Categories: Kali Linux

XVNA – Extreme Vulnerable Node Application

XVNA is an extraordinary vulnerable node application coded in Nodejs(Expressjs)/MongoDB that causes security aficionados to learn application security. It’s not advised to have this application online as it is proposed to be Vulnerable. We have a tendency to propose facilitating this application in local setting and honing your application security skills with any tools of your own choice. It’s all legitimate to hinder or hack into this. The idea is to evangelize application security to the group in most likely the best and elementary method. Learn and get these aptitudes for all time reason. be that as it may you use these abilities and substance isn’t our duty.

Warning

Extreme Vulnerable Node Application (XVNA) is most vulnerable, don’t transfer it to your hosting provider’s public folder or any net facing servers, as they’ll be compromised. It is recommended to use localhost.

Also Read Evasi0n Jailbreaking Tools For Apple iOS 7.x & 6.x Users

Setup XVNA

  • Start mongoDB
  • Create DB xvna in mongoDB
  • Import the Collection to mongoDB given from folder collection
  • Start the xvna from root folder using command: node index.js
  • We are good to go , hit localhost:3000/app
  • Login Credential: email-> admin@xvna.com password -> password

List of Vulnerability

  • A1:2017-Injection
    1. OS Injection
    2. NOSql Injection
    3. Server side Js Injection
  • A2:2017-Broken Authentication
  • A3:2017-Sensitive Data Exposure
    1. Sensitive Data
    2. Headers
  • A6:2017-Security Misconfiguration
  • A7:2017-Cross Site Scripting
  • A8:2017-Insecure Deserialization

Visit our blog for more https://www.vegabird.com/category/extreme-vulnerable-node-application/

Created by Vegabird Team

 

R K

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

3 days ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

7 days ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

7 days ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

1 week ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

1 week ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

2 weeks ago