53c-4170-a059-5b8931c71546",
            "name": "Deliberately Vulnerable"
        },
        {
            "id": "097ee8d8-9317-4b68-855f-cf7f8fa36edc",
            "name": "Web Apps"
        }
    ],
    "tags": [],
    "difficulty": "professional",
    "is_web_access": false,
    "is_lab_experience": false,
    "is_featured": false,
    "cve": null,
    "severity": null,
    "year": null,
    "classification": null,
    "is_trackable": false,
    "cpe_credits": null,
    "is_skill_check": false,
    "external_url": "",
    "solution_video": null,
    "explanation_video": null,
    "description": "[Mutillidae 2](https://www.owasp.org/index.php/OWASP_Mutillidae_2_Project)\u00a0is a deliberately vulnerable web application created by Jeremy Druin and currently maintained by [OWASP](https://www.owasp.org). It is licensed under\u00a0[GPLv3](https://www.gnu.org/licenses/gpl-3.0.html).\n\nYou can download Mutillidae 2 locally and install it in a virtual machine. We are providing an online version to save you time and pain of having to do that.\u00a0  \n\n\nA sample set of vulnerabilities include:  \n\n\n* Authentication Bypass\n* SQL Injection\n* Click Jacking\n* DOM Injection\n* Cross Site Request Forgery\n* File Inclusion\n* Code Injection\n\nand many more.\u00a0\n\nThe following username and password may be used to explore the application:\n\n* User: samurai\u00a0 \u00a0 \u00a0 \u00a0 Password: samurai",
    "description_html": "<p><a href=\"https://www.owasp.org/index.php/OWASP_Mutillidae_2_Project\">Mutillidae 2</a>\u00a0is a deliberately vulnerable web application created by Jeremy Druin and currently maintained by <a href=\"https://www.owasp.org\">OWASP</a>. It is licensed under\u00a0<a href=\"https://www.gnu.org/licenses/gpl-3.0.html\">GPLv3</a>.</p>\n<p>You can download Mutillidae 2 locally and install it in a virtual machine. We are providing an online version to save you time and pain of having to do that.\u00a0  </p>\n<p>A sample set of vulnerabilities include:  </p>\n<ul>\n<li>Authentication Bypass</li>\n<li>SQL Injection</li>\n<li>Click Jacking</li>\n<li>DOM Injection</li>\n<li>Cross Site Request Forgery</li>\n<li>File Inclusion</li>\n<li>Code Injection</li>\n</ul>\n<p>and many more.\u00a0</p>\n<p>The following username and password may be used to explore the application:</p>\n<ul>\n<li>User: samurai\u00a0 \u00a0 \u00a0 \u00a0 Password: samurai</li>\n</ul>",
    "tasks": "",
    "tasks_html": "",
    "published_date": "2023-07-12T04:00:11.622595Z",
    "solutions": "",
    "solutions_html": "",
    "flags": [],
    "min_points_to_pass": null,
    "access_type": "default",
    "user_status": "finished",
    "user_lab_status": {
        "user_id": "5dde02c1-353c-4e44-af4d-e217c38efd6a",
        "lab": "51fee616-610a-380f-9fb7-6d65c95c0fd5",
        "status": "finished",
        "created": "2024-11-05T10:36:28.001817Z",
        "modified": "2024-11-05T10:42:54.332198Z",
        "lab_type": "pta",
        "flags": [],
        "lab_objectives": [],
        "last_activity_date": "2024-11-05T10:42:54.325033Z"
    },
    "user_status_modified": "2024-11-05T10:42:54.332198Z",
    "user_flags": [],
    "global_running_session": null
}