Newer
Older
[](https://gitlab.cylab.be/cylab/play/brute-force-matrix/-/commits/main)
[](https://gitlab.cylab.be/cylab/play/brute-force-matrix/-/releases)
[](https://labs.play-with-docker.com/?stack=https://gitlab.cylab.be/cylab/play/brute-force-matrix/-/raw/main/docker-compose.yml)
A web application that can be hacked using a brute force attack:
* there is a login form
* user has a weak password
* there is no rate limitation for login attempts
[](https://labs.play-with-docker.com/?stack=https://gitlab.cylab.be/cylab/play/brute-force-matrix/-/raw/main/docker-compose.yml)
Easiest way to run the vulnerable app is using docker-compose:
```bash
mkdir brute-force-matrix
cd brute-force-matrix
curl -o docker-compose.yml https://gitlab.cylab.be/cylab/play/brute-force-matrix/-/raw/main/docker-compose.yml
docker-compose up
```
After a few seconds, the app will be available at ```http://127.0.0.1:8000```
```bash
docker run -p 8000:80 gitlab.cylab.be:8081/cylab/play/brute-force-matrix
```
```bash
git clone https://gitlab.cylab.be/cylab/play/brute-force-matrix.git
cd brute-force-matrix/public
php -S localhost:8000
```