Mutillidae: Deliberately Vulnerable PHP Scripts Of OWASP Top 10

Mutillidae implements the OWASP Top 10 in PHP. Feel free to use it in your own classes or videos, but if you do I'd love to hear about it.

Installation Instructions

Installation Instructions
 
Usage Instructions
Go to the OWASP Top 10 page to read about a vulnerability, then choose it from the list on the left to try it out. Hints may help. Mutillidae currently has two modes: secure and insecure (default). In insecure mode, the project works like Mutillidae 1.0. Pages are vulnerable to at least the topic they fall under in the menu. Most pages are vulnerable to much more. In secure mode, Mutillidae attempts to protect the pages with server side scripts. Also, hints are disabled in secure mode. In the interest of makign as many challenges as possible, this can be defeated. In Mutillidae 2.0, the code has been commented to allow the user to see how the defense works. To get the most out of the project, avoid reading the source code until after learning how to exploit it. But if you get stuck, the comments should help. Learning how the attack works should help to understand the defense.
 
PHP Errors
Get rid of PHP "strict" errors. They are not compatible with the OWASP ESAPI classes in use in Mutillidae 2.0. The error modifies headers disrupting functionality so this is not simply an annoyance issue. To do this, go to the PHP.INI file (default location C:\xampp\php\php.ini) and change the line that reads "error_reporting = E_ALL | E_STRICT" to "error_reporting = E_ALL & ~E_NOTICE & ~E_WARNING & ~E_DEPRECIATED".
 
Notes
 
Samurai WTF and Backtrack contains all the tools needed or you may build your own collection
Backtrack
Backtrack
Samurai Web Testing Framework
Samurai Web Testing Framework
Eclipse PDT PHP-MySQL PHP-MySQL