SnowNoVA is a small web application I built to practise and explain web security concepts from the OWASP Top 10.
It runs locally on XAMPP and shows simple vulnerable examples next to more secure versions.
- Example pages for common web security issues, such as:
- SQL Injection (SQLi)
- Cross-Site Scripting (XSS)
- Insecure login / authentication problems
- Security Logging and Monitoring Failures
- Software and Data Integrity Failures
- Short notes on each page about:
- what the vulnerability is,
- how an attacker could abuse it,
- and what a more secure approach looks like.
- Simple logging examples to compare weak logging vs better logging.
- Frontend: HTML, CSS, basic JavaScript
- Backend: PHP (XAMPP / local server)
- Database: MySQL
-
Copy the project folder into your XAMPP
htdocsdirectory, for example:
C:\xampp\htdocs\SnowNoVA -
Start Apache and MySQL from XAMPP Control Panel.
-
Create the database in MySQL:
- Go to
http://localhost/phpmyadmin - Create a database (e.g.
snow_nova) - Import the SQL file used by the project. (The SQL files contain demo data only (test users created for the project, not real accounts)
- Go to
-
Update the database config in the project:
- Open the PHP config file that holds the connection details (e.g.
config.phporconfig/db.php) - Set your own:
- host
- username
- password
- database name
- Open the PHP config file that holds the connection details (e.g.
-
Open the site in your browser:
http://localhost/SnowNoVA
⚠️ This project is for educational purposes only.
Do not deploy these vulnerable examples to a public/production server.