19 April 2011 | 11,635 views

BodgeIt Store – Vulnerable Web Application For Penetration Testing

Don't let your data go over to the Dark Side!

There are various vulnerable web applications such as Jarlsberg, WackoPicko, Damn Vulnerable Web Application (DVWA), Vicnum, etc. Now we have another application that is vulnerable and ready to be exploited! The BodgeIt Store is a vulnerable web application which is currently aimed at people who are new to penetration testing.


  • Easy to install – just requires java and a servlet engine, e.g. Tomcat
  • Self contained (no additional dependencies other than to 2 in the above line)
  • Easy to change on the fly – all the functionality is implemented in JSPs, so no IDE required
  • Cross platform
  • Open source
  • No separate db to install and configure – it uses an ‘in memory’ db that is automatically (re)initialized on start up

There is also a ‘scoring’ page where you can see various hacking challenges and whether you have completed them or not.


All you need to do is download and open the zip file, and then extract the war file into the webapps directory of your favorite servlet engine.

Then point your browser at (for example) http://localhost:8080/bodgeit

The author recommends Zed Attack Proxy to get you started.

You can download BodgeIt Store here:


Or read more here.


Recent in Exploits/Vulnerabilities:
- PayPal Remote Code Execution Vulnerability Patched
- Fortinet SSH Backdoor Found In Firewalls
- Facebook Disabled Flash For Video Finally

Related Posts:
- Metasploitable – Test Your Metasploit Against A Vulnerable Host
- Hack.me – Build, Host & Share Vulnerable Web Application Code
- OWASP Bricks – Modular Deliberately Vulnerable Web Application

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 233,145 views
- AJAX: Is your application secure enough? - 119,822 views
- eEye Launches 0-Day Exploit Tracker - 85,360 views

Advertise on Darknet

2 Responses to “BodgeIt Store – Vulnerable Web Application For Penetration Testing”

  1. DEVIL'S BLOG ON SECURITY 20 April 2011 at 7:52 pm Permalink

    Thanks for the information, now I can have another addition to my list

  2. inzel 27 April 2011 at 4:24 pm Permalink

    Anyone have some guides on this? I have completed most of the “challenges” but seem to be stuck on some stuff. Any help is appreciated