DVWA: Damn Vulnerable Web Application Brute Force Walkthrough (Medium Security)

"Disclaimer: The information provided in this article is intended for educational and research purposes only. It is not intended to promote or encourage any illegal or unethical activities. Always act responsibly and obtain proper consent before using any tools or techniques described in this article."


This tutorial demonstrates how you can complete a brute force attack on DVWA (Damn Vulnerable Web Application) on medium security.

We’re going to jump straight in, so if you haven’t already, I recommend working through the previous tutorial for the low-security brute-force attack.

Firstly, login into DVWA and change its security level to medium.



Now, Let’s start by running the same Hydra command from the last tutorial and see what happens:

hydra 10.0.2.5 -l admin -P password.txt http-get-form "/dvwa/vulnerabilities/brute/index.php:username=^USER^&password=^PASS^&Login=Login:Username and/or password incorrect."


 The above attack will still work. But what you should notice is that the attack takes significantly longer than before.

Source Code Analysis

  • Input sanitization

Old code:

  • Sleep after login failure

The walkthrough for brute forcing on high security will follow soon.


If you got stuck or have any questions, leave a comment, and I’ll do my best to get back to you.

No comments

Thank you for taking the time to leave a comment on my blog. I appreciate your feedback and contribution to the conversation on my blog. Your comment will be automatically approved and visible to other readers. Please note that while I encourage open and respectful dialogue, my team reserves the right to review and remove any comments that violate this blog's terms and conditions, or are considered to be spam or offensive.

Powered by Blogger.