<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bmayhew</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bmayhew"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Bmayhew"/>
		<updated>2026-04-26T09:23:31Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=208184</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=208184"/>
				<updated>2016-02-05T12:44:54Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoat Project==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/WebGoat/WebGoat/releases WebGoat 7.0]  is done.  The 6.0 release updated the UI and some infrastructure.  WebGoat 7 is the latest in a series of infrastructure improvements to move WebGoat into the modern era. With the new plugin architecture and separation of the server framework from the lessons, lessons now require just a few lines of code. Lessons can now be produced without having to understand the entirety of the WebGoat server.&lt;br /&gt;
&lt;br /&gt;
This release contains both the WebGoat container and 50+ lessons created by the WebGoat team..  Thank you to all the volunteers!! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Help Needed:===&lt;br /&gt;
&lt;br /&gt;
* We have an immediate need for Lesson Solutions and Lesson Translations.  There may be a little work involved with creating new strings for the translations but it is fairly easy work.&lt;br /&gt;
&lt;br /&gt;
* We also need UI developers with experience in any/all parts of the Web stack.  Please send an email to Bruce Mayhew webgoat@owasp.org and/or jason.white@owasp.org if you are interested in helping.&lt;br /&gt;
&lt;br /&gt;
* We'd love to update our content.  If you've run across a particularly interesting exploit in the field, create a lesson for it and contribute to the community.  Instructions for creating a lesson are under the General menu in WebGoat.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''WebGoat''' is a deliberately insecure web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. You can install and practice with WebGoat. There are other 'goats' such as [http://owasp.org/index.php/WebGoatFor.Net WebGoat for .Net]. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat applications. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application aims to provide a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started:&lt;br /&gt;
* For the Latest WebGoat (7.0, in development), go here: https://github.com/WebGoat/WebGoat&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WebGoat for J2EE is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross-site Scripting (XSS)]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race conditions|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP WebGoat Project is free to use. It is licensed under the GNU General Public License version 2.0 (GPLv2)&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors==&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
{{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WebGoat? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WebGoat Project provides:&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
The primary goal of the WebGoat project is simple: create a de-facto interactive teaching environment for web application security. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:webgoat@owasp.org Bruce Mayhew]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:nanneb@gmail.com Nanne Baars]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:jason.white@owasp.org Jason White]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*Latest Release @ [https://github.com/WebGoat/WebGoat/releasest WebGoat]&lt;br /&gt;
&lt;br /&gt;
*Source Code @ [https://github.com/WebGoat WebGoat on Github]&lt;br /&gt;
&lt;br /&gt;
*Latest Info @ [https://github.com/WebGoat/WebGoat/wiki WebGoat Project Wiki]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-webgoat Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
*WebGoat 7 please February 1, 2016 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
'''Q:''' Are you aware that lesson X does not work?  &lt;br /&gt;
&lt;br /&gt;
'''A:''' We may be.  Head over to https://github.com/WebGoat/WebGoat-Lessons and log an issue if there is a specific, you have encountered on a lesson. Give us as much information as you can.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Q:''' When will WebGoat 7 be 'released'?&lt;br /&gt;
&lt;br /&gt;
'''A:''' As soon as we can get a critical mass of lessons we feel are necessary. Current target is late January to Early Feb. 2016&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The rest are questions we hope people ask, but maybe haven't really yet ...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Q:''' Do you need help?&lt;br /&gt;
&lt;br /&gt;
'''A:''' Of course we would always love help, especially with testing and feedback.  Experienced Java, UI and Design folk are welcome as well. Security professionals willing to develop content are also welcome, of course.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Q:''' How do I get involved?&lt;br /&gt;
&lt;br /&gt;
'''A:''' Fork the repo. (https://help.github.com/articles/fork-a-repo/) you want to work on and stay in sync with the mainstream development in master (https://help.github.com/articles/syncing-a-fork/)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Q:''' What's the difference between the repo at https://github.com/WebGoat/WebGoat and the repo at https://github.com/WebGoat/WebGoat&lt;br /&gt;
&lt;br /&gt;
'''A:''' As of WebGoat 7, the architecture is more modular and lessons can be loaded dynamically. The first repo is for the 'container' or main 'framework' for containing lessons.  The WebGoat-Lessons repo. is for lesson development&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Q:''' How do I author a lesson for WebGoat?&lt;br /&gt;
&lt;br /&gt;
'''A:''' We are working on that.  For WebGoat 8, we plan to make that much simpler (read, no more ECS!). We still hope/plan to provide a stripped down lesson template for 7.x&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [https://github.com/WebGoat GitHub]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
== Road Map / Goals ==&lt;br /&gt;
The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Be the defacto standard web application security training environment&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Add educational support for secure coding practices&lt;br /&gt;
# Enhance enterprise lesson tracking&lt;br /&gt;
# Attract more contributions of lessons&lt;br /&gt;
# Translate all lessons to other languages&lt;br /&gt;
# Increase ease-of-use and expand user base&lt;br /&gt;
&lt;br /&gt;
Here are the current tasks defined to help us achieve these goals&lt;br /&gt;
&lt;br /&gt;
'''Architectural'''&lt;br /&gt;
* Create a service layer (done)&lt;br /&gt;
* Creater plugin architecture and port all lessons to plugins (done)&lt;br /&gt;
* Remove dependencies on Tomcat (done)&lt;br /&gt;
* Rewrite user administration to allow better user management (non-hackable)&lt;br /&gt;
* Fix Logoff (done)&lt;br /&gt;
* Defuse all lessons to disallow inadvertent harm to user's OS &lt;br /&gt;
&lt;br /&gt;
'''General'''&lt;br /&gt;
* General security cleanup. Remove exploits that are not lesson specific&lt;br /&gt;
* Remove non working lessons&lt;br /&gt;
&lt;br /&gt;
'''New Lessons'''&lt;br /&gt;
* Server side forward allows access to WEB-INF resources&lt;br /&gt;
* XML attacks - Entity recursion, ...&lt;br /&gt;
&lt;br /&gt;
== Getting Involved ==&lt;br /&gt;
For more information contact one of the project leads. Involvement in the development and promotion of WebGoat is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
If you'd like to contribute coding-wise ...&lt;br /&gt;
# Get on the WebGoat mailing list (http://lists.owasp.org/mailman/listinfo/owasp-webgoat)&lt;br /&gt;
# Fork one of the repo's on github:&lt;br /&gt;
## https://github.com/WebGoat/WebGoat &amp;lt;&amp;lt; this is the WebGoat 'container'. Instructions on getting up and running are here as well.&lt;br /&gt;
## https://github.com/WebGoat/WebGoat-Lessons &amp;lt;&amp;lt; this is the Lesson repository&lt;br /&gt;
# Keep you repo in sync (https://help.github.com/articles/syncing-a-fork/)&lt;br /&gt;
# Issue pull requests as you fix bugs, add features etc.&lt;br /&gt;
&lt;br /&gt;
'''Testers are always welcome/needed'''. Again, log issues and features requests at https://github.com/WebGoat/WebGoat. If you are a college or university and would like to use WebGoat for classes, we'd especially love to hear your feedback and what content/lessons you would like to see added to the project.&lt;br /&gt;
&lt;br /&gt;
'''Adding content/lesssons''' We are working to make adding your own content easier and to integrate with other OWASP projects/content. We'd love to hear from you to move this forward.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WebGoat_Project_Page}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=208180</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=208180"/>
				<updated>2016-02-05T12:30:17Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoat Project==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/WebGoat/WebGoat/releases WebGoat 7.0]  is done.  The 6.0 release updated the UI and some infrastructure.  WebGoat 7 is the latest in a series of infrastructure improvements to move WebGoat into the modern era. With the new plugin architecture and separation of the server framework from the lessons, lessons now require just a few lines of code. Lessons can now be produced without having to understand the entirety of the WebGoat server.&lt;br /&gt;
&lt;br /&gt;
This release contains both the WebGoat container and 50+ lessons created by the WebGoat team..  Thank you to all the volunteers!! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Help Needed:===&lt;br /&gt;
&lt;br /&gt;
* We have an immediate need for Lesson Solutions and Lesson Translations.  There may be a little work involved with creating new strings for the translations but it is fairly easy work.&lt;br /&gt;
&lt;br /&gt;
* We also need UI developers with experience in any/all parts of the Web stack.  Please send an email to Bruce Mayhew webgoat@owasp.org and/or jason.white@owasp.org if you are interested in helping.&lt;br /&gt;
&lt;br /&gt;
* We'd love to update our content.  If you've run across a particularly interesting exploit in the field, create a lesson for it and contribute to the community.  Instructions for creating a lesson are under the General menu in WebGoat.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''WebGoat''' is a deliberately insecure web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. You can install and practice with WebGoat. There are other 'goats' such as [http://owasp.org/index.php/WebGoatFor.Net WebGoat for .Net]. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat applications. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application aims to provide a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started:&lt;br /&gt;
* For the Latest WebGoat (7.0, in development), go here: https://github.com/WebGoat/WebGoat&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WebGoat for J2EE is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross-site Scripting (XSS)]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race conditions|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP WebGoat Project is free to use. It is licensed under the GNU General Public License version 2.0 (GPLv2)&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors==&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
{{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WebGoat? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WebGoat Project provides:&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
The primary goal of the WebGoat project is simple: create a de-facto interactive teaching environment for web application security. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:webgoat@owasp.org Bruce Mayhew]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:nanneb@gmail.com Nanne Baars]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:jason.white@owasp.org Jason White]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*Latest Release @ [https://github.com/WebGoat/WebGoat/releasest WebGoat]&lt;br /&gt;
&lt;br /&gt;
*Source Code @ [https://github.com/WebGoat WebGoat on Github]&lt;br /&gt;
&lt;br /&gt;
*Latest Info @ [https://github.com/WebGoat/WebGoat/wiki WebGoat Project Wiki]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-webgoat Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
*WebGoat 7 please February 1, 2016 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
'''Q:''' Are you aware that lesson X does not work?  &lt;br /&gt;
&lt;br /&gt;
'''A:''' We may be.  Head over to https://github.com/WebGoat/WebGoat-Lessons and log an issue if there is a specific, you have encountered on a lesson. Give us as much information as you can.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Q:''' When will WebGoat 7 be 'released'?&lt;br /&gt;
&lt;br /&gt;
'''A:''' As soon as we can get a critical mass of lessons we feel are necessary. Current target is late January to Early Feb. 2016&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The rest are questions we hope people ask, but maybe haven't really yet ...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Q:''' Do you need help?&lt;br /&gt;
&lt;br /&gt;
'''A:''' Of course we would always love help, especially with testing and feedback.  Experienced Java, UI and Design folk are welcome as well. Security professionals willing to develop content are also welcome, of course.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Q:''' How do I get involved?&lt;br /&gt;
&lt;br /&gt;
'''A:''' Fork the repo. (https://help.github.com/articles/fork-a-repo/) you want to work on and stay in sync with the mainstream development in master (https://help.github.com/articles/syncing-a-fork/)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Q:''' What's the difference between the repo at https://github.com/WebGoat/WebGoat and the repo at https://github.com/WebGoat/WebGoat&lt;br /&gt;
&lt;br /&gt;
'''A:''' As of WebGoat 7, the architecture is more modular and lessons can be loaded dynamically. The first repo is for the 'container' or main 'framework' for containing lessons.  The WebGoat-Lessons repo. is for lesson development&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Q:''' How do I author a lesson for WebGoat?&lt;br /&gt;
&lt;br /&gt;
'''A:''' We are working on that.  For WebGoat 8, we plan to make that much simpler (read, no more ECS!). We still hope/plan to provide a stripped down lesson template for 7.x&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [https://github.com/WebGoat GitHub]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
== Road Map / Goals ==&lt;br /&gt;
The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Be the defacto standard web application security training environment&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Add educational support for secure coding practices&lt;br /&gt;
# Enhance enterprise lesson tracking&lt;br /&gt;
# Attract more contributions of lessons&lt;br /&gt;
# Translate all lessons to other languages&lt;br /&gt;
# Increase ease-of-use and expand user base&lt;br /&gt;
&lt;br /&gt;
Here are the current tasks defined to help us achieve these goals&lt;br /&gt;
&lt;br /&gt;
'''Architectural'''&lt;br /&gt;
* Create a service layer (done)&lt;br /&gt;
* Creater plugin architecture and port all lessons to plugins (done)&lt;br /&gt;
* Remove dependencies on Tomcat (done)&lt;br /&gt;
* Rewrite user administration to allow better user management (non-hackable)&lt;br /&gt;
* Fix Logoff (done)&lt;br /&gt;
* Defuse all lessons to disallow inadvertent harm to user's OS &lt;br /&gt;
&lt;br /&gt;
'''General'''&lt;br /&gt;
* General security cleanup. Remove exploits that are not lesson specific&lt;br /&gt;
* Remove non working lessons&lt;br /&gt;
&lt;br /&gt;
'''New Lessons'''&lt;br /&gt;
* Server side forward allows access to WEB-INF resources&lt;br /&gt;
* XML attacks - Entity recursion, ...&lt;br /&gt;
&lt;br /&gt;
== Getting Involved ==&lt;br /&gt;
For more information contact one of the project leads. Involvement in the development and promotion of WebGoat is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
If you'd like to contribute coding-wise ...&lt;br /&gt;
# Get on the WebGoat mailing list (http://lists.owasp.org/mailman/listinfo/owasp-webgoat)&lt;br /&gt;
# Fork one of the repo's on github:&lt;br /&gt;
## https://github.com/WebGoat/WebGoat &amp;lt;&amp;lt; this is the WebGoat 'container'. Instructions on getting up and running are here as well.&lt;br /&gt;
## https://github.com/WebGoat/WebGoat-Lessons &amp;lt;&amp;lt; this is the Lesson repository&lt;br /&gt;
# Keep you repo in sync (https://help.github.com/articles/syncing-a-fork/)&lt;br /&gt;
# Issue pull requests as you fix bugs, add features etc.&lt;br /&gt;
&lt;br /&gt;
'''Testers are always welcome/needed'''. Again, log issues and features requests at https://github.com/WebGoat/WebGoat. If you are a college or university and would like to use WebGoat for classes, we'd especially love to hear your feedback and what content/lessons you would like to see added to the project.&lt;br /&gt;
&lt;br /&gt;
'''Adding content/lesssons''' We are working to make adding your own content easier and to integrate with other OWASP projects/content. We'd love to hear from you to move this forward.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WebGoat_Project_Page}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=199346</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=199346"/>
				<updated>2015-08-21T12:57:19Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoat Project==&lt;br /&gt;
&lt;br /&gt;
[http://webgoat.github.io WebGoat 7.0]  is almost done.  The 6.0 release updated the UI and some infrastructure.  The 7.0 release separates the WebGoat Lessons from the WebGoat framework.  Lessons are now plugins that can be worked on without the code overhead of the WebGoat framework.  This change with more UI improvements was a significant achievement.  Thank you to all the volunteers!! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Help Needed:===&lt;br /&gt;
&lt;br /&gt;
* We have an immediate need for Lesson Testing.  We are using GitHub issue tracking, so jump in and give some of the lessons a try.  We accept bugs, productive comments, and enhancement requests.&lt;br /&gt;
&lt;br /&gt;
* The new plugin architecture isolates the content to be translated to each lesson.  We could use some help with translating content and identifying quick wins for framework text that needs to be added to the translation properties.  Send email to the WebGoat mailing list if you wish to help out here.&lt;br /&gt;
&lt;br /&gt;
* We also need UI developers with javascript (Backbone/Underscore/JQuery and/or Single Page Application ... preferred, not required) experience as well as someone with design experience.  Please send an email to Bruce Mayhew webgoat@owasp.org and/or jason.white@owasp.org if you are interested in helping.&lt;br /&gt;
&lt;br /&gt;
* We need some new lessons.  If you've run across a particularly interesting exploit in the field, create a lesson for it and contribute to the community.  Instructions for creating a lesson are under the General menu in WebGoat.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''WebGoat''' is a deliberately insecure web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. You can install and practice with WebGoat in either J2EE (this page) or [http://owasp.org/index.php/WebGoatFor.Net WebGoat for .Net] in ASP.NET. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat applications. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started:&lt;br /&gt;
* WebGoat 5.X: read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]&lt;br /&gt;
* WebGoat Latest: download and documentation are on [http://webgoat.github.io GitHub]''' or visit the WebGoat Wiki on Github&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WebGoat for J2EE is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross-site Scripting (XSS)]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race conditions|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP WebGoat Project is free to use. It is licensed under the GNU General Public License version 2.0 (GPLv2)&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors==&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
{{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WebGoat? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WebGoat Project provides:&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
The primary goal of the WebGoat project is simple: create a de-facto interactive teaching environment for web application security. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
Aung Khant (YGN Ethical Hacker Group) has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at &lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/training/webgoat.php&lt;br /&gt;
&lt;br /&gt;
Feel free to contact him for any help with WebGoat.&lt;br /&gt;
&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#General General] &lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Code_Quality Code Quality]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Concurrency Concurrency ]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Unvalidated_Parameters Unvalidated Parameters]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Access_Control_Flaws Access Control Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Authentication_Flaws Authentication Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Session_Management_Flaws Session Management Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Cross-Site_Scripting_(XSS) Cross-Site Scripting (XSS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Buffer_Overflows Buffer Overflows]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Injection_Flaws Injection Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Storage Insecure Storage]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Denial_of_Service_(DOS) Denial of Service (DOS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Configuration_Insecure Configuration]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Web_Services Web Services]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#AJAX_Security AJAX Security]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Challenge Challenge]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:webgoat@owasp.org Bruce Mayhew]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*Latest Release @ [https://github.com/WebGoat/WebGoat-Legacy/releases/latest WebGoat-Legacy]&lt;br /&gt;
&lt;br /&gt;
*Source Code @ [https://github.com/WebGoat/WebGoat-Legacy WebGoat-Legacy on Github]&lt;br /&gt;
&lt;br /&gt;
*Latest Info @ [http://webgoat.github.io/ WebGoat Project Home]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-webgoat Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
*WebGoat 6.1 to be released fall 2015&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
*[http://www.lulu.com/shop/owasp/owasp-webgoat-and-webscarab/paperback/product-1889624.html Download or purchase on Lulu].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:WebGoat-Phishing-XSS-Lesson.JPG|500px]]  [[File:WebGoat-Bypass-Access-Control-Lesson.JPG|500px]]&lt;br /&gt;
&lt;br /&gt;
[[File:WebGoat-Session-Hijack-Lesson.JPG|500px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [https://github.com/WebGoat GitHub]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Be the defacto standard web application security training environment&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Test all the lessons in WebGoat 7 &lt;br /&gt;
# Add educational support for secure coding practices&lt;br /&gt;
# Enhance enterprise lesson tracking&lt;br /&gt;
# Attract more contributions of lessons&lt;br /&gt;
# Translate all lessons to other languages&lt;br /&gt;
# Increase ease-of-use and expand user base&lt;br /&gt;
&lt;br /&gt;
Here are the current tasks defined to help us achieve these goals&lt;br /&gt;
&lt;br /&gt;
'''Architectural'''&lt;br /&gt;
* Create a service layer (done)&lt;br /&gt;
* Creater plugin architecture and port all lessons to plugins (done)&lt;br /&gt;
* Remove dependencies on Tomcat (done)&lt;br /&gt;
* Rewrite user administration to allow better user management (non-hackable)&lt;br /&gt;
* Fix Logoff (done)&lt;br /&gt;
* Defuse all lessons to disallow inadvertent harm to user's OS &lt;br /&gt;
&lt;br /&gt;
'''General'''&lt;br /&gt;
* General security cleanup. Remove exploits that are not lesson specific&lt;br /&gt;
* Remove non working lessons&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
'''New Lessons'''&lt;br /&gt;
* Server side forward allows access to WEB-INF resources&lt;br /&gt;
* XML attacks - Entity recursion, ...&lt;br /&gt;
&lt;br /&gt;
For more information contact Bruce Mayhew at webgoat at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of WebGoat is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
=Previous Releases and Future Development=&lt;br /&gt;
==Previous Releases==&lt;br /&gt;
You can download WebGoat version 5.2 and older from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Standard===&lt;br /&gt;
This release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Developer===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
==Future Development==&lt;br /&gt;
WebGoat has been fairly stable for a few years.  The latest stable release as of Oct 7, 2013 is 5.4, and the development for 6.0 is underway at [http://code.google.com/p/webgoat/ | the WebGoat Google repo]. There are some issues on the WebGoat issues page that require fixing, any help there would be appreciated.&lt;br /&gt;
&lt;br /&gt;
Going forward WebGoat should take advantage of the training material provided at OWASP and incorporate that material into the lesson plans. WebGoat has been useful in educating security folks in the type of attacks and how they could be exploited.  WebGoat should start focusing on educating the security staff and developers on potential mitigation strategies.  I would also like to see an expansion of the report card feature and the enterprise architecture used for tracking the lessons completed.  WebGoat could be used in organizations as a introduction to secure coding practices.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WebGoat_Project_Page}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=199344</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=199344"/>
				<updated>2015-08-21T12:52:42Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Acknowledgements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoat Project==&lt;br /&gt;
&lt;br /&gt;
[http://webgoat.github.io WebGoat 7.0]  is almost done.  The 6.0 release updated the UI and some infrastructure.  The 7.0 release separates the WebGoat Lessons from the WebGoat framework.  Lessons are now plugins that can be worked on without the code overhead of the WebGoat framework.  This change with more UI improvements was a significant achievement.  Thank you to all the volunteers!! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Help Needed:===&lt;br /&gt;
&lt;br /&gt;
* We have an immediate need for Lesson Testing.  We are using GitHub issue tracking, so jump in and give some of the lessons a try.  We accept bugs, productive comments, and enhancement requests.&lt;br /&gt;
&lt;br /&gt;
* The new plugin architecture isolates the content to be translated to each lesson.  We could use some help with translating content and identifying quick wins for framework text that needs to be added to the translation properties.  Send email to the WebGoat mailing list if you wish to help out here.&lt;br /&gt;
&lt;br /&gt;
* We also need UI developers with javascript (Backbone/Underscore/JQuery and/or Single Page Application ... preferred, not required) experience as well as someone with design experience.  Please send an email to Bruce Mayhew webgoat@owasp.org and/or jason.white@owasp.org if you are interested in helping.&lt;br /&gt;
&lt;br /&gt;
* We need some new lessons.  If you've run across a particularly interesting exploit in the field, create a lesson for it and contribute to the community.  Instructions for creating a lesson are under the General menu in WebGoat.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''WebGoat''' is a deliberately insecure web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. You can install and practice with WebGoat in either J2EE (this page) or [http://owasp.org/index.php/WebGoatFor.Net WebGoat for .Net] in ASP.NET. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat applications. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started:&lt;br /&gt;
* WebGoat 5.X: read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]&lt;br /&gt;
* WebGoat Latest: download and documentation are on [http://webgoat.github.io GitHub]''' or visit the WebGoat Wiki on Github&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WebGoat for J2EE is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross-site Scripting (XSS)]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race conditions|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP WebGoat Project is free to use. It is licensed under the GNU General Public License version 2.0 (GPLv2)&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors==&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
{{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WebGoat? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WebGoat Project provides:&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
The primary goal of the WebGoat project is simple: create a de-facto interactive teaching environment for web application security. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
Aung Khant (YGN Ethical Hacker Group) has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at &lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/training/webgoat.php&lt;br /&gt;
&lt;br /&gt;
Feel free to contact him for any help with WebGoat.&lt;br /&gt;
&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#General General] &lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Code_Quality Code Quality]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Concurrency Concurrency ]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Unvalidated_Parameters Unvalidated Parameters]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Access_Control_Flaws Access Control Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Authentication_Flaws Authentication Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Session_Management_Flaws Session Management Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Cross-Site_Scripting_(XSS) Cross-Site Scripting (XSS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Buffer_Overflows Buffer Overflows]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Injection_Flaws Injection Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Storage Insecure Storage]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Denial_of_Service_(DOS) Denial of Service (DOS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Configuration_Insecure Configuration]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Web_Services Web Services]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#AJAX_Security AJAX Security]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Challenge Challenge]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:webgoat@owasp.org Bruce Mayhew]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*Latest Release @ [https://github.com/WebGoat/WebGoat-Legacy/releases/latest WebGoat-Legacy]&lt;br /&gt;
&lt;br /&gt;
*Source Code @ [https://github.com/WebGoat/WebGoat-Legacy WebGoat-Legacy on Github]&lt;br /&gt;
&lt;br /&gt;
*Latest Info @ [http://webgoat.github.io/ WebGoat Project Home]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-webgoat Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
*WebGoat 6.1 to be released fall 2015&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
*[http://www.lulu.com/shop/owasp/owasp-webgoat-and-webscarab/paperback/product-1889624.html Download or purchase on Lulu].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:WebGoat-Phishing-XSS-Lesson.JPG|500px]]  [[File:WebGoat-Bypass-Access-Control-Lesson.JPG|500px]]&lt;br /&gt;
&lt;br /&gt;
[[File:WebGoat-Session-Hijack-Lesson.JPG|500px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [https://github.com/WebGoat GitHub]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Be the defacto standard web application security training environment&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Demonstrate most common web application security vulnerabilities&lt;br /&gt;
# Add educational support for secure coding practices&lt;br /&gt;
# Enhance enterprise lesson tracking&lt;br /&gt;
# Attract more contributions of lessons&lt;br /&gt;
# Revisit existing lesson base to standardize lesson theme.&lt;br /&gt;
# Increase ease-of-use and expand user base&lt;br /&gt;
&lt;br /&gt;
Here are the current tasks defined to help us achieve these goals&lt;br /&gt;
&lt;br /&gt;
'''Architectural'''&lt;br /&gt;
* Replace basic authentication with forms based authentication&lt;br /&gt;
* Rewrite all lessons to follow common theme using common database&lt;br /&gt;
* Rewrite user administration to allow better user management (non-hackable)&lt;br /&gt;
* Fix Logoff&lt;br /&gt;
* Defuse all lessons to disallow inadvertent harm to user's OS &lt;br /&gt;
&lt;br /&gt;
'''General'''&lt;br /&gt;
* General security cleanup. Remove exploits that are not lesson specific&lt;br /&gt;
* Remove non working lessons&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
'''New Lessons'''&lt;br /&gt;
* Server side forward allows access to WEB-INF resources&lt;br /&gt;
* Account enumeration using webscarab&lt;br /&gt;
* SQLException lesson - could tie into overall error handling&lt;br /&gt;
* XML attacks - Entity recursion, ...&lt;br /&gt;
&lt;br /&gt;
For more information contact Bruce Mayhew at webgoat at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of WebGoat is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
=Previous Releases and Future Development=&lt;br /&gt;
==Previous Releases==&lt;br /&gt;
You can download WebGoat version 5.2 and older from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Standard===&lt;br /&gt;
This release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Developer===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
==Future Development==&lt;br /&gt;
WebGoat has been fairly stable for a few years.  The latest stable release as of Oct 7, 2013 is 5.4, and the development for 6.0 is underway at [http://code.google.com/p/webgoat/ | the WebGoat Google repo]. There are some issues on the WebGoat issues page that require fixing, any help there would be appreciated.&lt;br /&gt;
&lt;br /&gt;
Going forward WebGoat should take advantage of the training material provided at OWASP and incorporate that material into the lesson plans. WebGoat has been useful in educating security folks in the type of attacks and how they could be exploited.  WebGoat should start focusing on educating the security staff and developers on potential mitigation strategies.  I would also like to see an expansion of the report card feature and the enterprise architecture used for tracking the lessons completed.  WebGoat could be used in organizations as a introduction to secure coding practices.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WebGoat_Project_Page}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=199320</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=199320"/>
				<updated>2015-08-21T03:21:34Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoat Project==&lt;br /&gt;
&lt;br /&gt;
[http://webgoat.github.io WebGoat 7.0]  is almost done.  The 6.0 release updated the UI and some infrastructure.  The 7.0 release separates the WebGoat Lessons from the WebGoat framework.  Lessons are now plugins that can be worked on without the code overhead of the WebGoat framework.  This change with more UI improvements was a significant achievement.  Thank you to all the volunteers!! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Help Needed:===&lt;br /&gt;
&lt;br /&gt;
* We have an immediate need for Lesson Testing.  We are using GitHub issue tracking, so jump in and give some of the lessons a try.  We accept bugs, productive comments, and enhancement requests.&lt;br /&gt;
&lt;br /&gt;
* The new plugin architecture isolates the content to be translated to each lesson.  We could use some help with translating content and identifying quick wins for framework text that needs to be added to the translation properties.  Send email to the WebGoat mailing list if you wish to help out here.&lt;br /&gt;
&lt;br /&gt;
* We also need UI developers with javascript (Backbone/Underscore/JQuery and/or Single Page Application ... preferred, not required) experience as well as someone with design experience.  Please send an email to Bruce Mayhew webgoat@owasp.org and/or jason.white@owasp.org if you are interested in helping.&lt;br /&gt;
&lt;br /&gt;
* We need some new lessons.  If you've run across a particularly interesting exploit in the field, create a lesson for it and contribute to the community.  Instructions for creating a lesson are under the General menu in WebGoat.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''WebGoat''' is a deliberately insecure web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. You can install and practice with WebGoat in either J2EE (this page) or [http://owasp.org/index.php/WebGoatFor.Net WebGoat for .Net] in ASP.NET. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat applications. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started:&lt;br /&gt;
* WebGoat 5.X: read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]&lt;br /&gt;
* WebGoat Latest: download and documentation are on [http://webgoat.github.io GitHub]''' or visit the WebGoat Wiki on Github&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WebGoat for J2EE is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross-site Scripting (XSS)]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race conditions|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP WebGoat Project is free to use. It is licensed under the GNU General Public License version 2.0 (GPLv2)&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors==&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
{{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WebGoat? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WebGoat Project provides:&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
The primary goal of the WebGoat project is simple: create a de-facto interactive teaching environment for web application security. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
Aung Khant (YGN Ethical Hacker Group) has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at &lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/training/webgoat.php&lt;br /&gt;
&lt;br /&gt;
Feel free to contact him for any help with WebGoat.&lt;br /&gt;
&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#General General] &lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Code_Quality Code Quality]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Concurrency Concurrency ]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Unvalidated_Parameters Unvalidated Parameters]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Access_Control_Flaws Access Control Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Authentication_Flaws Authentication Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Session_Management_Flaws Session Management Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Cross-Site_Scripting_(XSS) Cross-Site Scripting (XSS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Buffer_Overflows Buffer Overflows]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Injection_Flaws Injection Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Storage Insecure Storage]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Denial_of_Service_(DOS) Denial of Service (DOS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Configuration_Insecure Configuration]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Web_Services Web Services]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#AJAX_Security AJAX Security]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Challenge Challenge]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:webgoat@owasp.org Bruce Mayhew]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*Latest Release @ [https://github.com/WebGoat/WebGoat-Legacy/releases/latest WebGoat-Legacy]&lt;br /&gt;
&lt;br /&gt;
*Source Code @ [https://github.com/WebGoat/WebGoat-Legacy WebGoat-Legacy on Github]&lt;br /&gt;
&lt;br /&gt;
*Latest Info @ [http://webgoat.github.io/ WebGoat Project Home]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-webgoat Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
*WebGoat 6.1 to be released fall 2015&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
*[http://www.lulu.com/shop/owasp/owasp-webgoat-and-webscarab/paperback/product-1889624.html Download or purchase on Lulu].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:WebGoat-Phishing-XSS-Lesson.JPG|500px]]  [[File:WebGoat-Bypass-Access-Control-Lesson.JPG|500px]]&lt;br /&gt;
&lt;br /&gt;
[[File:WebGoat-Session-Hijack-Lesson.JPG|500px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge] and [http://code.google.com/p/webgoat/downloads/list Google]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.ouncelabs.com Ounce Labs] for allowing me time to work on and run the WebGoat project during my day job!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Be the defacto standard web application security training environment&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Demonstrate most common web application security vulnerabilities&lt;br /&gt;
# Add educational support for secure coding practices&lt;br /&gt;
# Enhance enterprise lesson tracking&lt;br /&gt;
# Attract more contributions of lessons&lt;br /&gt;
# Revisit existing lesson base to standardize lesson theme.&lt;br /&gt;
# Increase ease-of-use and expand user base&lt;br /&gt;
&lt;br /&gt;
Here are the current tasks defined to help us achieve these goals&lt;br /&gt;
&lt;br /&gt;
'''Architectural'''&lt;br /&gt;
* Replace basic authentication with forms based authentication&lt;br /&gt;
* Rewrite all lessons to follow common theme using common database&lt;br /&gt;
* Rewrite user administration to allow better user management (non-hackable)&lt;br /&gt;
* Fix Logoff&lt;br /&gt;
* Defuse all lessons to disallow inadvertent harm to user's OS &lt;br /&gt;
&lt;br /&gt;
'''General'''&lt;br /&gt;
* General security cleanup. Remove exploits that are not lesson specific&lt;br /&gt;
* Remove non working lessons&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
'''New Lessons'''&lt;br /&gt;
* Server side forward allows access to WEB-INF resources&lt;br /&gt;
* Account enumeration using webscarab&lt;br /&gt;
* SQLException lesson - could tie into overall error handling&lt;br /&gt;
* XML attacks - Entity recursion, ...&lt;br /&gt;
&lt;br /&gt;
For more information contact Bruce Mayhew at webgoat at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of WebGoat is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
=Previous Releases and Future Development=&lt;br /&gt;
==Previous Releases==&lt;br /&gt;
You can download WebGoat version 5.2 and older from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Standard===&lt;br /&gt;
This release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Developer===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
==Future Development==&lt;br /&gt;
WebGoat has been fairly stable for a few years.  The latest stable release as of Oct 7, 2013 is 5.4, and the development for 6.0 is underway at [http://code.google.com/p/webgoat/ | the WebGoat Google repo]. There are some issues on the WebGoat issues page that require fixing, any help there would be appreciated.&lt;br /&gt;
&lt;br /&gt;
Going forward WebGoat should take advantage of the training material provided at OWASP and incorporate that material into the lesson plans. WebGoat has been useful in educating security folks in the type of attacks and how they could be exploited.  WebGoat should start focusing on educating the security staff and developers on potential mitigation strategies.  I would also like to see an expansion of the report card feature and the enterprise architecture used for tracking the lessons completed.  WebGoat could be used in organizations as a introduction to secure coding practices.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WebGoat_Project_Page}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=197853</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=197853"/>
				<updated>2015-07-23T20:39:32Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* OWASP WebGoat Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoat Project==&lt;br /&gt;
&lt;br /&gt;
[http://webgoat.github.io WebGoat 6.1]  is under way.  The 6.0 release updated the UI and some infrastructure.  The 6.1 release separates the WebGoat Lessons from the WebGoat framework.  Lessons are now plugins that can be worked on without the code overhead of the WebGoat framework &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Help Needed:===&lt;br /&gt;
&lt;br /&gt;
We have an immediate need for a UI developer with javascript (Backbone/Underscore/JQuery and/or Single Page Application ... preferred, not required) experience as well as someone with design experience.  Please send an email to Bruce Mayhew webgoat@owasp.org and/or jason.white@owasp.org if you are interested in helping.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''WebGoat''' is a deliberately insecure web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. You can install and practice with WebGoat in either J2EE (this page) or [http://owasp.org/index.php/WebGoatFor.Net WebGoat for .Net] in ASP.NET. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat applications. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started:&lt;br /&gt;
* WebGoat 5.X: read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]&lt;br /&gt;
* WebGoat 6.X: download and documentation are on [http://webgoat.github.io GitHub]'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WebGoat for J2EE is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross-site Scripting (XSS)]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race conditions|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP WebGoat Project is free to use. It is licensed under the GNU General Public License version 2.0 (GPLv2)&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors==&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
{{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WebGoat? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WebGoat Project provides:&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
The primary goal of the WebGoat project is simple: create a de-facto interactive teaching environment for web application security. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
Aung Khant (YGN Ethical Hacker Group) has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at &lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/training/webgoat.php&lt;br /&gt;
&lt;br /&gt;
Feel free to contact him for any help with WebGoat.&lt;br /&gt;
&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#General General] &lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Code_Quality Code Quality]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Concurrency Concurrency ]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Unvalidated_Parameters Unvalidated Parameters]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Access_Control_Flaws Access Control Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Authentication_Flaws Authentication Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Session_Management_Flaws Session Management Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Cross-Site_Scripting_(XSS) Cross-Site Scripting (XSS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Buffer_Overflows Buffer Overflows]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Injection_Flaws Injection Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Storage Insecure Storage]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Denial_of_Service_(DOS) Denial of Service (DOS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Configuration_Insecure Configuration]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Web_Services Web Services]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#AJAX_Security AJAX Security]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Challenge Challenge]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:webgoat@owasp.org Bruce Mayhew]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*Latest Release @ [https://github.com/WebGoat/WebGoat-Legacy/releases/latest WebGoat-Legacy]&lt;br /&gt;
&lt;br /&gt;
*Source Code @ [https://github.com/WebGoat/WebGoat-Legacy WebGoat-Legacy on Github]&lt;br /&gt;
&lt;br /&gt;
*Latest Info @ [http://webgoat.github.io/ WebGoat Project Home]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-webgoat Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
*WebGoat 6.1 to be released fall 2015&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
*[http://www.lulu.com/shop/owasp/owasp-webgoat-and-webscarab/paperback/product-1889624.html Download or purchase on Lulu].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:WebGoat-Phishing-XSS-Lesson.JPG|500px]]  [[File:WebGoat-Bypass-Access-Control-Lesson.JPG|500px]]&lt;br /&gt;
&lt;br /&gt;
[[File:WebGoat-Session-Hijack-Lesson.JPG|500px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge] and [http://code.google.com/p/webgoat/downloads/list Google]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.ouncelabs.com Ounce Labs] for allowing me time to work on and run the WebGoat project during my day job!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Be the defacto standard web application security training environment&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Demonstrate most common web application security vulnerabilities&lt;br /&gt;
# Add educational support for secure coding practices&lt;br /&gt;
# Enhance enterprise lesson tracking&lt;br /&gt;
# Attract more contributions of lessons&lt;br /&gt;
# Revisit existing lesson base to standardize lesson theme.&lt;br /&gt;
# Increase ease-of-use and expand user base&lt;br /&gt;
&lt;br /&gt;
Here are the current tasks defined to help us achieve these goals&lt;br /&gt;
&lt;br /&gt;
'''Architectural'''&lt;br /&gt;
* Replace basic authentication with forms based authentication&lt;br /&gt;
* Rewrite all lessons to follow common theme using common database&lt;br /&gt;
* Rewrite user administration to allow better user management (non-hackable)&lt;br /&gt;
* Fix Logoff&lt;br /&gt;
* Defuse all lessons to disallow inadvertent harm to user's OS &lt;br /&gt;
&lt;br /&gt;
'''General'''&lt;br /&gt;
* General security cleanup. Remove exploits that are not lesson specific&lt;br /&gt;
* Remove non working lessons&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
'''New Lessons'''&lt;br /&gt;
* Server side forward allows access to WEB-INF resources&lt;br /&gt;
* Account enumeration using webscarab&lt;br /&gt;
* SQLException lesson - could tie into overall error handling&lt;br /&gt;
* XML attacks - Entity recursion, ...&lt;br /&gt;
&lt;br /&gt;
For more information contact Bruce Mayhew at webgoat at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of WebGoat is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
=Previous Releases and Future Development=&lt;br /&gt;
==Previous Releases==&lt;br /&gt;
You can download WebGoat version 5.2 and older from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Standard===&lt;br /&gt;
This release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Developer===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
==Future Development==&lt;br /&gt;
WebGoat has been fairly stable for a few years.  The latest stable release as of Oct 7, 2013 is 5.4, and the development for 6.0 is underway at [http://code.google.com/p/webgoat/ | the WebGoat Google repo]. There are some issues on the WebGoat issues page that require fixing, any help there would be appreciated.&lt;br /&gt;
&lt;br /&gt;
Going forward WebGoat should take advantage of the training material provided at OWASP and incorporate that material into the lesson plans. WebGoat has been useful in educating security folks in the type of attacks and how they could be exploited.  WebGoat should start focusing on educating the security staff and developers on potential mitigation strategies.  I would also like to see an expansion of the report card feature and the enterprise architecture used for tracking the lessons completed.  WebGoat could be used in organizations as a introduction to secure coding practices.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WebGoat_Project_Page}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=197852</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=197852"/>
				<updated>2015-07-23T20:35:25Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoat Project==&lt;br /&gt;
&lt;br /&gt;
[http://webgoat.github.io WebGoat 6]  is under way.  The 6.0 beta release is a major modernization of the UI and framework.  &lt;br /&gt;
&lt;br /&gt;
The next release will migrate all the lessons to the new architecture.  You can help us prioritize which lessons to port and define new lessons to create by taking the [https://www.surveymonkey.com/s/OWASP-WebGoat-Modernization WebGoat survey]&lt;br /&gt;
&lt;br /&gt;
===Help Needed:===&lt;br /&gt;
&lt;br /&gt;
We have an immediate need for a UI developer with javascript (Backbone/Underscore/JQuery and/or Single Page Application ... preferred, not required) experience as well as someone with design experience.  Please send an email to Bruce Mayhew webgoat@owasp.org and/or jason.white@owasp.org if you are interested in helping.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''WebGoat''' is a deliberately insecure web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. You can install and practice with WebGoat in either J2EE (this page) or [http://owasp.org/index.php/WebGoatFor.Net WebGoat for .Net] in ASP.NET. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat applications. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started:&lt;br /&gt;
* WebGoat 5.X: read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]&lt;br /&gt;
* WebGoat 6.X: download and documentation are on [http://webgoat.github.io GitHub]'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WebGoat for J2EE is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross-site Scripting (XSS)]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race conditions|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP WebGoat Project is free to use. It is licensed under the GNU General Public License version 2.0 (GPLv2)&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors==&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
{{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WebGoat? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WebGoat Project provides:&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
The primary goal of the WebGoat project is simple: create a de-facto interactive teaching environment for web application security. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
Aung Khant (YGN Ethical Hacker Group) has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at &lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/training/webgoat.php&lt;br /&gt;
&lt;br /&gt;
Feel free to contact him for any help with WebGoat.&lt;br /&gt;
&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#General General] &lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Code_Quality Code Quality]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Concurrency Concurrency ]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Unvalidated_Parameters Unvalidated Parameters]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Access_Control_Flaws Access Control Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Authentication_Flaws Authentication Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Session_Management_Flaws Session Management Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Cross-Site_Scripting_(XSS) Cross-Site Scripting (XSS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Buffer_Overflows Buffer Overflows]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Injection_Flaws Injection Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Storage Insecure Storage]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Denial_of_Service_(DOS) Denial of Service (DOS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Configuration_Insecure Configuration]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Web_Services Web Services]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#AJAX_Security AJAX Security]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Challenge Challenge]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:webgoat@owasp.org Bruce Mayhew]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*Latest Release @ [https://github.com/WebGoat/WebGoat-Legacy/releases/latest WebGoat-Legacy]&lt;br /&gt;
&lt;br /&gt;
*Source Code @ [https://github.com/WebGoat/WebGoat-Legacy WebGoat-Legacy on Github]&lt;br /&gt;
&lt;br /&gt;
*Latest Info @ [http://webgoat.github.io/ WebGoat Project Home]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-webgoat Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
*WebGoat 6.1 to be released fall 2015&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
*[http://www.lulu.com/shop/owasp/owasp-webgoat-and-webscarab/paperback/product-1889624.html Download or purchase on Lulu].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:WebGoat-Phishing-XSS-Lesson.JPG|500px]]  [[File:WebGoat-Bypass-Access-Control-Lesson.JPG|500px]]&lt;br /&gt;
&lt;br /&gt;
[[File:WebGoat-Session-Hijack-Lesson.JPG|500px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge] and [http://code.google.com/p/webgoat/downloads/list Google]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.ouncelabs.com Ounce Labs] for allowing me time to work on and run the WebGoat project during my day job!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Be the defacto standard web application security training environment&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Demonstrate most common web application security vulnerabilities&lt;br /&gt;
# Add educational support for secure coding practices&lt;br /&gt;
# Enhance enterprise lesson tracking&lt;br /&gt;
# Attract more contributions of lessons&lt;br /&gt;
# Revisit existing lesson base to standardize lesson theme.&lt;br /&gt;
# Increase ease-of-use and expand user base&lt;br /&gt;
&lt;br /&gt;
Here are the current tasks defined to help us achieve these goals&lt;br /&gt;
&lt;br /&gt;
'''Architectural'''&lt;br /&gt;
* Replace basic authentication with forms based authentication&lt;br /&gt;
* Rewrite all lessons to follow common theme using common database&lt;br /&gt;
* Rewrite user administration to allow better user management (non-hackable)&lt;br /&gt;
* Fix Logoff&lt;br /&gt;
* Defuse all lessons to disallow inadvertent harm to user's OS &lt;br /&gt;
&lt;br /&gt;
'''General'''&lt;br /&gt;
* General security cleanup. Remove exploits that are not lesson specific&lt;br /&gt;
* Remove non working lessons&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
'''New Lessons'''&lt;br /&gt;
* Server side forward allows access to WEB-INF resources&lt;br /&gt;
* Account enumeration using webscarab&lt;br /&gt;
* SQLException lesson - could tie into overall error handling&lt;br /&gt;
* XML attacks - Entity recursion, ...&lt;br /&gt;
&lt;br /&gt;
For more information contact Bruce Mayhew at webgoat at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of WebGoat is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
=Previous Releases and Future Development=&lt;br /&gt;
==Previous Releases==&lt;br /&gt;
You can download WebGoat version 5.2 and older from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Standard===&lt;br /&gt;
This release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Developer===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
==Future Development==&lt;br /&gt;
WebGoat has been fairly stable for a few years.  The latest stable release as of Oct 7, 2013 is 5.4, and the development for 6.0 is underway at [http://code.google.com/p/webgoat/ | the WebGoat Google repo]. There are some issues on the WebGoat issues page that require fixing, any help there would be appreciated.&lt;br /&gt;
&lt;br /&gt;
Going forward WebGoat should take advantage of the training material provided at OWASP and incorporate that material into the lesson plans. WebGoat has been useful in educating security folks in the type of attacks and how they could be exploited.  WebGoat should start focusing on educating the security staff and developers on potential mitigation strategies.  I would also like to see an expansion of the report card feature and the enterprise architecture used for tracking the lessons completed.  WebGoat could be used in organizations as a introduction to secure coding practices.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WebGoat_Project_Page}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=197851</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=197851"/>
				<updated>2015-07-23T20:34:26Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoat Project==&lt;br /&gt;
&lt;br /&gt;
[http://webgoat.github.io WebGoat 6]  is under way.  The 6.0 beta release is a major modernization of the UI and framework.  &lt;br /&gt;
&lt;br /&gt;
The next release will migrate all the lessons to the new architecture.  You can help us prioritize which lessons to port and define new lessons to create by taking the [https://www.surveymonkey.com/s/OWASP-WebGoat-Modernization WebGoat survey]&lt;br /&gt;
&lt;br /&gt;
===Help Needed:===&lt;br /&gt;
&lt;br /&gt;
We have an immediate need for a UI developer with javascript (Backbone/Underscore/JQuery and/or Single Page Application ... preferred, not required) experience as well as someone with design experience.  Please send an email to Bruce Mayhew webgoat@owasp.org and/or jason.white@owasp.org if you are interested in helping.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''WebGoat''' is a deliberately insecure web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. You can install and practice with WebGoat in either J2EE (this page) or [http://owasp.org/index.php/WebGoatFor.Net WebGoat for .Net] in ASP.NET. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat applications. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started:&lt;br /&gt;
* WebGoat 5.X: read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]&lt;br /&gt;
* WebGoat 6.X: download and documentation are on [http://webgoat.github.io GitHub]'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WebGoat for J2EE is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross-site Scripting (XSS)]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race conditions|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP WebGoat Project is free to use. It is licensed under the GNU General Public License version 2.0 (GPLv2)&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors==&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
{{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WebGoat? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WebGoat Project provides:&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
The primary goal of the WebGoat project is simple: create a de-facto interactive teaching environment for web application security. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
Aung Khant (YGN Ethical Hacker Group) has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at &lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/training/webgoat.php&lt;br /&gt;
&lt;br /&gt;
Feel free to contact him for any help with WebGoat.&lt;br /&gt;
&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#General General] &lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Code_Quality Code Quality]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Concurrency Concurrency ]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Unvalidated_Parameters Unvalidated Parameters]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Access_Control_Flaws Access Control Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Authentication_Flaws Authentication Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Session_Management_Flaws Session Management Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Cross-Site_Scripting_(XSS) Cross-Site Scripting (XSS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Buffer_Overflows Buffer Overflows]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Injection_Flaws Injection Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Storage Insecure Storage]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Denial_of_Service_(DOS) Denial of Service (DOS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Configuration_Insecure Configuration]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Web_Services Web Services]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#AJAX_Security AJAX Security]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Challenge Challenge]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:webgoat@owasp.org Bruce Mayhew]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*Latest Release @ [https://github.com/WebGoat/WebGoat-Legacy/releases/latest WebGoat-Legacy]&lt;br /&gt;
&lt;br /&gt;
*Source Code @ [https://github.com/WebGoat/WebGoat-Legacy WebGoat-Legacy on Github]&lt;br /&gt;
&lt;br /&gt;
*Latest Info @ [http://webgoat.github.io/ WebGoat Project Home]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-webgoat Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
*WebGoat 6 to be released Sept 16 2014&lt;br /&gt;
&lt;br /&gt;
*Join us at AppSec USA in the project summit room Friday Sept 19th 9-12AM&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
*[http://www.lulu.com/shop/owasp/owasp-webgoat-and-webscarab/paperback/product-1889624.html Download or purchase on Lulu].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:WebGoat-Phishing-XSS-Lesson.JPG|500px]]  [[File:WebGoat-Bypass-Access-Control-Lesson.JPG|500px]]&lt;br /&gt;
&lt;br /&gt;
[[File:WebGoat-Session-Hijack-Lesson.JPG|500px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge] and [http://code.google.com/p/webgoat/downloads/list Google]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.ouncelabs.com Ounce Labs] for allowing me time to work on and run the WebGoat project during my day job!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Be the defacto standard web application security training environment&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Demonstrate most common web application security vulnerabilities&lt;br /&gt;
# Add educational support for secure coding practices&lt;br /&gt;
# Enhance enterprise lesson tracking&lt;br /&gt;
# Attract more contributions of lessons&lt;br /&gt;
# Revisit existing lesson base to standardize lesson theme.&lt;br /&gt;
# Increase ease-of-use and expand user base&lt;br /&gt;
&lt;br /&gt;
Here are the current tasks defined to help us achieve these goals&lt;br /&gt;
&lt;br /&gt;
'''Architectural'''&lt;br /&gt;
* Replace basic authentication with forms based authentication&lt;br /&gt;
* Rewrite all lessons to follow common theme using common database&lt;br /&gt;
* Rewrite user administration to allow better user management (non-hackable)&lt;br /&gt;
* Fix Logoff&lt;br /&gt;
* Defuse all lessons to disallow inadvertent harm to user's OS &lt;br /&gt;
&lt;br /&gt;
'''General'''&lt;br /&gt;
* General security cleanup. Remove exploits that are not lesson specific&lt;br /&gt;
* Remove non working lessons&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
'''New Lessons'''&lt;br /&gt;
* Server side forward allows access to WEB-INF resources&lt;br /&gt;
* Account enumeration using webscarab&lt;br /&gt;
* SQLException lesson - could tie into overall error handling&lt;br /&gt;
* XML attacks - Entity recursion, ...&lt;br /&gt;
&lt;br /&gt;
For more information contact Bruce Mayhew at webgoat at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of WebGoat is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
=Previous Releases and Future Development=&lt;br /&gt;
==Previous Releases==&lt;br /&gt;
You can download WebGoat version 5.2 and older from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Standard===&lt;br /&gt;
This release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Developer===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
==Future Development==&lt;br /&gt;
WebGoat has been fairly stable for a few years.  The latest stable release as of Oct 7, 2013 is 5.4, and the development for 6.0 is underway at [http://code.google.com/p/webgoat/ | the WebGoat Google repo]. There are some issues on the WebGoat issues page that require fixing, any help there would be appreciated.&lt;br /&gt;
&lt;br /&gt;
Going forward WebGoat should take advantage of the training material provided at OWASP and incorporate that material into the lesson plans. WebGoat has been useful in educating security folks in the type of attacks and how they could be exploited.  WebGoat should start focusing on educating the security staff and developers on potential mitigation strategies.  I would also like to see an expansion of the report card feature and the enterprise architecture used for tracking the lessons completed.  WebGoat could be used in organizations as a introduction to secure coding practices.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WebGoat_Project_Page}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=197850</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=197850"/>
				<updated>2015-07-23T20:33:22Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoat Project==&lt;br /&gt;
&lt;br /&gt;
[http://webgoat.github.io WebGoat 6]  is under way.  The 6.0 beta release is a major modernization of the UI and framework.  &lt;br /&gt;
&lt;br /&gt;
The next release will migrate all the lessons to the new architecture.  You can help us prioritize which lessons to port and define new lessons to create by taking the [https://www.surveymonkey.com/s/OWASP-WebGoat-Modernization WebGoat survey]&lt;br /&gt;
&lt;br /&gt;
===Help Needed:===&lt;br /&gt;
&lt;br /&gt;
We have an immediate need for a UI developer with javascript (Backbone/Underscore/JQuery and/or Single Page Application ... preferred, not required) experience as well as someone with design experience.  Please send an email to Bruce Mayhew webgoat@owasp.org and/or jason.white@owasp.org if you are interested in helping.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
'''WebGoat''' is a deliberately insecure web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. You can install and practice with WebGoat in either J2EE (this page) or [http://owasp.org/index.php/WebGoatFor.Net WebGoat for .Net] in ASP.NET. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat applications. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started:&lt;br /&gt;
* WebGoat 5.X: read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]&lt;br /&gt;
* WebGoat 6.X: download and documentation are on [http://webgoat.github.io GitHub]'''&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
WebGoat for J2EE is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross-site Scripting (XSS)]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race conditions|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP WebGoat Project is free to use. It is licensed under the GNU General Public License version 2.0 (GPLv2)&lt;br /&gt;
&lt;br /&gt;
==Project Sponsors==&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
{{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is WebGoat? ==&lt;br /&gt;
&lt;br /&gt;
OWASP WebGoat Project provides:&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
The primary goal of the WebGoat project is simple: create a de-facto interactive teaching environment for web application security. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
Aung Khant (YGN Ethical Hacker Group) has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at &lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/training/webgoat.php&lt;br /&gt;
&lt;br /&gt;
Feel free to contact him for any help with WebGoat.&lt;br /&gt;
&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#General General] &lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Code_Quality Code Quality]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Concurrency Concurrency ]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Unvalidated_Parameters Unvalidated Parameters]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Access_Control_Flaws Access Control Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Authentication_Flaws Authentication Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Session_Management_Flaws Session Management Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Cross-Site_Scripting_(XSS) Cross-Site Scripting (XSS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Buffer_Overflows Buffer Overflows]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Injection_Flaws Injection Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Storage Insecure Storage]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Denial_of_Service_(DOS) Denial of Service (DOS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Configuration_Insecure Configuration]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Web_Services Web Services]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#AJAX_Security AJAX Security]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Challenge Challenge]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:webgoat@owasp.org Bruce Mayhew]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*Latest Release @ [https://github.com/WebGoat/WebGoat-Legacy/releases/latest]&lt;br /&gt;
&lt;br /&gt;
*Source Code @ https://github.com/WebGoat/WebGoat-Legacy WebGoat-Legacy on Github]&lt;br /&gt;
&lt;br /&gt;
*Latest Info @ [http://webgoat.github.io/ WebGoat Project Home]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-webgoat Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
*WebGoat 6 to be released Sept 16 2014&lt;br /&gt;
&lt;br /&gt;
*Join us at AppSec USA in the project summit room Friday Sept 19th 9-12AM&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
*[http://www.lulu.com/shop/owasp/owasp-webgoat-and-webscarab/paperback/product-1889624.html Download or purchase on Lulu].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Midlevel projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:WebGoat-Phishing-XSS-Lesson.JPG|500px]]  [[File:WebGoat-Bypass-Access-Control-Lesson.JPG|500px]]&lt;br /&gt;
&lt;br /&gt;
[[File:WebGoat-Session-Hijack-Lesson.JPG|500px]]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge] and [http://code.google.com/p/webgoat/downloads/list Google]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.ouncelabs.com Ounce Labs] for allowing me time to work on and run the WebGoat project during my day job!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Be the defacto standard web application security training environment&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Demonstrate most common web application security vulnerabilities&lt;br /&gt;
# Add educational support for secure coding practices&lt;br /&gt;
# Enhance enterprise lesson tracking&lt;br /&gt;
# Attract more contributions of lessons&lt;br /&gt;
# Revisit existing lesson base to standardize lesson theme.&lt;br /&gt;
# Increase ease-of-use and expand user base&lt;br /&gt;
&lt;br /&gt;
Here are the current tasks defined to help us achieve these goals&lt;br /&gt;
&lt;br /&gt;
'''Architectural'''&lt;br /&gt;
* Replace basic authentication with forms based authentication&lt;br /&gt;
* Rewrite all lessons to follow common theme using common database&lt;br /&gt;
* Rewrite user administration to allow better user management (non-hackable)&lt;br /&gt;
* Fix Logoff&lt;br /&gt;
* Defuse all lessons to disallow inadvertent harm to user's OS &lt;br /&gt;
&lt;br /&gt;
'''General'''&lt;br /&gt;
* General security cleanup. Remove exploits that are not lesson specific&lt;br /&gt;
* Remove non working lessons&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
'''New Lessons'''&lt;br /&gt;
* Server side forward allows access to WEB-INF resources&lt;br /&gt;
* Account enumeration using webscarab&lt;br /&gt;
* SQLException lesson - could tie into overall error handling&lt;br /&gt;
* XML attacks - Entity recursion, ...&lt;br /&gt;
&lt;br /&gt;
For more information contact Bruce Mayhew at webgoat at owasp dot org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of WebGoat is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
=Previous Releases and Future Development=&lt;br /&gt;
==Previous Releases==&lt;br /&gt;
You can download WebGoat version 5.2 and older from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Standard===&lt;br /&gt;
This release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Developer===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
==Future Development==&lt;br /&gt;
WebGoat has been fairly stable for a few years.  The latest stable release as of Oct 7, 2013 is 5.4, and the development for 6.0 is underway at [http://code.google.com/p/webgoat/ | the WebGoat Google repo]. There are some issues on the WebGoat issues page that require fixing, any help there would be appreciated.&lt;br /&gt;
&lt;br /&gt;
Going forward WebGoat should take advantage of the training material provided at OWASP and incorporate that material into the lesson plans. WebGoat has been useful in educating security folks in the type of attacks and how they could be exploited.  WebGoat should start focusing on educating the security staff and developers on potential mitigation strategies.  I would also like to see an expansion of the report card feature and the enterprise architecture used for tracking the lessons completed.  WebGoat could be used in organizations as a introduction to secure coding practices.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_WebGoat_Project_Page}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_10&amp;diff=105085</id>
		<title>Global Industry Committee - Application 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_10&amp;diff=105085"/>
				<updated>2011-02-14T22:28:43Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Sherif Koussa&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP Ottawa Chapter Leader - WebGoat 5.0&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Industry Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Dinis Cruz&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| [[O2 Platform]] Project Leader&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Sherif is an active OWASP leader and in the past has already made a number of bridges and connections with the Industry. I think he will be a great addition to this Committee &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Bruce Mayhew&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[WebGoat]] Project Leader&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Sherif is active in the security community, active in OWASP, and has made major contributions to WebGoat.  Sherif will be an asset to this committee.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=98284</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=98284"/>
				<updated>2011-01-04T15:54:27Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;&lt;br /&gt;
{{OWASP Book|1416452}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross-site Scripting (XSS)]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race conditions|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat has been fairly stable for a few years.  There are some issues on the WebGoat issues page that require fixing, any help there would be appreciated.&lt;br /&gt;
&lt;br /&gt;
Going forward WebGoat should take advantage of the training material provided at OWASP and incorporate that material into the lesson plans. WebGoat has been useful in educating security folks in the type of attacks and how they could be exploited.  WebGoat should start focusing on educating the security staff and developers on potential mitigation strategies.  I would also like to see an expansion of the report card feature and the enterprise architecture used for tracking the lessons completed.  WebGoat could be used in organizations as a introduction to secure coding practices.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
==Downloads==&lt;br /&gt;
&lt;br /&gt;
The WebGoat downloads are available at [http://code.google.com/p/webgoat/downloads/list WebGoat Google code downloads].  &lt;br /&gt;
&lt;br /&gt;
You can synch to the current WebGoat source tree at [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
You can download older versions of WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Developer (At [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge]):===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Movie Demonstration Solutions ==&lt;br /&gt;
&lt;br /&gt;
Aung Khant (YGN Ethical Hacker Group) has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at &lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/training/webgoat.php&lt;br /&gt;
&lt;br /&gt;
Feel free to contact him for any help with WebGoat.&lt;br /&gt;
&lt;br /&gt;
==== Movie Links ====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#General General] &lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Code_Quality Code Quality]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Concurrency Concurrency ]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Unvalidated_Parameters Unvalidated Parameters]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Access_Control_Flaws Access Control Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Authentication_Flaws Authentication Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Session_Management_Flaws Session Management Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Cross-Site_Scripting_(XSS) Cross-Site Scripting (XSS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Buffer_Overflows Buffer Overflows]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Injection_Flaws Injection Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Storage Insecure Storage]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Denial_of_Service_(DOS) Denial of Service (DOS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Configuration_Insecure Configuration]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Web_Services Web Services]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#AJAX_Security AJAX Security]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Challenge Challenge]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge] and [http://code.google.com/p/webgoat/downloads/list Google]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.ouncelabs.com Ounce Labs] for allowing me time to work on and run the WebGoat project during my day job!&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project|WebGoat Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Release Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=98283</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=98283"/>
				<updated>2011-01-04T15:53:06Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;&lt;br /&gt;
{{OWASP Book|1416452}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross-site Scripting (XSS)]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race conditions|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat has been fairly stable for a few years.  There are some issues on the WebGoat issues page that require fixing, any help there would be appreciated.&lt;br /&gt;
&lt;br /&gt;
Going forward WebGoat should take advantage of the training material provided at OWASP and incorporate that material into the lesson plans. WebGoat has been useful in educating security folks in the type of attacks and how they could be exploited.  WebGoat should start focusing on educating the security staff and developers on potential mitigation strategies.  I would also like to see an expansion of the report card feature and the enterprise architecture used for tracking the lessons completed.  WebGoat could be used in organizations as a introduction to secure coding practices.&lt;br /&gt;
&lt;br /&gt;
==Downloads==&lt;br /&gt;
&lt;br /&gt;
The WebGoat downloads are available at [http://code.google.com/p/webgoat/downloads/list WebGoat Google code downloads].  &lt;br /&gt;
&lt;br /&gt;
You can synch to the current WebGoat source tree at [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
You can download older versions of WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Developer (At [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge]):===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Movie Demonstration Solutions ==&lt;br /&gt;
&lt;br /&gt;
Aung Khant (YGN Ethical Hacker Group) has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at &lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/training/webgoat.php&lt;br /&gt;
&lt;br /&gt;
Feel free to contact him for any help with WebGoat.&lt;br /&gt;
&lt;br /&gt;
==== Movie Links ====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#General General] &lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Code_Quality Code Quality]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Concurrency Concurrency ]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Unvalidated_Parameters Unvalidated Parameters]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Access_Control_Flaws Access Control Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Authentication_Flaws Authentication Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Session_Management_Flaws Session Management Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Cross-Site_Scripting_(XSS) Cross-Site Scripting (XSS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Buffer_Overflows Buffer Overflows]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Injection_Flaws Injection Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Storage Insecure Storage]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Denial_of_Service_(DOS) Denial of Service (DOS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Configuration_Insecure Configuration]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Web_Services Web Services]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#AJAX_Security AJAX Security]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Challenge Challenge]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge] and [http://code.google.com/p/webgoat/downloads/list Google]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.ouncelabs.com Ounce Labs] for allowing me time to work on and run the WebGoat project during my day job!&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project|WebGoat Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Release Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WebGoat_Project_Roadmap&amp;diff=98282</id>
		<title>OWASP WebGoat Project Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WebGoat_Project_Roadmap&amp;diff=98282"/>
				<updated>2011-01-04T15:50:36Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Be the defacto standard web application security training environment&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Demonstrate most common web application security vulnerabilities&lt;br /&gt;
# Add educational support for secure coding practices&lt;br /&gt;
# Enhance enterprise lesson tracking&lt;br /&gt;
# Attract more contributions of lessons&lt;br /&gt;
# Revisit existing lesson base to standardize lesson theme.&lt;br /&gt;
# Increase ease-of-use and expand user base&lt;br /&gt;
&lt;br /&gt;
Here are the current tasks defined to help us achieve these goals&lt;br /&gt;
&lt;br /&gt;
'''Architectural'''&lt;br /&gt;
* Replace basic authentication with forms based authentication&lt;br /&gt;
* Rewrite all lessons to follow common theme using common database&lt;br /&gt;
* Rewrite user administration to allow better user management (non-hackable)&lt;br /&gt;
* Fix Logoff&lt;br /&gt;
* Defuse all lessons to disallow inadvertent harm to user's OS &lt;br /&gt;
&lt;br /&gt;
'''General'''&lt;br /&gt;
* General security cleanup. Remove exploits that are not lesson specific&lt;br /&gt;
* Remove non working lessons&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
'''New Lessons'''&lt;br /&gt;
* Server side forward allows access to WEB-INF resources&lt;br /&gt;
* Account enumeration using webscarab&lt;br /&gt;
* SQLException lesson - could tie into overall error handling&lt;br /&gt;
* XML attacks - Entity recursion, ...&lt;br /&gt;
&lt;br /&gt;
For more information contact Bruce Mayhew at webgoat at owasp dot org&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP WebGoat Project]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=98279</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=98279"/>
				<updated>2011-01-04T15:41:53Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Future Development */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;&lt;br /&gt;
{{OWASP Book|1416452}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross-site Scripting (XSS)]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race conditions|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
==Downloads==&lt;br /&gt;
&lt;br /&gt;
The WebGoat downloads are available at [http://code.google.com/p/webgoat/downloads/list WebGoat Google code downloads].  &lt;br /&gt;
&lt;br /&gt;
You can synch to the current WebGoat source tree at [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
You can download older versions of WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Developer (At [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge]):===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Movie Demonstration Solutions ==&lt;br /&gt;
&lt;br /&gt;
Aung Khant (YGN Ethical Hacker Group) has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at &lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/training/webgoat.php&lt;br /&gt;
&lt;br /&gt;
Feel free to contact him for any help with WebGoat.&lt;br /&gt;
&lt;br /&gt;
==== Movie Links ====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#General General] &lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Code_Quality Code Quality]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Concurrency Concurrency ]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Unvalidated_Parameters Unvalidated Parameters]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Access_Control_Flaws Access Control Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Authentication_Flaws Authentication Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Session_Management_Flaws Session Management Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Cross-Site_Scripting_(XSS) Cross-Site Scripting (XSS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Buffer_Overflows Buffer Overflows]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Injection_Flaws Injection Flaws]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Storage Insecure Storage]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Denial_of_Service_(DOS) Denial of Service (DOS)]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Insecure_Configuration_Insecure Configuration]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Web_Services Web Services]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#AJAX_Security AJAX Security]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/training/webgoat.php#Challenge Challenge]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat has been fairly stable for a few years.  There are some issues on the WebGoat issues page that require fixing, any help there would be appreciated.&lt;br /&gt;
&lt;br /&gt;
Going forward WebGoat should take advantage of the training material provided at OWASP and incorporate that material into the lesson plans. WebGoat has been useful in educating security folks in the type of attacks and how they could be exploited.  WebGoat should start focusing on educating the security staff and developers on potential mitigation strategies.  I would also like to see an expansion of the report card feature and the enterprise architecture used for tracking the lessons completed.  WebGoat could be used in organizations as a introduction to secure coding practices.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge] and [http://code.google.com/p/webgoat/downloads/list Google]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.ouncelabs.com Ounce Labs] for allowing me time to work on and run the WebGoat project during my day job!&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project|WebGoat Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Release Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=69401</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=69401"/>
				<updated>2009-09-20T16:47:14Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;&lt;br /&gt;
{{OWASP Book|1416452}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross-site Scripting (XSS)]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race conditions|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
==Downloads==&lt;br /&gt;
&lt;br /&gt;
The WebGoat downloads are available at [http://code.google.com/p/webgoat/downloads/list WebGoat Google code downloads].  &lt;br /&gt;
&lt;br /&gt;
You can synch to the current WebGoat source tree at [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
You can download older versions of WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Developer (At [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge]):===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Movie Solutions ==&lt;br /&gt;
&lt;br /&gt;
Aung Khant (YGN Ethical Hacker Group) has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at &lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/training/webgoat.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.2 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.3 - Estimated release date: TBD&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.2'''&lt;br /&gt;
&lt;br /&gt;
* Introduction and WebGoat instructions&lt;br /&gt;
* Multi Level Login Lesson&lt;br /&gt;
* Session Fixation Lesson&lt;br /&gt;
* Insecure Login Lesson&lt;br /&gt;
* Lesson Solution Videos&lt;br /&gt;
* Bug Report Feature&lt;br /&gt;
* Many upgrades and minor fixes&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge] and [http://code.google.com/p/webgoat/downloads/list Google]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.ouncelabs.com Ounce Labs] for allowing me time to work on and run the WebGoat project during my day job!&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Release Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=69400</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=69400"/>
				<updated>2009-09-20T16:46:27Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;&lt;br /&gt;
{{OWASP Book|1416452}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross-site Scripting (XSS)]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race conditions|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
==Downloads==&lt;br /&gt;
&lt;br /&gt;
The WebGoat downloads are available at [http://code.google.com/p/webgoat/downloads/list WebGoat Google code downloads].  &lt;br /&gt;
&lt;br /&gt;
You can synch to the current WebGoat source tree at [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
You can download older versions of WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Developer (At [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge]):===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Movie Solutions ==&lt;br /&gt;
&lt;br /&gt;
Aung Khant (YGN Ethical Hacker Group) has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at &lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/training/webgoat.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.2 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.3 - Estimated release date: TBD&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.2'''&lt;br /&gt;
&lt;br /&gt;
* Introduction and WebGoat instructions&lt;br /&gt;
* Multi Level Login Lesson&lt;br /&gt;
* Session Fixation Lesson&lt;br /&gt;
* Insecure Login Lesson&lt;br /&gt;
* Lesson Solution Videos&lt;br /&gt;
* Bug Report Feature&lt;br /&gt;
* Many upgrades and minor fixes&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge] and [http://code.google.com/p/webgoat/downloads/list Google]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.ouncelabs.com Ounce Labs] for allowing me time to work on and run the WebGoat project during my day job!&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Release Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=69399</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=69399"/>
				<updated>2009-09-20T16:45:12Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;&lt;br /&gt;
{{OWASP Book|1416452}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
==Downloads==&lt;br /&gt;
&lt;br /&gt;
The WebGoat downloads are available at [http://code.google.com/p/webgoat/downloads/list WebGoat Google code downloads].  &lt;br /&gt;
&lt;br /&gt;
You can synch to the current WebGoat source tree at [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross-site Scripting (XSS)]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race conditions|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
You can download older versions of WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Developer (At [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge]):===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Movie Solutions ==&lt;br /&gt;
&lt;br /&gt;
Aung Khant (YGN Ethical Hacker Group) has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at &lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/training/webgoat.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.2 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.3 - Estimated release date: TBD&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.2'''&lt;br /&gt;
&lt;br /&gt;
* Introduction and WebGoat instructions&lt;br /&gt;
* Multi Level Login Lesson&lt;br /&gt;
* Session Fixation Lesson&lt;br /&gt;
* Insecure Login Lesson&lt;br /&gt;
* Lesson Solution Videos&lt;br /&gt;
* Bug Report Feature&lt;br /&gt;
* Many upgrades and minor fixes&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge] and [http://code.google.com/p/webgoat/downloads/list Google]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.ouncelabs.com Ounce Labs] for allowing me time to work on and run the WebGoat project during my day job!&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Release Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=69398</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=69398"/>
				<updated>2009-09-20T16:33:24Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;&lt;br /&gt;
{{OWASP Book|1416452}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross-site Scripting (XSS)]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race conditions|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
==Downloads==&lt;br /&gt;
&lt;br /&gt;
The WebGoat downloads are available at [http://code.google.com/p/webgoat/downloads/list WebGoat Google code downloads].  &lt;br /&gt;
&lt;br /&gt;
You can synch to the current WebGoat source tree at [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
You can download older versions of WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Developer (At [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge]):===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Movie Solutions ==&lt;br /&gt;
&lt;br /&gt;
Aung Khant (YGN Ethical Hacker Group) has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at &lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/training/webgoat.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.2 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.3 - Estimated release date: TBD&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.2'''&lt;br /&gt;
&lt;br /&gt;
* Introduction and WebGoat instructions&lt;br /&gt;
* Multi Level Login Lesson&lt;br /&gt;
* Session Fixation Lesson&lt;br /&gt;
* Insecure Login Lesson&lt;br /&gt;
* Lesson Solution Videos&lt;br /&gt;
* Bug Report Feature&lt;br /&gt;
* Many upgrades and minor fixes&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge] and [http://code.google.com/p/webgoat/downloads/list Google]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.ouncelabs.com Ounce Labs] for allowing me time to work on and run the WebGoat project during my day job!&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Release Quality Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WebGoat_User_Guide_Introduction&amp;diff=63621</id>
		<title>WebGoat User Guide Introduction</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WebGoat_User_Guide_Introduction&amp;diff=63621"/>
				<updated>2009-06-04T23:03:43Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[WebGoat User and Install Guide Table of Contents]]&lt;br /&gt;
&lt;br /&gt;
==Overview ==&lt;br /&gt;
The WebGoatV5 application is designed to illustrate typical security flaws within web-applications. It is intended to teach a structured approach to testing for, and exploiting such vulnerabilities within the context of an Application Security Assessment.&lt;br /&gt;
&lt;br /&gt;
A full Application Security Assessment testing methodology is being documented by &amp;lt;u&amp;gt;http://www.owasp.org/index.php/OWASP_Testing_Project&amp;lt;/u&amp;gt; and this will provide a superset of the issues demonstrated within the WebGoat. If may include a formal design and code review, for example. The WebGoat lessons aim to give practical training and examples relating to the ''Implementation'' ''Review'' phase of the OWASP Web Application Security Testing Methodology.&lt;br /&gt;
&lt;br /&gt;
The WebGoatv5 Application provides a testing platform for a typical application security assessment. The assessor is given the same information and rights as a typical customer or client of an on-line application.&lt;br /&gt;
* The application is web based&lt;br /&gt;
* The attack simulations are remote &lt;br /&gt;
All of the described techniques may be performed from any connected location.&lt;br /&gt;
* The testing is black-box&lt;br /&gt;
Source code is not supplied, but it can be viewed and downloaded.&lt;br /&gt;
* Credentials and operational information is provided&lt;br /&gt;
&lt;br /&gt;
Of course, the teaching aspect of WebGoat means that certain information will be revealed that would not typically be available. This makes it possible to guide the tester through an assessment process.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
The current lesson plans provided in WebGoatv5 include:&lt;br /&gt;
&lt;br /&gt;
{| border=1&lt;br /&gt;
 || HTTP Basics&lt;br /&gt;
|-&lt;br /&gt;
 || HTTP Splitting and Cache Poisining&lt;br /&gt;
|-&lt;br /&gt;
 || How to Exploit Thread Safety Problems&lt;br /&gt;
|-&lt;br /&gt;
 || How to Discover Clues in the HTML&lt;br /&gt;
|-&lt;br /&gt;
 || How to Exploit Hidden Fields&lt;br /&gt;
|-&lt;br /&gt;
 || How to Exploit Unchecked Email&lt;br /&gt;
|-&lt;br /&gt;
 || How to Bypass Client Side JavaScript Validation&lt;br /&gt;
|-&lt;br /&gt;
 || How to Force Browser Web Resources&lt;br /&gt;
|-&lt;br /&gt;
 || How to Bypass a Role Based Access Control Scheme&lt;br /&gt;
|-&lt;br /&gt;
 || How to Bypass a Path Based Access Control Scheme&lt;br /&gt;
|-&lt;br /&gt;
 || LAB: Role based Access Control&lt;br /&gt;
|-&lt;br /&gt;
 || Using an Access Control Matrix&lt;br /&gt;
|-&lt;br /&gt;
 || How to Exploit the Forgot Password Page&lt;br /&gt;
|-&lt;br /&gt;
 || How to Spoof an Authentication Cookie&lt;br /&gt;
|-&lt;br /&gt;
 || How to Hijack a Session&lt;br /&gt;
|-&lt;br /&gt;
 || Basic Authentication&lt;br /&gt;
|-&lt;br /&gt;
 || LAB: Cross Site Scripting&lt;br /&gt;
|-&lt;br /&gt;
 || How to Perform Stored Cross Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
 || How to Perform Reflected Cross Site Scripting (XSS)&lt;br /&gt;
|-&lt;br /&gt;
 || How to Perform Cross Site Trace Attacks (XSS)&lt;br /&gt;
|-&lt;br /&gt;
 || Buffer Overflow (TBD)&lt;br /&gt;
|-&lt;br /&gt;
 || [[HTTPOnly]] Test&lt;br /&gt;
|-&lt;br /&gt;
 || How to Perform Command Injection&lt;br /&gt;
|-&lt;br /&gt;
 || How to Perform Parameter Injection&lt;br /&gt;
|-&lt;br /&gt;
 || How to Perform Blind SQL Injection&lt;br /&gt;
|-&lt;br /&gt;
 || How to Perform Numeric SQL Injection &lt;br /&gt;
|-&lt;br /&gt;
 || How to Perform String SQL Injection &lt;br /&gt;
|-&lt;br /&gt;
 || How to Perform Log Spoofing &lt;br /&gt;
|-&lt;br /&gt;
 || How to Perform XPATH Injection Attacks&lt;br /&gt;
|-&lt;br /&gt;
 || LAB: SQL Injection&lt;br /&gt;
|-&lt;br /&gt;
 || How to Bypass a Fail Open Authentication Scheme&lt;br /&gt;
|-&lt;br /&gt;
 || How to Peform Basic Encoding&lt;br /&gt;
|-&lt;br /&gt;
 || Denial of Service from Multiple Logins&lt;br /&gt;
|-&lt;br /&gt;
 || How to Create a SOAP Request&lt;br /&gt;
|-&lt;br /&gt;
 || How to Perform WSDL Scanning&lt;br /&gt;
|-&lt;br /&gt;
 || How to Perform Web Service SAX Injection&lt;br /&gt;
|-&lt;br /&gt;
 || How to Perform Web Service SQL Injection&lt;br /&gt;
|-&lt;br /&gt;
 || How to Perform DOM Injection Attack &lt;br /&gt;
|-&lt;br /&gt;
 || How to Perform XML Injection Attacks&lt;br /&gt;
|-&lt;br /&gt;
 || How to Perform JSON Injection Attack &lt;br /&gt;
|-&lt;br /&gt;
 || How to Perform Silent Transactions Attacks&lt;br /&gt;
|-&lt;br /&gt;
 || How to Add a New Lesson&lt;br /&gt;
|-&lt;br /&gt;
 || The Challenge &lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Future releases of WebGoat will include more lessons and functionality. Should you have any suggestions for improvement or new lessons please contact [mailto:bill@owasp.org bill@owasp.org] with your ideas.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[WebGoat User and Install Guide Table of Contents]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP WebGoat Project]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WebGoat_Project_Roadmap&amp;diff=33931</id>
		<title>OWASP WebGoat Project Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WebGoat_Project_Roadmap&amp;diff=33931"/>
				<updated>2008-07-12T19:50:40Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Be the defacto standard web application security training environment&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Demonstrate most common web application security vulnerabilities&lt;br /&gt;
# Increase ease-of-use and expand userbase&lt;br /&gt;
# Attract more contributions of lessons&lt;br /&gt;
# Revisit existing lesson base to standardize lesson theme.&lt;br /&gt;
&lt;br /&gt;
Here are the current tasks defined to help us achieve these goals&lt;br /&gt;
&lt;br /&gt;
'''Architectural'''&lt;br /&gt;
* Convert lessons to struts framework (Major effort)&lt;br /&gt;
* Rewrite all lessons to follow common theme using common database&lt;br /&gt;
* Rewrite user administration to allow better user management (non-hackable)&lt;br /&gt;
* Fix Logoff&lt;br /&gt;
* Defuse all lessons to disallow inadvertent harm to user's OS &lt;br /&gt;
&lt;br /&gt;
'''General'''&lt;br /&gt;
* General security cleanup. Remove exploits that are not lesson specific&lt;br /&gt;
* Denial of service lesson rewrite&lt;br /&gt;
* Bypass client side JavaScript lesson rewrite&lt;br /&gt;
* Improve using an access control matrix lesson&lt;br /&gt;
* Improve encoding basics lesson&lt;br /&gt;
* Cross Site Trace (XST) only works in older browsers&lt;br /&gt;
* Improve CSRF lesson&lt;br /&gt;
&lt;br /&gt;
'''New Lessons'''&lt;br /&gt;
* Server side forward allows access to WEB-INF resources&lt;br /&gt;
* Account enumeration using webscarab&lt;br /&gt;
* Buffer overflow&lt;br /&gt;
* SQLException lesson - could tie into overall error handling&lt;br /&gt;
* XML attacks - Entity recursion, ...&lt;br /&gt;
&lt;br /&gt;
For more information contact Bruce Mayhew at webgoat at owasp dot org&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP WebGoat Project]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=33930</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=33930"/>
				<updated>2008-07-12T19:48:28Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;&lt;br /&gt;
{{OWASP Book|1416452}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]]. &lt;br /&gt;
&lt;br /&gt;
== Movie Solutions ==&lt;br /&gt;
&lt;br /&gt;
Aung Khant (YGN Ethical Hacker Group) has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at http://yehg.net/lab/pr0js/training/webgoat.php .&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
You can synch to the current WebGoat source tree at [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  &lt;br /&gt;
&lt;br /&gt;
You can download older versions of WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Developer (At [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge]):===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.2 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.3 - Estimated release date: TBD&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.2'''&lt;br /&gt;
&lt;br /&gt;
* Introduction and WebGoat instructions&lt;br /&gt;
* Multi Level Login Lesson&lt;br /&gt;
* Session Fixation Lesson&lt;br /&gt;
* Insecure Login Lesson&lt;br /&gt;
* Lesson Solution Videos&lt;br /&gt;
* Bug Report Feature&lt;br /&gt;
* Many upgrades and minor fixes&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge] and [http://code.google.com/p/webgoat/downloads/list Google]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.ouncelabs.com Ounce Labs] for allowing me time to work on and run the WebGoat project during my day job!&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=33929</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=33929"/>
				<updated>2008-07-12T19:45:14Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Future Development */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;&lt;br /&gt;
{{OWASP Book|1416452}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]]. &lt;br /&gt;
&lt;br /&gt;
== Movie Solutions ==&lt;br /&gt;
&lt;br /&gt;
Aung Khant (YGN Ethical Hacker Group) has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at http://yehg.net/lab/pr0js/training/webgoat.php .&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
You can synch to the current WebGoat source tree at [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  &lt;br /&gt;
&lt;br /&gt;
You can download older versions of WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Developer (At [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge]):===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.2 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.3 - Estimated release date: TBD&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.2'''&lt;br /&gt;
&lt;br /&gt;
* Introduction and WebGoat instructions&lt;br /&gt;
* Multi Level Login Lesson&lt;br /&gt;
* Session Fixation Lesson&lt;br /&gt;
* Insecure Login Lesson&lt;br /&gt;
* Lesson Solution Videos&lt;br /&gt;
* Bug Report Feature&lt;br /&gt;
* Many upgrades and minor fixes&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge] and [http://code.google.com/p/webgoat/downloads/list Google]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.ouncelabs.com Ounce Labs] for allowing me time to work on and run the WebGoat project during my day job!&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=33928</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=33928"/>
				<updated>2008-07-12T19:42:25Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Releases */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;&lt;br /&gt;
{{OWASP Book|1416452}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]]. &lt;br /&gt;
&lt;br /&gt;
== Movie Solutions ==&lt;br /&gt;
&lt;br /&gt;
Aung Khant (YGN Ethical Hacker Group) has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at http://yehg.net/lab/pr0js/training/webgoat.php .&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
You can synch to the current WebGoat source tree at [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  &lt;br /&gt;
&lt;br /&gt;
You can download older versions of WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Developer (At [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge]):===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.2 - Estimated release date: Spring 2008&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.1'''&lt;br /&gt;
&lt;br /&gt;
* Thanks to the OWASP Spring of Code project, Erwin Geirhart has provided a complete solutions guide that is avaliable via a new &amp;quot;show solution&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
* New database lessons&lt;br /&gt;
&lt;br /&gt;
* XSS phishing lesson is available via the source code project at Google.  Using a standard search feature, your mission is to create a &amp;quot;login&amp;quot; form on the page, steal the user credentials, and post the credentials to the WebGoat Catcher servlet.&lt;br /&gt;
&lt;br /&gt;
* Catcher servlet.  Want to prove your attack works?  You can now write lessons where the attack can send sensitive information to the Catcher servlet.  The Catcher servlet will write the posted values into the originating lesson's properties file.&lt;br /&gt;
&lt;br /&gt;
* Documentation.  A draft version of how to solve the WebGoat Labs is available at [http://webgoat.googlecode.com/files/Solving%20the%20WebGoat%20Labs%20Draft%20V2.pdf WebGoat Google Code Downloads]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge] and [http://code.google.com/p/webgoat/downloads/list Google]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.ouncelabs.com Ounce Labs] for allowing me time to work on and run the WebGoat project during my day job!&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=29339</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=29339"/>
				<updated>2008-05-13T12:40:54Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;&lt;br /&gt;
{{OWASP Book|1416452}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]]. &lt;br /&gt;
&lt;br /&gt;
== Movie Solutions ==&lt;br /&gt;
&lt;br /&gt;
YGN Ethical Hacker Group has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at http://yehg.net/lab/pr0js/training/webgoat.php .&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
You can synch to the current WebGoat source tree at[http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  &lt;br /&gt;
&lt;br /&gt;
You can download older versions of WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Beta 1 - For Beta Testers:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.  '''Please use Google Issues for WebGoat to report bugs unless you are on the beta test list.'''&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Developer (At [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge]):===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.2 - Estimated release date: Spring 2008&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.1'''&lt;br /&gt;
&lt;br /&gt;
* Thanks to the OWASP Spring of Code project, Erwin Geirhart has provided a complete solutions guide that is avaliable via a new &amp;quot;show solution&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
* New database lessons&lt;br /&gt;
&lt;br /&gt;
* XSS phishing lesson is available via the source code project at Google.  Using a standard search feature, your mission is to create a &amp;quot;login&amp;quot; form on the page, steal the user credentials, and post the credentials to the WebGoat Catcher servlet.&lt;br /&gt;
&lt;br /&gt;
* Catcher servlet.  Want to prove your attack works?  You can now write lessons where the attack can send sensitive information to the Catcher servlet.  The Catcher servlet will write the posted values into the originating lesson's properties file.&lt;br /&gt;
&lt;br /&gt;
* Documentation.  A draft version of how to solve the WebGoat Labs is available at [http://webgoat.googlecode.com/files/Solving%20the%20WebGoat%20Labs%20Draft%20V2.pdf WebGoat Google Code Downloads]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge] and [http://code.google.com/p/webgoat/downloads/list Google]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.ouncelabs.com Ounce Labs] for allowing me time to work on and run the WebGoat project during my day job!&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=29338</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=29338"/>
				<updated>2008-05-13T12:35:07Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Project Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;&lt;br /&gt;
{{OWASP Book|1416452}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]]. &lt;br /&gt;
&lt;br /&gt;
== Movie Solutions ==&lt;br /&gt;
&lt;br /&gt;
YGN Ethical Hacker Group has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at http://yehg.net/lab/pr0js/training/webgoat.php .&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
You can synch to the current WebGoat source tree at[http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  &lt;br /&gt;
&lt;br /&gt;
You can download older versions of WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Beta 1 - For Beta Testers:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.  '''Please use Google Issues for WebGoat to report bugs unless you are on the beta test list.'''&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Developer (At SourceForge):===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.2 - Estimated release date: Spring 2008&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.1'''&lt;br /&gt;
&lt;br /&gt;
* Thanks to the OWASP Spring of Code project, Erwin Geirhart has provided a complete solutions guide that is avaliable via a new &amp;quot;show solution&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
* New database lessons&lt;br /&gt;
&lt;br /&gt;
* XSS phishing lesson is available via the source code project at Google.  Using a standard search feature, your mission is to create a &amp;quot;login&amp;quot; form on the page, steal the user credentials, and post the credentials to the WebGoat Catcher servlet.&lt;br /&gt;
&lt;br /&gt;
* Catcher servlet.  Want to prove your attack works?  You can now write lessons where the attack can send sensitive information to the Catcher servlet.  The Catcher servlet will write the posted values into the originating lesson's properties file.&lt;br /&gt;
&lt;br /&gt;
* Documentation.  A draft version of how to solve the WebGoat Labs is available at [http://webgoat.googlecode.com/files/Solving%20the%20WebGoat%20Labs%20Draft%20V2.pdf WebGoat Google Code Downloads]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [[http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge]] and [[http://code.google.com/p/webgoat/downloads/list Google]]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [[http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list]].&lt;br /&gt;
&lt;br /&gt;
Thanks to [http://www.ouncelabs.com Ounce Labs] for allowing me time to work on and run the WebGoat project during my day job!&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=29337</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=29337"/>
				<updated>2008-05-13T12:31:28Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;&lt;br /&gt;
{{OWASP Book|1416452}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]]. &lt;br /&gt;
&lt;br /&gt;
== Movie Solutions ==&lt;br /&gt;
&lt;br /&gt;
YGN Ethical Hacker Group has created a series of movies showing possible solutions to the WebGoat lessons.  These training movies can be viewed at http://yehg.net/lab/pr0js/training/webgoat.php .&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
You can synch to the current WebGoat source tree at[http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  &lt;br /&gt;
&lt;br /&gt;
You can download older versions of WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.2 Beta 1 - For Beta Testers:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.  '''Please use Google Issues for WebGoat to report bugs unless you are on the beta test list.'''&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Developer (At SourceForge):===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.2 - Estimated release date: Spring 2008&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.1'''&lt;br /&gt;
&lt;br /&gt;
* Thanks to the OWASP Spring of Code project, Erwin Geirhart has provided a complete solutions guide that is avaliable via a new &amp;quot;show solution&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
* New database lessons&lt;br /&gt;
&lt;br /&gt;
* XSS phishing lesson is available via the source code project at Google.  Using a standard search feature, your mission is to create a &amp;quot;login&amp;quot; form on the page, steal the user credentials, and post the credentials to the WebGoat Catcher servlet.&lt;br /&gt;
&lt;br /&gt;
* Catcher servlet.  Want to prove your attack works?  You can now write lessons where the attack can send sensitive information to the Catcher servlet.  The Catcher servlet will write the posted values into the originating lesson's properties file.&lt;br /&gt;
&lt;br /&gt;
* Documentation.  A draft version of how to solve the WebGoat Labs is available at [http://webgoat.googlecode.com/files/Solving%20the%20WebGoat%20Labs%20Draft%20V2.pdf WebGoat Google Code Downloads]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [[http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 SourceForge]] and [[http://code.google.com/p/webgoat/downloads/list Google]]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [[http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Using_WebGoat&amp;diff=26087</id>
		<title>Using WebGoat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Using_WebGoat&amp;diff=26087"/>
				<updated>2008-02-28T20:23:50Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;Having identified the objectives and required tools, we may now get started with the WebGoat lessons.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[WebGoat User Guide Table of Contents]]&lt;br /&gt;
[[Category:OWASP WebGoat Project]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WebGoat_Getting_Started&amp;diff=26086</id>
		<title>WebGoat Getting Started</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WebGoat_Getting_Started&amp;diff=26086"/>
				<updated>2008-02-28T20:22:39Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;[[WebGoat User Guide Table of Contents]]&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In order to start using WebGoat, Tomcat must be launched using the startup script/bat in the Tomcat bin directory.  &lt;br /&gt;
For WebGoat to operate it must have permission to run as a server and allow some uncommon web behavior.  When WebGoat is running it will make the host machine vulnerable to attack.&lt;br /&gt;
&lt;br /&gt;
If the machine is connected to the internet it should be disconnected. &lt;br /&gt;
 &lt;br /&gt;
Running a personal firewall may prevent WebGoat from operating correctly. Disable any personal firewall while running WebGoat.&lt;br /&gt;
&lt;br /&gt;
From a browser, the Tomcat server can be accessed on localhost port 80, e.g. &amp;lt;u&amp;gt;http://127.0.0.1&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
WebGoat resides in the WebGoat directory, and the lessons can be found at: &amp;lt;u&amp;gt;http://127.0.0.1/WebGoat/attack&amp;lt;/u&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
The WebGoat application enforces role based security. A login dialog requests credentials. Login as userid=guest, password=guest.&lt;br /&gt;
&lt;br /&gt;
[[Image:WebGoat Sign In Page.gif|none|thumb|300px|Figure 1. Sign In Page]]&lt;br /&gt;
&lt;br /&gt;
After a successful login the Tomcat server will show the WebGoat welcome page.&lt;br /&gt;
 &lt;br /&gt;
[[Image:WebGoat Welcome Page.gif|none|Figure 2. Welcome Page]]&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
[[WebGoat User Guide Table of Contents]]&lt;br /&gt;
[[Category:OWASP WebGoat Project]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WebGoat_Installation&amp;diff=26085</id>
		<title>WebGoat Installation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WebGoat_Installation&amp;diff=26085"/>
				<updated>2008-02-28T20:21:17Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;[[WebGoat User Guide Table of Contents]]&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
WebGoat is a platform independent environment.&lt;br /&gt;
It utilizes Apache Tomcat and the JAVA development environment.&lt;br /&gt;
Installers are provided for Microsoft Windows and UN*X environments, together with notes for installation on other platforms.&lt;br /&gt;
&lt;br /&gt;
==Installing Java and Tomcat ==&lt;br /&gt;
===Installing Java===&lt;br /&gt;
# Install and deploy the approprite version from http://java.sun.com/downloads/ (1.4.1 or later)&lt;br /&gt;
&lt;br /&gt;
===Installing Tomcat===&lt;br /&gt;
# Install and deploy core Tomcat from http://tomcat.apache.org/download-55.cgi&lt;br /&gt;
&lt;br /&gt;
==Installing to Windows ==&lt;br /&gt;
# Unzip the Windows_WebGoat-x.x.zip to your working environment &lt;br /&gt;
# To start Tomcat, browse to the WebGoat directory unzipped above and double click &amp;quot;webgoat.bat&amp;quot;&lt;br /&gt;
# Start your browser and browse to: &amp;lt;u&amp;gt;http://localhost/WebGoat/attack&amp;lt;/u&amp;gt; This link is case-sensitive. Make sure to use a large ‘W’ and ‘G’.&lt;br /&gt;
&lt;br /&gt;
==Installing to Linux ==&lt;br /&gt;
# Unzip the Unix_WebGoat-x.x.zip to your working directory&lt;br /&gt;
# Edit the following line in webgoat.sh, set JAVA_HOME to your JDK1.5 path. &lt;br /&gt;
  JAVA_HOME=&amp;quot;SET ME TO YOUR JAVA 1.5 JDK PATH&amp;quot;&lt;br /&gt;
# Since the latest version runs on a privileged port, you will need to start/stop WebGoat as root.&lt;br /&gt;
&lt;br /&gt;
 sudo sh webgoat.sh start&lt;br /&gt;
 sudo sh webgoat.sh stop&lt;br /&gt;
&lt;br /&gt;
==Installing to OS X (Tiger 10.4+) ==&lt;br /&gt;
# Unzip the Unix_WebGoat-x.x.zip to your working directory&lt;br /&gt;
# Since the latest version runs on a privileged port, you will need to start/stop WebGoat as root.&lt;br /&gt;
&lt;br /&gt;
	sudo sh webgoat.sh start&lt;br /&gt;
	sudo sh webgoat.sh stop&lt;br /&gt;
&lt;br /&gt;
==Installing on FreeBSD ==&lt;br /&gt;
# Install Tomcat and Java from the ports collection&lt;br /&gt;
  cd /usr/ports/www/tomcat55&lt;br /&gt;
  sudo make install&lt;br /&gt;
# You will be required to manually download the Java JDK to install it.  Instructions are given by the ports system about when and how to do this.  The URL looks like this:&lt;br /&gt;
http://www.FreeBSDFoundation.org/cgi-bin/download?download=diablo-caffe-freebsd6-i386-1.5.0_07-b01.tar.bz2&lt;br /&gt;
# Unzip the Unix_WebGoat-x.x.zip to your working directory&lt;br /&gt;
# Since the latest version runs on a privileged port, you will need to start/stop WebGoat as root.&lt;br /&gt;
&lt;br /&gt;
	sudo sh webgoat.sh start&lt;br /&gt;
	sudo sh webgoat.sh stop&lt;br /&gt;
&lt;br /&gt;
==Running ==&lt;br /&gt;
# Start your browser and browse to: &amp;lt;u&amp;gt;http://localhost/WebGoat/attack&amp;lt;/u&amp;gt;. Notice the capital 'W' and 'G'&lt;br /&gt;
# Login in as: user = guest, password = guest&lt;br /&gt;
&lt;br /&gt;
==Building ==&lt;br /&gt;
Skip these instructions if you are only interested in running WebGoat.&lt;br /&gt;
&lt;br /&gt;
WebGoat is built using eclipse WTP 1.5.x.  Please read the instructions at [http://webgoat.googlecode.com/svn/trunk/%20webgoat/main/HOW%20TO%20create%20the%20WebGoat%20workspace.txt Goodle code] to build the WebGoat application.&lt;br /&gt;
&lt;br /&gt;
Return to the [[WebGoat User Guide Table of Contents]]&lt;br /&gt;
[[Category:OWASP WebGoat Project]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WebGoat_User_and_Install_Guide_Table_of_Contents&amp;diff=26084</id>
		<title>WebGoat User and Install Guide Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WebGoat_User_and_Install_Guide_Table_of_Contents&amp;diff=26084"/>
				<updated>2008-02-28T20:20:07Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;&lt;br /&gt;
*'''Contents'''&lt;br /&gt;
*#[[WebGoat User Guide Frontispiece |Frontispiece]]&lt;br /&gt;
*#[[WebGoat User Guide Introduction |Introduction]]&lt;br /&gt;
*#*[[WebGoat User Guide Introduction#Overview |Overview]]&lt;br /&gt;
*#[[WebGoat User Guide Objectives | Objectives]]&lt;br /&gt;
*#[[Tools required]]&lt;br /&gt;
*#*[[Tools_required#Application Assessment Proxy | Application Assessment Proxy]]&lt;br /&gt;
*#*[[Tools_required#Application Spider | Application Spider]]&lt;br /&gt;
*# [[Using WebGoat]]&lt;br /&gt;
*# [[WebGoat Installation | Installation]]&lt;br /&gt;
*#* [[WebGoat Installation#Installing Java and Tomcat|Installing Java and Tomcat]]&lt;br /&gt;
*#* [[WebGoat Installation#Installing to Windows|Installing to Windows]]&lt;br /&gt;
*#* [[WebGoat Installation#Installing to Linux|Installing to Linux]]&lt;br /&gt;
*#* [[WebGoat Installation#Installing to OS X|Installing to OS X]] (Tiger 10.4+)&lt;br /&gt;
*#* [[WebGoat Installation#Installing on FreeBSD|Installing on FreeBSD]]&lt;br /&gt;
*#* [[WebGoat Installation#Running |Running ]]&lt;br /&gt;
*#* [[WebGoat Installation#Building |Building]]&lt;br /&gt;
*# [[WebGoat Getting Started |Getting Started]]&lt;br /&gt;
*# [[Lesson Plans]]&lt;br /&gt;
*# [[Basic Operation]]&lt;br /&gt;
*# [[Proxy Utilization]]&lt;br /&gt;
*# [[Ready to Go!]]&lt;br /&gt;
*# [[How to write a new WebGoat lesson]]&lt;br /&gt;
*#*[[How to write a new WebGoat lesson#Step 1: Set up the framework|Step 1: Set up the framework]]&lt;br /&gt;
*#*[[How to write a new WebGoat lesson#Step 2: Implement createContent|Step 2: Implement createContent]]&lt;br /&gt;
*#*[[How to write a new WebGoat lesson#Step 3: Implement the other methods|Step 3: Implement the other methods]]&lt;br /&gt;
*#*[[How to write a new WebGoat lesson#Step 4: Build and test|Step 4: Build and test]] &amp;lt;this must have changed in v4&amp;gt;&lt;br /&gt;
*#*[[How to write a new WebGoat lesson#Step 5: Give back to the community|Step 5: Give back to the community]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP WebGoat Project]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WebGoat_Project_Roadmap&amp;diff=26083</id>
		<title>OWASP WebGoat Project Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WebGoat_Project_Roadmap&amp;diff=26083"/>
				<updated>2008-02-28T20:19:10Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;webgoat/&amp;gt;The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Be the defacto standard web application security training environment&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Demonstrate most common web application security vulnerabilities&lt;br /&gt;
# Increase ease-of-use and expand userbase&lt;br /&gt;
# Attract more contributions of lessons&lt;br /&gt;
# Revisit existing lesson base to standardize lesson theme.&lt;br /&gt;
&lt;br /&gt;
Here are the current tasks defined to help us achieve these goals&lt;br /&gt;
&lt;br /&gt;
'''Architectural'''&lt;br /&gt;
* Convert lessons to struts framework (Major effort)&lt;br /&gt;
* Rewrite all lessons to follow common theme using common database&lt;br /&gt;
* Rewrite user administration to allow better user management (non-hackable)&lt;br /&gt;
* Fix Logoff&lt;br /&gt;
* Defuse all lessons to disallow inadvertent harm to user's OS &lt;br /&gt;
&lt;br /&gt;
'''General'''&lt;br /&gt;
* General security cleanup. Remove exploits that are not lesson specific&lt;br /&gt;
* Denial of service lesson rewrite&lt;br /&gt;
* Bypass client side javascript lesson rewrite&lt;br /&gt;
* Improve using an access control matrix lesson&lt;br /&gt;
* Improve encoding basics lesson&lt;br /&gt;
* Improve thread safety lesson&lt;br /&gt;
* Cross site trace only works in older browsers&lt;br /&gt;
* Improve CSRF lesson&lt;br /&gt;
&lt;br /&gt;
'''New Lessons'''&lt;br /&gt;
* Server side forward allows access to WEB-INF resources&lt;br /&gt;
* Account enumeration using webscarab&lt;br /&gt;
* Buffer overflow&lt;br /&gt;
* SQLException lesson - could tie into overall error handling&lt;br /&gt;
* XML attacks - Entity recursion, ...&lt;br /&gt;
&lt;br /&gt;
For more information contact Bruce Mayhew at webgoat at owasp dot org&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP WebGoat Project]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24564</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24564"/>
				<updated>2008-01-18T18:18:15Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
You can synch to the current WebGoat source tree at[http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  &lt;br /&gt;
&lt;br /&gt;
You can download older versions of WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Developer (Waiting for Google disk quota approval issue 649):===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.2 - Estimated release date: Spring 2008&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.1'''&lt;br /&gt;
&lt;br /&gt;
* Thanks to the OWASP Spring of Code project, Erwin Geirhart has provided a complete solutions guide that is avaliable via a new &amp;quot;show solution&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
* New database lessons&lt;br /&gt;
&lt;br /&gt;
* XSS phishing lesson is available via the source code project at Google.  Using a standard search feature, your mission is to create a &amp;quot;login&amp;quot; form on the page, steal the user credentials, and post the credentials to the WebGoat Catcher servlet.&lt;br /&gt;
&lt;br /&gt;
* Catcher servlet.  Want to prove your attack works?  You can now write lessons where the attack can send sensitive information to the Catcher servlet.  The Catcher servlet will write the posted values into the originating lesson's properties file.&lt;br /&gt;
&lt;br /&gt;
* Documentation.  A draft version of how to solve the WebGoat Labs is available at [http://webgoat.googlecode.com/files/Solving%20the%20WebGoat%20Labs%20Draft%20V2.pdf WebGoat Google Code Downloads]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [[http://www.sourceforge.net SourceForge]]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [[http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24563</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24563"/>
				<updated>2008-01-18T18:15:33Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* WebGoat 5.1 Developer (Waiting for Google disk quota approval issue 649): */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
You can synch to the current WebGoat source tree at[http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  &lt;br /&gt;
&lt;br /&gt;
You can download older versions of WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Developer (Waiting for Google disk quota approval issue 649):===&lt;br /&gt;
&lt;br /&gt;
'''Note:''' This release is intended to provide an environment for working on the WebGoat labs.  If you would like to develop lessons, synch to the baseline at Google code.&lt;br /&gt;
&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.2 - Estimated release date: Spring 2008&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.1'''&lt;br /&gt;
&lt;br /&gt;
* Thanks to the OWASP Spring of Code project, Erwin Geirhart has provided a complete solutions guide that is avaliable via a new &amp;quot;show solution&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
* New database lessons&lt;br /&gt;
&lt;br /&gt;
* XSS phishing lesson is available via the source code project at Google.  Using a standard search feature, your mission is to create a &amp;quot;login&amp;quot; form on the page, steal the user credentials, and post the credentials to the WebGoat Catcher servlet.&lt;br /&gt;
&lt;br /&gt;
* Catcher servlet.  Want to prove your attack works?  You can now write lessons where the attack can send sensitive information to the Catcher servlet.  The Catcher servlet will write the posted values into the originating lesson's properties file.&lt;br /&gt;
&lt;br /&gt;
* Documentation.  A draft version of how to solve the WebGoat Labs is available at [http://webgoat.googlecode.com/files/Solving%20the%20WebGoat%20Labs%20Draft%20V2.pdf WebGoat Google Code Downloads]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [[http://www.sourceforge.net SourceForge]]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [[http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list]].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24562</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24562"/>
				<updated>2008-01-18T18:10:22Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Releases */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
&lt;br /&gt;
You can synch to the current WebGoat source tree at[http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  &lt;br /&gt;
&lt;br /&gt;
You can download older versions of WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Developer (Waiting for Google disk quota approval issue 649):===&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.2 - Estimated release date: Spring 2008&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.1'''&lt;br /&gt;
&lt;br /&gt;
* Thanks to the OWASP Spring of Code project, Erwin Geirhart has provided a complete solutions guide that is avaliable via a new &amp;quot;show solution&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
* New database lessons&lt;br /&gt;
&lt;br /&gt;
* XSS phishing lesson is available via the source code project at Google.  Using a standard search feature, your mission is to create a &amp;quot;login&amp;quot; form on the page, steal the user credentials, and post the credentials to the WebGoat Catcher servlet.&lt;br /&gt;
&lt;br /&gt;
* Catcher servlet.  Want to prove your attack works?  You can now write lessons where the attack can send sensitive information to the Catcher servlet.  The Catcher servlet will write the posted values into the originating lesson's properties file.&lt;br /&gt;
&lt;br /&gt;
* Documentation.  A draft version of how to solve the WebGoat Labs is available at [http://webgoat.googlecode.com/files/Solving%20the%20WebGoat%20Labs%20Draft%20V2.pdf WebGoat Google Code Downloads]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [[http://www.sourceforge.net SourceForge]]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [[http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list]].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24561</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24561"/>
				<updated>2008-01-18T18:08:59Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
===WebGoat 5.1 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Developer (Waiting for Google disk quota approval issue 649):===&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.2 - Estimated release date: Spring 2008&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.1'''&lt;br /&gt;
&lt;br /&gt;
* Thanks to the OWASP Spring of Code project, Erwin Geirhart has provided a complete solutions guide that is avaliable via a new &amp;quot;show solution&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
* New database lessons&lt;br /&gt;
&lt;br /&gt;
* XSS phishing lesson is available via the source code project at Google.  Using a standard search feature, your mission is to create a &amp;quot;login&amp;quot; form on the page, steal the user credentials, and post the credentials to the WebGoat Catcher servlet.&lt;br /&gt;
&lt;br /&gt;
* Catcher servlet.  Want to prove your attack works?  You can now write lessons where the attack can send sensitive information to the Catcher servlet.  The Catcher servlet will write the posted values into the originating lesson's properties file.&lt;br /&gt;
&lt;br /&gt;
* Documentation.  A draft version of how to solve the WebGoat Labs is available at [http://webgoat.googlecode.com/files/Solving%20the%20WebGoat%20Labs%20Draft%20V2.pdf WebGoat Google Code Downloads]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [[http://www.sourceforge.net SourceForge]]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [[http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list]].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24560</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24560"/>
				<updated>2008-01-18T18:08:28Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
==Download==&lt;br /&gt;
&lt;br /&gt;
You can synch to the WebGoat source code from [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  &lt;br /&gt;
&lt;br /&gt;
You can download WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
===WebGoat 5.1 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Developer (Waiting for Google disk quota approval issue 649):===&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.2 - Estimated release date: Spring 2008&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.1'''&lt;br /&gt;
&lt;br /&gt;
* Thanks to the OWASP Spring of Code project, Erwin Geirhart has provided a complete solutions guide that is avaliable via a new &amp;quot;show solution&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
* New database lessons&lt;br /&gt;
&lt;br /&gt;
* XSS phishing lesson is available via the source code project at Google.  Using a standard search feature, your mission is to create a &amp;quot;login&amp;quot; form on the page, steal the user credentials, and post the credentials to the WebGoat Catcher servlet.&lt;br /&gt;
&lt;br /&gt;
* Catcher servlet.  Want to prove your attack works?  You can now write lessons where the attack can send sensitive information to the Catcher servlet.  The Catcher servlet will write the posted values into the originating lesson's properties file.&lt;br /&gt;
&lt;br /&gt;
* Documentation.  A draft version of how to solve the WebGoat Labs is available at [http://webgoat.googlecode.com/files/Solving%20the%20WebGoat%20Labs%20Draft%20V2.pdf WebGoat Google Code Downloads]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [[http://www.sourceforge.net SourceForge]]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [[http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list]].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24481</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24481"/>
				<updated>2008-01-15T00:49:36Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:WebGoat-Phishing-XSS-Lesson.JPG|thumb|300px|right|Detailed solution hints]][[Image:WebGoat-Bypass-Access-Control-Lesson.JPG|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
==Download==&lt;br /&gt;
&lt;br /&gt;
You can download WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
You can download the WebGoat source code from [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  The Windows WebGoat release (unzip, click, and run) is only available at Sourceforge due to file size limits.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:WebGoat-Session-Hijack-Lesson.JPG|thumb|300px|right|Performing session hijacking]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
===WebGoat 5.1 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Developer (Waiting for Google disk quota approval issue 649):===&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.2 - Estimated release date: Spring 2008&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.1'''&lt;br /&gt;
&lt;br /&gt;
* Thanks to the OWASP Spring of Code project, Erwin Geirhart has provided a complete solutions guide that is avaliable via a new &amp;quot;show solution&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
* New database lessons&lt;br /&gt;
&lt;br /&gt;
* XSS phishing lesson is available via the source code project at Google.  Using a standard search feature, your mission is to create a &amp;quot;login&amp;quot; form on the page, steal the user credentials, and post the credentials to the WebGoat Catcher servlet.&lt;br /&gt;
&lt;br /&gt;
* Catcher servlet.  Want to prove your attack works?  You can now write lessons where the attack can send sensitive information to the Catcher servlet.  The Catcher servlet will write the posted values into the originating lesson's properties file.&lt;br /&gt;
&lt;br /&gt;
* Documentation.  A draft version of how to solve the WebGoat Labs is available at [http://webgoat.googlecode.com/files/Solving%20the%20WebGoat%20Labs%20Draft%20V2.pdf WebGoat Google Code Downloads]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [[http://www.sourceforge.net SourceForge]]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [[http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list]].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:WebGoat-Session-Hijack-Lesson.JPG&amp;diff=24480</id>
		<title>File:WebGoat-Session-Hijack-Lesson.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:WebGoat-Session-Hijack-Lesson.JPG&amp;diff=24480"/>
				<updated>2008-01-15T00:48:28Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: WebGoat session hijack lesson&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;WebGoat session hijack lesson&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:WebGoat-Bypass-Access-Control-Lesson.JPG&amp;diff=24479</id>
		<title>File:WebGoat-Bypass-Access-Control-Lesson.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:WebGoat-Bypass-Access-Control-Lesson.JPG&amp;diff=24479"/>
				<updated>2008-01-15T00:44:50Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: WebGoat path based access control&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;WebGoat path based access control&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:WebGoat-Phishing-XSS-Lesson.JPG&amp;diff=24478</id>
		<title>File:WebGoat-Phishing-XSS-Lesson.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:WebGoat-Phishing-XSS-Lesson.JPG&amp;diff=24478"/>
				<updated>2008-01-15T00:36:32Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: uploaded a new version of &amp;quot;Image:WebGoat-Phishing-XSS-Lesson.JPG&amp;quot;: WebGoat phishing lessons with hints&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;WebGoat Phishing example with hints&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:WebGoat-Phishing-XSS-Lesson.JPG&amp;diff=24477</id>
		<title>File:WebGoat-Phishing-XSS-Lesson.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:WebGoat-Phishing-XSS-Lesson.JPG&amp;diff=24477"/>
				<updated>2008-01-15T00:32:47Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: WebGoat Phishing example with hints&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;WebGoat Phishing example with hints&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24476</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24476"/>
				<updated>2008-01-15T00:07:27Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Future Development */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Webgoat-xss lesson.jpg|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
==Download==&lt;br /&gt;
&lt;br /&gt;
You can download WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
You can download the WebGoat source code from [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  The Windows WebGoat release (unzip, click, and run) is only available at Sourceforge due to file size limits.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:Webgoat-BasicAuth lesson.jpg|thumb|300px|right|The multi-stage Basic Authentication lesson]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
===WebGoat 5.1 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Developer (Waiting for Google disk quota approval issue 649):===&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.2 - Estimated release date: Spring 2008&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.1'''&lt;br /&gt;
&lt;br /&gt;
* Thanks to the OWASP Spring of Code project, Erwin Geirhart has provided a complete solutions guide that is avaliable via a new &amp;quot;show solution&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
* New database lessons&lt;br /&gt;
&lt;br /&gt;
* XSS phishing lesson is available via the source code project at Google.  Using a standard search feature, your mission is to create a &amp;quot;login&amp;quot; form on the page, steal the user credentials, and post the credentials to the WebGoat Catcher servlet.&lt;br /&gt;
&lt;br /&gt;
* Catcher servlet.  Want to prove your attack works?  You can now write lessons where the attack can send sensitive information to the Catcher servlet.  The Catcher servlet will write the posted values into the originating lesson's properties file.&lt;br /&gt;
&lt;br /&gt;
* Documentation.  A draft version of how to solve the WebGoat Labs is available at [http://webgoat.googlecode.com/files/Solving%20the%20WebGoat%20Labs%20Draft%20V2.pdf WebGoat Google Code Downloads]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [[http://www.sourceforge.net SourceForge]]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [[http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list]].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24475</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24475"/>
				<updated>2008-01-15T00:06:04Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* WebGoat 5.1 Developer (Waiting for Google disk quota approval issue 649): */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Webgoat-xss lesson.jpg|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
==Download==&lt;br /&gt;
&lt;br /&gt;
You can download WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
You can download the WebGoat source code from [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  The Windows WebGoat release (unzip, click, and run) is only available at Sourceforge due to file size limits.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:Webgoat-BasicAuth lesson.jpg|thumb|300px|right|The multi-stage Basic Authentication lesson]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
===WebGoat 5.1 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Developer (Waiting for Google disk quota approval issue 649):===&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Estimated release date: Fall 2007&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.1'''&lt;br /&gt;
&lt;br /&gt;
* Thanks to the OWASP Spring of Code project, Erwin Geirhart has provided a complete solutions guide that is avaliable via a new &amp;quot;show solution&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
* New database lessons&lt;br /&gt;
&lt;br /&gt;
* XSS phishing lesson is available via the source code project at Google.  Using a standard search feature, your mission is to create a &amp;quot;login&amp;quot; form on the page, steal the user credentials, and post the credentials to the WebGoat Catcher servlet.&lt;br /&gt;
&lt;br /&gt;
* Catcher servlet.  Want to prove your attack works?  You can now write lessons where the attack can send sensitive information to the Catcher servlet.  The Catcher servlet will write the posted values into the originating lesson's properties file.&lt;br /&gt;
&lt;br /&gt;
* Documentation.  A draft version of how to solve the WebGoat Labs is available at [http://webgoat.googlecode.com/files/Solving%20the%20WebGoat%20Labs%20Draft%20V2.pdf WebGoat Google Code Downloads]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [[http://www.sourceforge.net SourceForge]]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [[http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list]].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24474</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=24474"/>
				<updated>2008-01-15T00:03:08Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Newest Release */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Webgoat-xss lesson.jpg|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
==Download==&lt;br /&gt;
&lt;br /&gt;
You can download WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
You can download the WebGoat source code from [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  The Windows WebGoat release (unzip, click, and run) is only available at Sourceforge due to file size limits.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:Webgoat-BasicAuth lesson.jpg|thumb|300px|right|The multi-stage Basic Authentication lesson]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
==Releases==&lt;br /&gt;
===WebGoat 5.1 Standard:===&lt;br /&gt;
The standard release is a download, unzip, and click-to-run release.  It comes with the Java Runtime Environment and a configured Tomcat 5.5 server.&lt;br /&gt;
    * Double-click on webgoat.bat - a Tomcat command window starts&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
&lt;br /&gt;
===WebGoat 5.1 Developer (Waiting for Google disk quota approval issue 649):===&lt;br /&gt;
The developer release includes the standard release with the addition of a configured eclipse environment.  The developer release is also a download, unzip, and click-to-run release.  It works exactly the same as the standard release if you only wish to explore the lessons.  However, if you want to perform the labs or use WebGoat in the classroom, use the eclipse.bat to start up a preconfigured WebGoat environment.  Detailed instructions are include at the top of the _HOW TO create the WebGoat workspace.txt_ file.&lt;br /&gt;
    * Extract the Eclipse-Workspace.zip file to the working directory&lt;br /&gt;
    * Double-click the eclipse.bat file&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the WebGoat project and refresh&lt;br /&gt;
    * In the Eclipse package explorer (top right), right click the Servers project and refresh&lt;br /&gt;
    * In the Eclipse servers view (bottom), right click LocalHost server and start&lt;br /&gt;
    * Browse to http://localhost/WebGoat/attack&lt;br /&gt;
    * Any changes made to the source will automatically compile and redeploy when saved&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please send all comments to Bruce Mayhew at '''webgoat AT owasp.org''' regarding this release.&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Estimated release date: Fall 2007&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.1'''&lt;br /&gt;
&lt;br /&gt;
* Thanks to the OWASP Spring of Code project, Erwin Geirhart has provided a complete solutions guide that is avaliable via a new &amp;quot;show solution&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
* New database lessons&lt;br /&gt;
&lt;br /&gt;
* XSS phishing lesson is available via the source code project at Google.  Using a standard search feature, your mission is to create a &amp;quot;login&amp;quot; form on the page, steal the user credentials, and post the credentials to the WebGoat Catcher servlet.&lt;br /&gt;
&lt;br /&gt;
* Catcher servlet.  Want to prove your attack works?  You can now write lessons where the attack can send sensitive information to the Catcher servlet.  The Catcher servlet will write the posted values into the originating lesson's properties file.&lt;br /&gt;
&lt;br /&gt;
* Documentation.  A draft version of how to solve the WebGoat Labs is available at [http://webgoat.googlecode.com/files/Solving%20the%20WebGoat%20Labs%20Draft%20V2.pdf WebGoat Google Code Downloads]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [[http://www.sourceforge.net SourceForge]]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [[http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list]].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=22547</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=22547"/>
				<updated>2007-10-22T16:27:04Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Newest Release */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Webgoat-xss lesson.jpg|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
==Download==&lt;br /&gt;
&lt;br /&gt;
You can download WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
You can download the WebGoat source code from [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  The Windows WebGoat release (unzip, click, and run) is only available at Sourceforge due to file size limits.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:Webgoat-BasicAuth lesson.jpg|thumb|300px|right|The multi-stage Basic Authentication lesson]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
== Newest Release ==&lt;br /&gt;
&lt;br /&gt;
'''WebGoat 5.1 Release Candidate 1''' is available.  This new release is platform independent.  This release features:&lt;br /&gt;
&lt;br /&gt;
  * a new &amp;quot;show solution&amp;quot; feature&lt;br /&gt;
  * Phishing lesson&lt;br /&gt;
  * New database lessons - for Oracle database only&lt;br /&gt;
  * Multi-stage architecture which allows random access to lab stages&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''WebGoat 5.0'''&lt;br /&gt;
&lt;br /&gt;
'''WebGoat 5.0''' has been released. Special thanks to the many people who have sent comments and suggestions and those who have put in the effort to contribute their time to this release. &lt;br /&gt;
&lt;br /&gt;
The 5.0 release would not have been possible without the efforts of Sherif Koussa and [http://www.owasp.org/index.php/Owasp_Autumn_Of_Code_2006 OWASP Autumn of Code 2006].&lt;br /&gt;
&lt;br /&gt;
Please send all comments to '''webgoat AT owasp.org''' regarding this release candidate. A final release is scheduled for the end of January&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Estimated release date: Fall 2007&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.1'''&lt;br /&gt;
&lt;br /&gt;
* Thanks to the OWASP Spring of Code project, Erwin Geirhart has provided a complete solutions guide that is avaliable via a new &amp;quot;show solution&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
* New database lessons&lt;br /&gt;
&lt;br /&gt;
* XSS phishing lesson is available via the source code project at Google.  Using a standard search feature, your mission is to create a &amp;quot;login&amp;quot; form on the page, steal the user credentials, and post the credentials to the WebGoat Catcher servlet.&lt;br /&gt;
&lt;br /&gt;
* Catcher servlet.  Want to prove your attack works?  You can now write lessons where the attack can send sensitive information to the Catcher servlet.  The Catcher servlet will write the posted values into the originating lesson's properties file.&lt;br /&gt;
&lt;br /&gt;
* Documentation.  A draft version of how to solve the WebGoat Labs is available at [http://webgoat.googlecode.com/files/Solving%20the%20WebGoat%20Labs%20Draft%20V2.pdf WebGoat Google Code Downloads]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [[http://www.sourceforge.net SourceForge]]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [[http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list]].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WebGoat_Project_Roadmap&amp;diff=22245</id>
		<title>OWASP WebGoat Project Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WebGoat_Project_Roadmap&amp;diff=22245"/>
				<updated>2007-10-08T20:33:53Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Be the defacto standard web application security training environment&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Demonstrate most common web application security vulnerabilities&lt;br /&gt;
# Increase ease-of-use and expand userbase&lt;br /&gt;
# Attract more contributions of lessons&lt;br /&gt;
# Revisit existing lesson base to standardize lesson theme.&lt;br /&gt;
&lt;br /&gt;
Here are the current tasks defined to help us achieve these goals&lt;br /&gt;
&lt;br /&gt;
'''Architectural'''&lt;br /&gt;
* Convert lessons to struts framework (Major effort)&lt;br /&gt;
* Rewrite all lessons to follow common theme using common database&lt;br /&gt;
* Rewrite user administration to allow better user management (non-hackable)&lt;br /&gt;
* Fix Logoff&lt;br /&gt;
* Defuse all lessons to disallow inadvertent harm to user's OS &lt;br /&gt;
&lt;br /&gt;
'''General'''&lt;br /&gt;
* General security cleanup. Remove exploits that are not lesson specific&lt;br /&gt;
* Denial of service lesson rewrite&lt;br /&gt;
* Bypass client side javascript lesson rewrite&lt;br /&gt;
* Improve using an access control matrix lesson&lt;br /&gt;
* Improve encoding basics lesson&lt;br /&gt;
* Improve thread safety lesson&lt;br /&gt;
* Cross site trace only works in older browsers&lt;br /&gt;
* Improve CSRF lesson&lt;br /&gt;
&lt;br /&gt;
'''New Lessons'''&lt;br /&gt;
* Server side forward allows access to WEB-INF resources&lt;br /&gt;
* Account enumeration using webscarab&lt;br /&gt;
* Buffer overflow&lt;br /&gt;
* SQLException lesson - could tie into overall error handling&lt;br /&gt;
* XML attacks - Entity recursion, ...&lt;br /&gt;
&lt;br /&gt;
For more information contact Bruce Mayhew at webgoat at owasp dot org&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP WebGoat Project]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=22244</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=22244"/>
				<updated>2007-10-08T20:33:07Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Future Development */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Webgoat-xss lesson.jpg|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
==Download==&lt;br /&gt;
&lt;br /&gt;
You can download WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
You can download the WebGoat source code from [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  The Windows WebGoat release (unzip, click, and run) is only available at Sourceforge due to file size limits.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:Webgoat-BasicAuth lesson.jpg|thumb|300px|right|The multi-stage Basic Authentication lesson]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
== Newest Release ==&lt;br /&gt;
'''WebGoat 5.0'''&lt;br /&gt;
&lt;br /&gt;
'''WebGoat 5.0''' has been released. Special thanks to the many people who have sent comments and suggestions and those who have put in the effort to contribute their time to this release. &lt;br /&gt;
&lt;br /&gt;
The 5.0 release would not have been possible without the efforts of Sherif Koussa and [http://www.owasp.org/index.php/Owasp_Autumn_Of_Code_2006 OWASP Autumn of Code 2006].&lt;br /&gt;
&lt;br /&gt;
Please send all comments to '''webgoat AT owasp.org''' regarding this release candidate. A final release is scheduled for the end of January&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Estimated release date: Fall 2007&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.1 - Is now available via svn at google code&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''webgoat AT owasp.org'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.1'''&lt;br /&gt;
&lt;br /&gt;
* Thanks to the OWASP Spring of Code project, Erwin Geirhart has provided a complete solutions guide that is avaliable via a new &amp;quot;show solution&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
* New database lessons&lt;br /&gt;
&lt;br /&gt;
* XSS phishing lesson is available via the source code project at Google.  Using a standard search feature, your mission is to create a &amp;quot;login&amp;quot; form on the page, steal the user credentials, and post the credentials to the WebGoat Catcher servlet.&lt;br /&gt;
&lt;br /&gt;
* Catcher servlet.  Want to prove your attack works?  You can now write lessons where the attack can send sensitive information to the Catcher servlet.  The Catcher servlet will write the posted values into the originating lesson's properties file.&lt;br /&gt;
&lt;br /&gt;
* Documentation.  A draft version of how to solve the WebGoat Labs is available at [http://webgoat.googlecode.com/files/Solving%20the%20WebGoat%20Labs%20Draft%20V2.pdf WebGoat Google Code Downloads]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew. He can be contacted at '''webgoat AT owasp.org'''.  WebGoat distributions are currently maintained on [[http://www.sourceforge.net SourceForge]]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [[http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list]].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_WebGoat_Project_Roadmap&amp;diff=22239</id>
		<title>OWASP WebGoat Project Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_WebGoat_Project_Roadmap&amp;diff=22239"/>
				<updated>2007-10-08T14:00:30Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Be the defacto standard web application security training environment&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Demonstrate most common web application security vulnerabilities&lt;br /&gt;
# Increase ease-of-use and expand userbase&lt;br /&gt;
# Attract more contributions of lessons&lt;br /&gt;
&lt;br /&gt;
# Revisit existing lesson base to standardize lesson theme.&lt;br /&gt;
&lt;br /&gt;
Here are the current tasks defined to help us achieve these goals&lt;br /&gt;
&lt;br /&gt;
'''Architectural'''&lt;br /&gt;
* Convert lessons to struts framework (Major effort)&lt;br /&gt;
* Rewrite all lessons to follow common theme using common database&lt;br /&gt;
* Rewrite user administration to allow better user management (non-hackable)&lt;br /&gt;
* Fix Logoff&lt;br /&gt;
* Defuse all lessons to disallow inadvertent harm to user's OS &lt;br /&gt;
&lt;br /&gt;
'''General'''&lt;br /&gt;
* General security cleanup. Remove exploits that are not lesson specific&lt;br /&gt;
* Denial of service lesson rewrite&lt;br /&gt;
* Bypass client side javascript lesson rewrite&lt;br /&gt;
* Improve using an access control matrix lesson&lt;br /&gt;
* Improve encoding basics lesson&lt;br /&gt;
* Improve thread safety lesson&lt;br /&gt;
* Cross site trace only works in older browsers&lt;br /&gt;
* Improve CSRF lesson&lt;br /&gt;
&lt;br /&gt;
'''New Lessons'''&lt;br /&gt;
* Server side forward allows access to WEB-INF resources&lt;br /&gt;
* Account enumeration using webscarab&lt;br /&gt;
* Buffer overflow&lt;br /&gt;
* SQLException lesson - could tie into overall error handling&lt;br /&gt;
* XML attacks - Entity recursion, ...&lt;br /&gt;
&lt;br /&gt;
For more information contact Bruce Mayhew at webgoat at owasp dot org&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP WebGoat Project]]&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=17414</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=17414"/>
				<updated>2007-03-26T13:01:34Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Future Development */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Webgoat-xss lesson.jpg|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
==Download==&lt;br /&gt;
&lt;br /&gt;
You can download WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
You can download the WebGoat source code from [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  The Windows WebGoat release (unzip, click, and run) is only available at Sourceforge due to file size limits.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:Webgoat-BasicAuth lesson.jpg|thumb|300px|right|The multi-stage Basic Authentication lesson]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
== Newest Release ==&lt;br /&gt;
'''WebGoat 5.0'''&lt;br /&gt;
&lt;br /&gt;
'''WebGoat 5.0''' has been released. Special thanks to the many people who have sent comments and suggestions and those who have put in the effort to contribute their time to this release. &lt;br /&gt;
&lt;br /&gt;
The 5.0 release would not have been possible without the efforts of Sherif Koussa and [http://www.owasp.org/index.php/Owasp_Autumn_Of_Code_2006 OWASP Autumn of Code 2006].&lt;br /&gt;
&lt;br /&gt;
Please send all comments to '''webgoat AT g2-inc DOT com''' regarding this release candidate. A final release is scheduled for the end of January&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.x - Estimated release date: Summer 2007&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''bruce DOT mayhew AT g2-inc.com'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.x'''&lt;br /&gt;
&lt;br /&gt;
* XSS phishing lesson is available via the source code project at Google.  Using a standard search feature, your mission is to create a &amp;quot;login&amp;quot; form on the page, steal the user credentials, and post the credentials to the WebGoat Catcher servlet.&lt;br /&gt;
&lt;br /&gt;
* Catcher servlet.  Want to prove your attack works?  You can now write lessons where the attack can send sensitive information to the Catcher servlet.  The Catcher servlet will write the posted values into the originating lesson's properties file.&lt;br /&gt;
&lt;br /&gt;
* Documentation.  A draft version of how to solve the WebGoat Labs is available at [http://webgoat.googlecode.com/files/Solving%20the%20WebGoat%20Labs%20Draft%20V2.pdf WebGoat Google Code Downloads]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew of G2. He can be contacted at '''bruce DOT mayhew AT g2-inc.com'''.  WebGoat distributions are currently maintained on [[http://www.sourceforge.net SourceForge]]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [[http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list]].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=17404</id>
		<title>Category:OWASP WebGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_WebGoat_Project&amp;diff=17404"/>
				<updated>2007-03-24T11:50:46Z</updated>
		
		<summary type="html">&lt;p&gt;Bmayhew: /* Future Development */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Webgoat-xss lesson.jpg|thumb|300px|right|WebGoat in action]]&lt;br /&gt;
'''WebGoat''' is a deliberately insecure J2EE web application maintained by [http://www.owasp.org OWASP] designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application. For example, in one of the lessons the user must use [[SQL injection]] to steal fake credit card numbers. The application is a realistic teaching environment, providing users with hints and code to further explain the lesson.&lt;br /&gt;
&lt;br /&gt;
Why the name &amp;quot;WebGoat&amp;quot;? Developers should not feel bad about not knowing security. Even the best programmers make security errors. What they need is a scapegoat, right? ''Just blame it on the 'Goat''!&lt;br /&gt;
&lt;br /&gt;
'''To get started, read the [[WebGoat User and Install Guide Table of Contents|WebGoat User and Install Guide]]'''&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
&lt;br /&gt;
Web application security is difficult to learn and practice. Not many people have full blown web applications like online book stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe and legal environment. Even if your intentions are good, we believe you should never attempt to find vulnerabilities without permission.&lt;br /&gt;
&lt;br /&gt;
The primary goal of the WebGoat project is simple: ''create a de-facto interactive teaching environment for web application security''. In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot.&lt;br /&gt;
&lt;br /&gt;
Check out the project [[OWASP WebGoat Project Roadmap|roadmap]] and find some tasks that you can help with right away.&lt;br /&gt;
&lt;br /&gt;
==Download==&lt;br /&gt;
&lt;br /&gt;
You can download WebGoat from the [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=61824 OWASP Source Code Center at Sourceforge]. There are versions with and without Java, and installation only requires unzipping the download and running a start script. For convenience, a ready-to-deploy WAR file is also made available to drop right into your J2EE application server.&lt;br /&gt;
&lt;br /&gt;
You can download the WebGoat source code from [http://code.google.com/p/webgoat/ Google code].&lt;br /&gt;
&lt;br /&gt;
The WebGoat distributions are now available at [http://code.google.com/p/webgoat/downloads/list Google code downloads].  The Windows WebGoat release (unzip, click, and run) is only available at Sourceforge due to file size limits.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
[[Image:Webgoat-BasicAuth lesson.jpg|thumb|300px|right|The multi-stage Basic Authentication lesson]]&lt;br /&gt;
WebGoat is written in Java and therefore installs on any platform with a Java virtual machine. There are installation programs for Linux, OS X Tiger and Windows. Once deployed, the user can go through the lessons and track their progress with the scorecard. There are currently over 30 lessons, including those dealing with the following issues:&lt;br /&gt;
{|&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|&lt;br /&gt;
* [[Cross Site Scripting]]&lt;br /&gt;
* Access Control&lt;br /&gt;
* [[Race condition within a thread|Thread Safety]]&lt;br /&gt;
* [[Unvalidated_Input|Hidden Form Field Manipulation]]&lt;br /&gt;
* Parameter Manipulation&lt;br /&gt;
* [[Session_Management#Weak_Session_Cryptographic_Algorithms|Weak Session Cookies]]&lt;br /&gt;
* Blind [[SQL injection|SQL Injection]]&lt;br /&gt;
|valign=&amp;quot;top&amp;quot;|  &lt;br /&gt;
* Numeric SQL Injection&lt;br /&gt;
* String SQL Injection&lt;br /&gt;
* [[Web Services]]&lt;br /&gt;
* [[Improper_Error_Handling|Fail Open Authentication]]&lt;br /&gt;
* Dangers of HTML Comments&lt;br /&gt;
* ... and many more!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For more details, please see the [[WebGoat User and Install Guide Table of Contents | WebGoat User and Install Guide]].&lt;br /&gt;
&lt;br /&gt;
== Newest Release ==&lt;br /&gt;
'''WebGoat 5.0'''&lt;br /&gt;
&lt;br /&gt;
'''WebGoat 5.0''' has been released. Special thanks to the many people who have sent comments and suggestions and those who have put in the effort to contribute their time to this release. &lt;br /&gt;
&lt;br /&gt;
The 5.0 release would not have been possible without the efforts of Sherif Koussa and [http://www.owasp.org/index.php/Owasp_Autumn_Of_Code_2006 OWASP Autumn of Code 2006].&lt;br /&gt;
&lt;br /&gt;
Please send all comments to '''webgoat AT g2-inc DOT com''' regarding this release candidate. A final release is scheduled for the end of January&lt;br /&gt;
&lt;br /&gt;
== Future Development ==&lt;br /&gt;
&lt;br /&gt;
WebGoat 5.x - Estimated release date: Summer 2007&lt;br /&gt;
&lt;br /&gt;
If you would like to become a member of the WebGoat source code project hosted at [http://code.google.com/p/webgoat/ Google Code] contact Bruce Mayhew at '''bruce DOT mayhew AT g2-inc.com'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''New Features in 5.x'''&lt;br /&gt;
&lt;br /&gt;
* XSS phishing lesson is available via the source code project at Google.  Using a standard search feature, your mission is create a &amp;quot;login&amp;quot; form on the page, steal the user credentials, and post the credentials to the WebGoat Catcher servlet.&lt;br /&gt;
&lt;br /&gt;
* Catcher servlet.  Want to prove your attack works?  You can now write lessons where the attack can send sensitive information to the Catcher servlet.  The Catcher servlet will write the posted values into the originating lesson's properties file.&lt;br /&gt;
&lt;br /&gt;
* Documentation.  A draft version of how to solve the WebGoat Labs is available at [http://webgoat.googlecode.com/files/Solving%20the%20WebGoat%20Labs%20Draft%20V2.pdf WebGoat Google Code Downloads]&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is run by Bruce Mayhew of G2. He can be contacted at '''bruce DOT mayhew AT g2-inc.com'''.  WebGoat distributions are currently maintained on [[http://www.sourceforge.net SourceForge]]. The WebGoat framework makes it extremely easy to add additional lessons. We are actively seeking developers to add new lessons as new web technologies emerge. If you are interested in volunteering for the project, or have a comment, question, or suggestion, please join the WebGoat [[http://lists.owasp.org/mailman/listinfo/owasp-webgoat mailing list]].&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The WebGoat project is sponsored by &lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/3/30/100px-Aspect_Security_Logo.jpg]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Bmayhew</name></author>	</entry>

	</feed>