Skip to content

facetint/darkly

Repository files navigation

🕵️‍♂️ Darkly - Web Security & Exploitation

42 Project Security Focus

📑 Table of Contents

  1. Project Overview
  2. Discovered Vulnerabilities
  3. Key Features
  4. How to Use
  5. Learning Outcomes

Project Overview

Darkly is a web security project designed to run on an i386 virtual machine. The main goal is to explore, understand, and manually test common web vulnerabilities according to the OWASP Top 10 framework.

This project focuses on hands-on learning, where automation tools are avoided in favor of manual testing and understanding the underlying security issues.

🗂️ Discovered Vulnerabilities (Project Structure)

Based on the manual security audit, the following vulnerabilities were identified, exploited, and documented. Each directory contains the specific payload, methodology, and patching instructions.

.
├── 🔓 Authentication & Session Management
│   ├── brute_force/                 # Dictionary attacks and brute-forcing logins
│   └── cookie_manipulation/         # Privilege escalation via insecure cookies
│
├── 💉 Injection Flaws
│   ├── sql_injection_images/        # Union-based SQL injection on image endpoints
│   └── sql_injection_members/       # SQLi for extracting and decrypting member data
│
├── 📜 Cross-Site Scripting (XSS)
│   ├── reflected_xss_data_URI/      # Reflected XSS using base64 encoded payloads
│   └── stored_xss/                  # Stored XSS exploiting feedback/comment forms
│
├── 🕵️‍♂️ Information Disclosure & Misconfigurations
│   ├── directory_listing/           # Exploiting open directories
│   ├── information_disclosure_robots/ # Analyzing robots.txt for hidden paths
│   └── path_traversal/              # Directory traversal to access local server files
│
├── 🎭 Spoofing & Bypasses
│   ├── header_spoofing/             # Manipulating User-Agent & Referer headers
│   └── upload_mime_spoofing/        # Bypassing file upload restrictions via MIME types
│
└── 🔀 Logic & Access Flaws
    ├── hidden_field_manipulation/   # Tampering with hidden HTML form fields
    ├── open_redirect_site/          # Exploiting unvalidated redirects (e.g., footer links)
    └── parameter_tampering_vote/    # Manipulating voting parameters for logic abuse

✨ Key Features

  • Manual Exploitation: No automated scanners. Every vulnerability is discovered and exploited by hand.
  • Comprehensive Coverage: Testing spans across the OWASP Top 10, including injection flaws, broken access control, and misconfigurations.
  • Patching & Mitigation: Beyond exploitation, the project provides safe coding solutions and architectural fixes for each vulnerability.
  • Defense-in-Depth: Demonstrates the critical importance of strict input validation, context-aware output encoding, and secure session management.

How to Use

  1. Launch the VM: Start the provided i386 virtual machine.
  2. Access the Application: Open a web browser and navigate to the IP address displayed on the VM's terminal.
  3. Review the Audits: Navigate into any of the specific vulnerability folders (e.g., sql_injection_members/) to follow step-by-step testing methodologies, payloads, and proofs.

Learning Outcomes

By completing this project, the following milestones were achieved:

  • Deepened understanding of the OWASP Top 10 web vulnerabilities.
  • Developed a methodology for manually identifying and exploiting security flaws in a controlled environment.
  • Strengthened knowledge of secure coding practices, server misconfigurations, and patch implementation.

About

This project is a web security project running on an i386 VM, designed to explore and understand OWASP Top 10 vulnerabilities. The project includes manual testing of XSS, SQL Injection, IDOR, CSRF, and provides safe coding solutions for each issue.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages