Skip to content

AlexGoOn/the-most-vulnerable-dotnet-app

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

The Most Vulnerable .NET App - Educational Project

This application contains intentionally vulnerable code for educational purposes only!

Demo Image

This is an interactive educational project that demonstrates common security vulnerabilities in .NET applications. Each vulnerability is reproduced in a real working .NET environment where you can debug, explore, and understand what NOT to do, along with recommended secure practices.

Learning Process

  • Learn by Example: See real vulnerable code in action
  • Debug and Explore: Step through vulnerable code paths
  • Learn Best Practices: Each example includes secure alternatives
  • CWE (Common Weakness Enumeration) References: Every vulnerability links to official CWE documentation for pro insights

Note

This repository compliments the following YouTube video: I Built the Most Insecure .NET App

Vulnerability Categories

Injection Attacks


Cross-Site Scripting (XSS)

  • Stored XSS (CWE-79)
    Storing and displaying HTML content from database without sanitization

  • Reflected XSS (CWE-79)
    Displaying URL parameters without escaping in HTML

  • XSS With JS Interop (CWE-79)
    Client-side JavaScript manipulation with user input

  • XSS via Attributes (CWE-79)
    Injecting malicious code into HTML attributes

  • XSS via SVG (CWE-79)
    Embedding JavaScript in SVG files

  • XSS via File Upload (CWE-79)
    Uploading HTML files with malicious scripts

  • XSS via CSS (CWE-79)
    Using CSS expressions for code execution


Authentication & Authorization


Cryptography Issues


Sensitive Data Exposure


XML & Serialization


File Operations


Server-Side Request Forgery


Business Logic Flaws


API Security


How to Use This Project

  1. Browse the Categories: Start from the home page and explore vulnerabilities by category
  2. Read the Description: Each page explains the vulnerability and its impact
  3. Try the Attack: Use the provided attack payloads to see the vulnerability in action
  4. Debug the Code: Set breakpoints and step through the vulnerable code
  5. Study the Fix: Review the secure implementation recommendations
  6. Check CWE Links: Follow the CWE links for comprehensive security knowledge

Additional Resources

Contributing

This is an educational project. If you'd like to add more examples or enhance them, contributions are welcome!


Remember: The only way to truly understand security vulnerabilities is to see them in action. This project provides a safe, controlled environment to do exactly that. Happy learning!

About

This educational repository showcases the most common vulnerabilities found in .NET applications

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors