Web Security & Phishing Awareness Lab | Apache2, SSL, DVWA, Social Engineering Demos
| Field | Details |
|---|---|
| Student Name | Uliya Fatima |
| Student ID | 232098 |
| University | AIR University Islamabad |
| Department | Cyber Security |
| Subject | Web Security / Ethical Hacking |
| Assignment | Assignment 1 |
| Date | March 2026 |
| Platform | Kali Linux (VMware) |
This assignment demonstrates the setup of a secure web server on Kali Linux with a self-signed SSL certificate. The purpose is to understand how phishing attacks work in a controlled local lab environment.
β οΈ Disclaimer: All demonstrations were performed on a local machine only. No real users were targeted and no data was collected externally. This is purely for educational purposes.
- β Install and configure Apache2 web server on Kali Linux
- β Create and configure a Self-Signed SSL Certificate using OpenSSL
- β Host a secure HTTPS website locally
- β Install and configure DVWA (Damn Vulnerable Web Application)
- β Demonstrate phishing attack mechanisms through fake social media pages
- β Understand Social Engineering techniques
| Tool | Purpose |
|---|---|
| Kali Linux | Operating System (VMware) |
| Apache2 | Web Server |
| OpenSSL | Self-Signed SSL Certificate |
| DVWA | Vulnerable Web App for Practice |
| MariaDB | Database for DVWA |
| HTML / CSS | Custom Phishing Demo Pages |
| Bash / Terminal | Command Line Operations |
penetration-testing-232098-uliyaa/
β
βββ README.md # This file
β
βββ Section1_WebServer/
β βββ apache_install.png # Apache2 installation screenshot
β βββ apache_running.png # Apache2 running status
β βββ ssl_module.png # SSL module enabled
β βββ certificate_creation.png # Self-signed cert creation
β βββ https_verified.png # HTTPS verified in browser
β
βββ Section2_DVWA/
β βββ network_config.png # IP address and network info
β βββ dvwa_install.png # DVWA installation
β βββ dvwa_login.png # DVWA login page
β βββ dvwa_dashboard.png # DVWA vulnerability modules
β
βββ Section3_MainPage/
β βββ index.html # Main landing page
β βββ main_page_live.png # Main page in browser
β
βββ Section4_Facebook/
β βββ facebook/index.html # Fake Facebook login page
β βββ facebook_login.png # Facebook page screenshot
β βββ facebook_feed.png # Fake Facebook home feed
β
βββ Section5_YouTube/
β βββ youtube/index.html # Fake YouTube page
β βββ youtube_page.png # YouTube page screenshot
β βββ gmail_popup.png # Gmail popup triggered
β βββ gmail_password.png # Gmail password step
β
βββ Section6_Instagram/
β βββ instagram/index.html # Fake Instagram login page
β βββ instagram_login.png # Instagram page screenshot
β βββ instagram_feed.png # Fake Instagram home feed
β
βββ Section7_CredentialHarvesting/
βββ screenshots/ # Toolkit demonstration screenshots
Apache2 web server was installed on Kali Linux using the apt package manager. It hosts web pages locally on port 80 (HTTP) and port 443 (HTTPS).
sudo apt update
sudo apt install apache2 -y
sudo systemctl start apache2
sudo systemctl enable apache2
sudo systemctl status apache2SSL module was enabled and a self-signed certificate was generated using OpenSSL.
# Enable SSL module
sudo a2enmod ssl
# Create Self-Signed Certificate
sudo openssl req -x509 -nodes -days 365 -newkey rsa:2048 \
-keyout /etc/ssl/private/mysite.key \
-out /etc/ssl/certs/mysite.crtCertificate Details:
- Country: PK
- Organization: AIR UNIVERSITY
- Common Name: LIYAA
- Validity: 365 days
- Encryption: RSA 2048-bit
SSL Verification Result:
- β Verified by: AIR UNIVERSITY
- β Connection: Encrypted (TLS 1.3)
- β Cipher: TLS_AES_128_GCM_SHA256
ip a
# Result: eth0 β 192.168.17.128sudo apt install dvwa -y
sudo ln -s /usr/share/dvwa /var/www/html/dvwa
sudo systemctl start dvwa
sudo systemctl start mariadb
sudo systemctl restart apache2Access: https://localhost/dvwa
Credentials: admin / password
- Brute Force
- Command Injection
- CSRF
- File Inclusion
- SQL Injection
- XSS (Reflected & Stored)
- And more...
Custom dark-themed landing page created at /var/www/html/index.html
Features:
- Matrix rain canvas animation
- Glitch effect on title
- TLS/HTTPS status display
- Links to all demo pages
- AIR University branding
Access: https://localhost
Fake Facebook login page created to demonstrate social engineering.
sudo mkdir /var/www/html/facebook
sudo nano /var/www/html/facebook/index.htmlFeatures:
- Identical Facebook UI design
- Facebook blue color scheme (#1877f2)
- After login β redirects to fake home feed
- Stories, posts, contacts sidebar
Access: https://localhost/facebook
Fake YouTube page with Gmail credential popup.
sudo mkdir /var/www/html/youtube
sudo nano /var/www/html/youtube/index.htmlFeatures:
- Full YouTube UI with video player
- Sidebar with recommendations
- ANY click triggers Gmail Sign-in popup
- Gmail popup: Step 1 (email) β Step 2 (password with avatar)
Access: https://localhost/youtube
Fake Instagram login page as bonus task.
sudo mkdir /var/www/html/instagram
sudo nano /var/www/html/instagram/index.htmlFeatures:
- Identical Instagram UI
- Phone mockup on login page
- After login β fake home feed with stories and posts
Access: https://localhost/instagram
Demonstration of credential harvesting toolkit in a controlled lab environment.
β οΈ Note: This was performed entirely on local machine for educational demonstration only.
- Web Server Configuration β Apache2 setup, virtual hosts, port configuration
- SSL/TLS β Certificate creation, HTTPS setup, encryption verification
- Social Engineering β How phishing pages mimic legitimate websites
- DVWA β Practice environment for web vulnerabilities
- Phishing Awareness β Understanding attack vectors to better defend against them
This project was created ONLY for educational purposes as part of
AIR University Cyber Security curriculum.
β Do NOT use these techniques on real websites or real people
β Do NOT deploy these pages on public servers
β Do NOT collect real credentials
β
All tests performed on LOCAL machine only (VMware/Kali Linux)
β
No real users were targeted
β
No data was collected or transmitted externally
Uliya Fatima β AIR University Islamabad
π§ uliyafatima82@gmail.com
π Student ID: 232098 | Cyber Security Department
Made with π» for AIR University Cyber Security Assignment 1 | March 2026