{
    "id": "f42fe53c-d7f8-3cd1-89e1-83408551a867",
    "name": "Damn Vulnerable Web Application",
    "slug": "damn-vulnerable-web-application",
    "status": "published",
    "lab_type": "pta",
    "is_sample": false,
    "duration_in_seconds": 1800,
    "metadata": {
        "courses": [
            "61376330-1586-4435-b0a1-07d64f68bfcb",
            "efacbe59-3b96-4634-a80d-4ed02fc396cc",
            "c2e4c6a2-26ad-3af0-902a-9b0abc204219"
        ],
        "pta_sdn": "34",
        "collections": [],
        "pta_namespace": "attackdefenselabs",
        "learning_paths": [],
        "has_published_parent": true
    },
    "session": null,
    "company": "a491bc32-c056-4946-9169-cc053387bada",
    "created": "2022-03-17T11:44:43.594626Z",
    "modified": "2024-12-30T22:21:33.397393Z",
    "is_beta": false,
    "lab_objectives": [],
    "main_learning_area": "3e1aa06f-2e9f-4789-b50d-aa027ad8dcfa",
    "learning_areas": [
        {
            "id": "3e1aa06f-2e9f-4789-b50d-aa027ad8dcfa",
            "name": "Cyber Security",
            "slug": "cyber-security"
        }
    ],
    "categories": [
        {
            "id": "f77fc016-f53c-4170-a059-5b8931c71546",
            "name": "Deliberately Vulnerable"
        },
        {
            "id": "097ee8d8-9317-4b68-855f-cf7f8fa36edc",
            "name": "Web Apps"
        }
    ],
    "tags": [],
    "difficulty": "professional",
    "is_web_access": false,
    "is_lab_experience": false,
    "is_featured": false,
    "cve": null,
    "severity": null,
    "year": null,
    "classification": null,
    "is_trackable": false,
    "cpe_credits": null,
    "is_skill_check": false,
    "external_url": "",
    "solution_video": null,
    "explanation_video": null,
    "description": "[Damn Vulnerable Web Application (DVWA](http://www.dvwa.co.uk/))\u00a0is a deliberately vulnerable web application created by Ryan Dewhurst. It is licensed under\u00a0[GPLv3](https://www.gnu.org/licenses/gpl-3.0.html).\n\nYou can download DVWA locally and install it in a virtual machine. We are providing an online version to save you the time and pain of having to do that.\u00a0  \n\n\nA sample set of vulnerabilities include:  \n\n\n* Cross Site Scripting\n* Command Injection\n* SQL Injection\n* File Upload/Inclusion\n\nand many more.\u00a0\n\nThe following username and password may be used to explore the application:\n\n* User: admin\u00a0 \u00a0 \u00a0 \u00a0 Password: password",
    "description_html": "<p><a href=\"http://www.dvwa.co.uk/\">Damn Vulnerable Web Application (DVWA</a>)\u00a0is a deliberately vulnerable web application created by Ryan Dewhurst. It is licensed under\u00a0<a href=\"https://www.gnu.org/licenses/gpl-3.0.html\">GPLv3</a>.</p>\n<p>You can download DVWA locally and install it in a virtual machine. We are providing an online version to save you the time and pain of having to do that.\u00a0  </p>\n<p>A sample set of vulnerabilities include:  </p>\n<ul>\n<li>Cross Site Scripting</li>\n<li>Command Injection</li>\n<li>SQL Injection</li>\n<li>File Upload/Inclusion</li>\n</ul>\n<p>and many more.\u00a0</p>\n<p>The following username and password may be used to explore the application:</p>\n<ul>\n<li>User: admin\u00a0 \u00a0 \u00a0 \u00a0 Password: password</li>\n</ul>",
    "tasks": "",
    "tasks_html": "",
    "published_date": "2023-08-29T13:53:08.236436Z",
    "solutions": "",
    "solutions_html": "",
    "flags": [],
    "min_points_to_pass": null,
    "access_type": "default",
    "user_status": "unstarted",
    "user_lab_status": null,
    "user_status_modified": null,
    "user_flags": [],
    "global_running_session": null
}