config.py) to manage all default settings, paths, and credentials used during security audits.
Configuration File Location
All configuration settings are defined in:Default Target Settings
The default IP address used when running audits without specifying a custom target. This is typically set to your primary vulnerable test machine (e.g., DVWA).
The default network range used for network discovery mode (option 2). Uses CIDR notation to specify the subnet to scan.
DVWA Settings
Configuration for Damn Vulnerable Web Application (DVWA) attacks:URL path to the DVWA login page, used for authentication before launching attacks.
URL path to the SQL injection vulnerability page in DVWA, used as the primary target for SQLMap attacks.
Default username for DVWA authentication.
Default password for DVWA authentication.
WordPress Configuration
List of common WordPress installation paths to check during reconnaissance. The framework tests these paths to detect WordPress installations.
SQL Injection Endpoints
Generic fallback endpoints tested for SQL injection vulnerabilities when DVWA is not detected. These are common parameter patterns vulnerable to SQLi.
Wordlist Paths
Path to the wordlist used for WordPress brute-force attacks with WPScan. The rockyou.txt wordlist contains over 14 million passwords.
Path to the wordlist used for directory enumeration with Gobuster. The common.txt wordlist contains 4,614 common directory and file names.
See the Wordlists page for detailed information on wordlist selection and custom configurations.
Common Passwords List
A curated list of common passwords used for rapid hash cracking before attempting full wordlist attacks. This speeds up credential recovery for weak passwords.
Output Directory
Base directory for all audit output files. Created automatically if it doesn’t exist. All scan results, reports, and artifacts are stored in timestamped subdirectories.
Customizing Settings
To modify configuration settings:Best Practices
Target Configuration
Target Configuration
- Set
DEFAULT_TARGETto your primary test VM - Use
DEFAULT_NETWORKmatching your virtualization network (VirtualBox, VMware) - Keep production networks out of default configurations
Wordlist Management
Wordlist Management
- Verify wordlist paths exist:
ls -lh /usr/share/wordlists/ - Extract rockyou.txt if compressed:
gunzip /usr/share/wordlists/rockyou.txt.gz - Use smaller wordlists for faster testing during development
Security Considerations
Security Considerations
- Never store real production credentials in config.py
- Keep config.py out of version control if it contains sensitive paths
- Use environment variables for sensitive data in production deployments
Related Documentation
Target Configuration
Learn about setting custom targets and network ranges
Wordlist Configuration
Configure wordlists for brute-force and enumeration attacks