<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Vicnum</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Vicnum"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Vicnum"/>
		<updated>2026-05-15T15:16:13Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DevSlop_Project&amp;diff=241165</id>
		<title>OWASP DevSlop Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DevSlop_Project&amp;diff=241165"/>
				<updated>2018-06-06T14:24:36Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Team Members */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP [http://devslop.co DevSlop] Tool Project==&lt;br /&gt;
''The hacker jungle gym built on DevOps disasters.''[[File:DevSlop Logo.jpg|alt= DevSlop Project Logo|thumb|315x315px|DevSlop Project Logo]] &lt;br /&gt;
&lt;br /&gt;
Project Website:  [http://devslop.co DevSlop]&lt;br /&gt;
&lt;br /&gt;
Modern applications often use APIs, microservices and containerization to deliver faster and better products and services.   There has been a massive migration away from monolithic web applications to this new, highly scalable architecture.  However, there are currently few training grounds for security testing in these areas. In comes DevSlop, OWASP's newest project, a collection of DevOps-driven applications, specifically designed to showcase security catastrophes and vulnerabilities for use in security testing, software testing, learning and teaching for both developers and security professionals. &lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
DevSlop's '''Pixi''', the first of many applications to come for this OWASP project, is currently publicly available for your hacking and learning pleasure. Pixi is available in several docker containers and consists of a vulnerable web app and API service.  The intent is to teach users how to test modern web applications and API's for security issues and how to write more secure API's in the future.[[File:Pixi logo.png|alt= Pixi Logo|thumb|145x145px|Pixi Logo]]&lt;br /&gt;
&lt;br /&gt;
As more pieces of [http://devslop.co DevSlop] are released they will be introduced here.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation.  OWASP DevSlop and any contributions are Copyright &amp;amp;copy; by Nicole Becher &amp;amp; Tanya Janca 2017.  &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
[https://github.com/SamanthaGroves Installation Package]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DevSlop/ Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/thedeadrobots/pixi.git What's New (Revision History)]&lt;br /&gt;
&lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
[[Index.php/OWASP DevSlop Project|Wiki Home Page]]&lt;br /&gt;
&lt;br /&gt;
Issue Tracker&lt;br /&gt;
&lt;br /&gt;
[https://www.slideshare.net/TanyaJanca/api-and-web-service-hacking-with-pixi-part-of-owasp-devslop Slide Presentation]&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=td-2rN4PgRw&amp;amp;feature=youtu.be Video]&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP DevSlop&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
[[User:Nicolebecher|Nicole Becher]] [https://twitter.com/thedeadrobots Twitter] &lt;br /&gt;
&lt;br /&gt;
[[User:Tanyajanca|Tanya Janca]] [https://twitter.com/shehackspurple Twitter] &lt;br /&gt;
&lt;br /&gt;
[[User:Secfigo|Mohammed A. Imran]] [https://twitter.com/secfigo Twitter] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Team Members ==&lt;br /&gt;
&lt;br /&gt;
[[User:Franziskabuehler|Franziska Bühler]] [https://twitter.com/bufrasch Twitter]  &lt;br /&gt;
&lt;br /&gt;
[[User:Mordecai Kraushar|Mordecai Kraushar]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
* [[OWASP Juice Shop Project]]&lt;br /&gt;
* [[OWASP WebGoat Project]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [http://devslop.co/Home/Schedule Check out our schedule!] &lt;br /&gt;
* [July 2] Tanya Janca will be giving the &amp;quot;Hack Your Own Apps&amp;quot; workshop at the [https://www.spaconference.org/spa2018 SPA Conference in London], England. &lt;br /&gt;
* [June 4-6, 2018] The entire DevSlop team will be at the [https://owaspsummit.org/ Open Security Summit] in London, England. &lt;br /&gt;
* [May 18, 2018] Pixi workshop presented at [https://www.nsec.io NorthSec] in Montreal, Canada. &lt;br /&gt;
* [March 2018] Introduced new project team members: Mohammed A. Imran and Franziska Bühler &lt;br /&gt;
* [28 Jan 2018} DevSlop full day workshop at [http://sched.co/CuDe AppSec Cali: Intro To Web Hacking Using ZAP/Hacking APIs And The MEAN Stack] &lt;br /&gt;
* [19 Sept 2017] DevSlop 3 hour workshop presented as part of the [[AppSecUSA 2017 Developer Summit|AppSec USA 2017 Developer Summit]].&lt;br /&gt;
* [5 Sept 2017] DevSlop project team interviewed on [https://appsecpodcast.org/2017/09/05/hacking-apis-and-web-services-with-devslop-s02e13/ AppSec Podcast]&lt;br /&gt;
* [12 July 2017] [https://www.youtube.com/watch?v=td-2rN4PgRw&amp;amp;feature=youtu.be DevSlop Project announced at Microsoft Tech Days in NYC.]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Where can I get Pixi?'''  [[File:Pixi Image.png|alt= Pixi|thumb|96x96px|'''Pixi''']]&lt;br /&gt;
&lt;br /&gt;
To get Pixi is simple!&lt;br /&gt;
&lt;br /&gt;
You can manually download Pixi here: &amp;lt;nowiki&amp;gt;https://github.com/thedeadrobots/pixi&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Install Docker and start it. &lt;br /&gt;
&lt;br /&gt;
Type the following at your command prompt:&lt;br /&gt;
&lt;br /&gt;
&amp;gt; git clone https://github.com/thedeadrobots/pixi.git &amp;lt;enter&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;gt; cd pixi &amp;lt;enter&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;gt; docker-compose up &amp;lt;enter&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In your browser go to: &amp;lt;nowiki&amp;gt;http://localhost:8000/login&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You're all set!     &lt;br /&gt;
&lt;br /&gt;
'''How can I donate to DevSlop?''' &lt;br /&gt;
&lt;br /&gt;
Click the button!  :)&lt;br /&gt;
&lt;br /&gt;
{{#widget:PayPal Donation&lt;br /&gt;
|target=_blank&lt;br /&gt;
|budget=OWASP DevSlop&lt;br /&gt;
}}   &lt;br /&gt;
&lt;br /&gt;
'''I have a great idea for new DevSlop additions, how do I tell you(s)?'''  &lt;br /&gt;
&lt;br /&gt;
Email us!  firstname.lastname@owasp.org (Nicole Becher and Tanya Janca). You can do the math.  :)   &lt;br /&gt;
&lt;br /&gt;
'''How can I follow updates on the project?'''  &lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/thedeadrobots Nicole Becher on Twitter]   &lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/shehackspurple Tanya Janca on Twitter] &lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for people to give us ideas for new components and problems to add, as well as people to help code them.   See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
The OWASP DevSlop Project was created by the project leaders, Nicole and Tanya.  Contributors include: Mordecai Kraushar.   &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher [https://twitter.com/thedeadrobots Twitter]&lt;br /&gt;
* [[User:Tanyajanca|Tanya Janca]] [https://twitter.com/shehackspurple Twitter]&lt;br /&gt;
* [[User:Secfigo|Mohammed A. Imran]] [https://twitter.com/secfigo Twitter] &lt;br /&gt;
* [[User:Franziskabuehler|Franziska Bühler]] [https://twitter.com/bufrasch Twitter]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of March 2018:&lt;br /&gt;
* Add new team members&lt;br /&gt;
* Each add our own components to our new repo&lt;br /&gt;
* Get ready for Open Security Summit&lt;br /&gt;
* Release and document all work done at the Open Security Summit&lt;br /&gt;
&lt;br /&gt;
As of &amp;lt;strong&amp;gt;September 2017, the highest priorities for the next 12 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&lt;br /&gt;
Each DevSlop component will have it's own roadmap.&lt;br /&gt;
&lt;br /&gt;
'''DevSlop Project Roadmap:'''&lt;br /&gt;
* Finish completing this Wiki page and get it reviewed/approved&lt;br /&gt;
* Move all Pixi code into OWASP GitHub&lt;br /&gt;
* Promote Project (interviews, speaking engagements, articles, etc)&lt;br /&gt;
* Document Project &lt;br /&gt;
* Create Issue Tracker&lt;br /&gt;
* Follow Pixi Roadmap&lt;br /&gt;
* Accept ideas for future components&lt;br /&gt;
* Create HTTP 2.0 app as Component #2&lt;br /&gt;
* Create more DevOps apps&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Pixi Roadmap (First DevSlop Component):'''&lt;br /&gt;
* Document all the vulnerabilities&lt;br /&gt;
* Multi language support&lt;br /&gt;
* Finish CTF mode&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of '''DevSlop''' is actively encouraged!  You do not have to be a security expert or a programmer to contribute.  Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
=== Ideas ===&lt;br /&gt;
We need to know where to go next with this project.  Have you seen an IT tragedy recently?  Tell us about it!  The more modern and 'different' the better!&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with coding it.  Someone like you.&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;DevSlop Project&amp;lt;/strong&amp;gt; into that language?  Pretty please?&lt;br /&gt;
===Feedback===&lt;br /&gt;
Please email us to give us feedback: firstname.lastname@owasp.org (Nicole Becher and Tanya Janca)&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What do like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What don't you like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What features would you like to see prioritized on the roadmap?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
The DevSlop Project must provide documentation (in form of videos, blog posts, interviews, within the app, or anything else) to teach users how to use it.  Without any information it's hard to know if the users are learning all of the lessons that they need to.  It would also be ideal if Pixi and other future components were translated into different languages.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
The OWASP DevSlop project is intended as place for people to learn about new, modern and different web related application security issues.  It is a vulnerable series of systems, open to the public to download and play with.  The first instalment is called Pixi and is available now.  More pieces will be released as they are available, as well as training and other learning aids.&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217290</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217290"/>
				<updated>2016-05-23T00:49:33Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Quick Downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
A sample view is typically available at http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications aredownloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
The individual code is also downloadable from github.&lt;br /&gt;
&lt;br /&gt;
Some Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/  for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge&lt;br /&gt;
&lt;br /&gt;
https://github.com/mordecai/vicnum  for the Guessnum, Jotto, and the Union Challenge code&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app&lt;br /&gt;
&lt;br /&gt;
https://sourceforge.net/projects/xxe/  for a VM of an intentionally vulnerable web services exploitable with XXE written in GRAILS&lt;br /&gt;
&lt;br /&gt;
https://github.com/mordecai/BasicCTF  for a basic CTF requiring the player to parse a PCAP and work their way around a web app&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in some downloads, and readmes on github as well as a pdf manual.  Basically set up the database, make sure the apache modules are loaded and for Guessnum and Jotto modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
----&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009, Early releases introduced several vulnerable apps (and CTFs) including Guessnum, Jotto and the Union Challenge. Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217288</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217288"/>
				<updated>2016-05-23T00:33:28Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
A sample view is typically available at http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications aredownloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
The individual code is also downloadable from github.&lt;br /&gt;
&lt;br /&gt;
Some Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/  for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app&lt;br /&gt;
&lt;br /&gt;
https://sourceforge.net/projects/xxe/  for a VM of an intentionally vulnerable web services exploitable with XXE written in GRAILS&lt;br /&gt;
&lt;br /&gt;
https://github.com/mordecai/BasicCTF  for a basic CTF requiring the player to parse a PCAP and work their way around a web app&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in some downloads, and readmes on github as well as a pdf manual.  Basically set up the database, make sure the apache modules are loaded and for Guessnum and Jotto modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
----&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009, Early releases introduced several vulnerable apps (and CTFs) including Guessnum, Jotto and the Union Challenge. Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217287</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217287"/>
				<updated>2016-05-23T00:32:36Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* FAQs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
A sample view is typically available at http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications aredownloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
The individual code is also downloadable from github.&lt;br /&gt;
&lt;br /&gt;
Some Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/  for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app&lt;br /&gt;
&lt;br /&gt;
https://sourceforge.net/projects/xxe/  for a VM of an intentionally vulnerable web services exploitable with XXE written in GRAILS&lt;br /&gt;
&lt;br /&gt;
https://github.com/mordecai/BasicCTF  for a basic CTF requiring the player to parse a PCAP and work their way around a web app&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in some downloads, and readmes on github as well as a pdf manual.  Basically set up the database, make sure the apache modules are loaded and for Guessnum and Jotto modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009, Early releases introduced several vulnerable apps (and CTFs) including Guessnum, Jotto and the Union Challenge. Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217284</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217284"/>
				<updated>2016-05-23T00:29:09Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
A sample view is typically available at http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications aredownloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
The individual code is also downloadable from github.&lt;br /&gt;
&lt;br /&gt;
Some Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/  for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app&lt;br /&gt;
&lt;br /&gt;
https://sourceforge.net/projects/xxe/  for a VM of an intentionally vulnerable web services exploitable with XXE written in GRAILS&lt;br /&gt;
&lt;br /&gt;
https://github.com/mordecai/BasicCTF  for a basic CTF requiring the player to parse a PCAP and work their way around a web app&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009, Early releases introduced several vulnerable apps (and CTFs) including Guessnum, Jotto and the Union Challenge. Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217283</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217283"/>
				<updated>2016-05-23T00:28:08Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Where is Vicnum? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications aredownloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
The individual code is also downloadable from github.&lt;br /&gt;
&lt;br /&gt;
Some Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/  for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app&lt;br /&gt;
&lt;br /&gt;
https://sourceforge.net/projects/xxe/  for a VM of an intentionally vulnerable web services exploitable with XXE written in GRAILS&lt;br /&gt;
&lt;br /&gt;
https://github.com/mordecai/BasicCTF  for a basic CTF requiring the player to parse a PCAP and work their way around a web app&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009, Early releases introduced several vulnerable apps (and CTFs) including Guessnum, Jotto and the Union Challenge. Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217282</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217282"/>
				<updated>2016-05-23T00:27:56Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Where is Vicnum? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
The individual code is also downloadable from github.&lt;br /&gt;
&lt;br /&gt;
Some Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/  for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app&lt;br /&gt;
&lt;br /&gt;
https://sourceforge.net/projects/xxe/  for a VM of an intentionally vulnerable web services exploitable with XXE written in GRAILS&lt;br /&gt;
&lt;br /&gt;
https://github.com/mordecai/BasicCTF  for a basic CTF requiring the player to parse a PCAP and work their way around a web app&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009, Early releases introduced several vulnerable apps (and CTFs) including Guessnum, Jotto and the Union Challenge. Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217281</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217281"/>
				<updated>2016-05-23T00:26:38Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Where is Vicnum? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge and github.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/  for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app&lt;br /&gt;
&lt;br /&gt;
https://sourceforge.net/projects/xxe/  for a VM of an intentionally vulnerable web services exploitable with XXE written in GRAILS&lt;br /&gt;
&lt;br /&gt;
https://github.com/mordecai/BasicCTF  for a basic CTF requiring the player to parse a PCAP and work their way around a web app&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009, Early releases introduced several vulnerable apps (and CTFs) including Guessnum, Jotto and the Union Challenge. Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217280</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217280"/>
				<updated>2016-05-23T00:23:50Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Project About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/  for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app&lt;br /&gt;
&lt;br /&gt;
https://sourceforge.net/projects/xxe/  for a VM of an intentionally vulnerable web services exploitable with XXE written in GRAILS&lt;br /&gt;
&lt;br /&gt;
https://github.com/mordecai/BasicCTF  for a basic CTF requiring the player to parse a PCAP and work their way around a web app&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009, Early releases introduced several vulnerable apps (and CTFs) including Guessnum, Jotto and the Union Challenge. Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217279</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217279"/>
				<updated>2016-05-23T00:20:21Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Quick Downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/  for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app&lt;br /&gt;
&lt;br /&gt;
https://sourceforge.net/projects/xxe/  for a VM of an intentionally vulnerable web services exploitable with XXE written in GRAILS&lt;br /&gt;
&lt;br /&gt;
https://github.com/mordecai/BasicCTF  for a basic CTF requiring the player to parse a PCAP and work their way around a web app&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009 as new CTFs have been introduced releases have changed.  Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217278</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217278"/>
				<updated>2016-05-23T00:10:54Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Quick Downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/  for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app&lt;br /&gt;
&lt;br /&gt;
https://sourceforge.net/projects/xxe/  for a VM of an intentionally vulnerable web services exploitable with XXE written in GRAILS&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009 as new CTFs have been introduced releases have changed.  Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217276</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217276"/>
				<updated>2016-05-23T00:05:58Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Quick Downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/  for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009 as new CTFs have been introduced releases have changed.  Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217275</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217275"/>
				<updated>2016-05-23T00:04:14Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Quick Downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/  for a VM of early VM applications&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009 as new CTFs have been introduced releases have changed.  Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217250</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217250"/>
				<updated>2016-05-22T15:04:04Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* FAQs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009 as new CTFs have been introduced releases have changed.  Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217249</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217249"/>
				<updated>2016-05-22T15:02:48Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Project About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009 as new CTFs have been introduced releases have changed.  Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217248</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217248"/>
				<updated>2016-05-22T15:01:35Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217247</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217247"/>
				<updated>2016-05-22T15:01:18Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217246</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217246"/>
				<updated>2016-05-22T15:00:31Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217245</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217245"/>
				<updated>2016-05-22T15:00:08Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217244</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217244"/>
				<updated>2016-05-22T14:58:07Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Others */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217243</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217243"/>
				<updated>2016-05-22T14:56:07Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Acknowledgements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217242</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217242"/>
				<updated>2016-05-22T14:54:34Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* FAQs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There are help folder in the downloads and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217240</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217240"/>
				<updated>2016-05-22T14:51:40Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Project Goal */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
*Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217238</id>
		<title>OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Vicnum_Project&amp;diff=217238"/>
				<updated>2016-05-22T14:51:00Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* OWASP Vicnum Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
*Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
*Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
*Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
*Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
*Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
*Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
*Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216869</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216869"/>
				<updated>2016-05-13T18:44:30Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
They can also be used to test non technical vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
The latest release update (v1.7) was a basic ctf (https://sourceforge.net/projects/vicnum/files/Basicctf/)&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There is a help folder in the download and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
----&lt;br /&gt;
Injection&lt;br /&gt;
----&lt;br /&gt;
Verbosity&lt;br /&gt;
----&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
----&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
----&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009 as new CTFs have been introduced releases have changed.  Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216868</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216868"/>
				<updated>2016-05-13T18:43:39Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
They can also be used to test non technical vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
The latest release update (v1.7) was a basic ctf (https://sourceforge.net/projects/vicnum/files/Basicctf/)&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There is a help folder in the download and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
The vulnerable API !&lt;br /&gt;
&lt;br /&gt;
API’s are everywhere! Mobile &amp;amp; web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s.  A vulnerable API can be just as destructive as a vulnerable web application.  So, how do you test an API?   The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities.  This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as:&lt;br /&gt;
Authentication&lt;br /&gt;
Injection&lt;br /&gt;
Verbosity&lt;br /&gt;
Transport Encryption&lt;br /&gt;
Denial of Service&lt;br /&gt;
Insecure Direct Object References&lt;br /&gt;
Unrestricted File Uploads&lt;br /&gt;
and more.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009 as new CTFs have been introduced releases have changed.  Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216850</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216850"/>
				<updated>2016-05-12T20:50:12Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
They can also be used to test non technical vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
The latest release update (v1.7) was a basic ctf (https://sourceforge.net/projects/vicnum/files/Basicctf/)&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There is a help folder in the download and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of May, the priorities are:&lt;br /&gt;
* Getting the vulnerable API piece working!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009 as new CTFs have been introduced releases have changed.  Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216848</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216848"/>
				<updated>2016-05-12T20:24:30Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Where is Vicnum? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
They can also be used to test non technical vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
The latest release update (v1.7) was a basic ctf (https://sourceforge.net/projects/vicnum/files/Basicctf/)&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There is a help folder in the download and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of May, the priorities are:&lt;br /&gt;
* Getting the vulnerable API piece working!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009 as new CTFs have been introduced releases have changed.  Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216847</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216847"/>
				<updated>2016-05-12T20:22:59Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Others */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
They can also be used to test non technical vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There is a help folder in the download and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Vicnum Project is affiliated with the Brooklyn OWASP chapter.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of May, the priorities are:&lt;br /&gt;
* Getting the vulnerable API piece working!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009 as new CTFs have been introduced releases have changed.  Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216846</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216846"/>
				<updated>2016-05-12T20:21:55Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Project About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
They can also be used to test non technical vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There is a help folder in the download and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of May, the priorities are:&lt;br /&gt;
* Getting the vulnerable API piece working!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;br /&gt;
&lt;br /&gt;
Vicnum was introduced in 2009 as new CTFs have been introduced releases have changed.  Recent release upgrades are:&lt;br /&gt;
&lt;br /&gt;
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.6  (June 2014) Breaking Bad XXE Exploit&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V1.7  (December 2015) Basic CTF to parse a pcap &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216845</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216845"/>
				<updated>2016-05-12T19:57:00Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Acknowledgements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
They can also be used to test non technical vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There is a help folder in the download and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of May, the priorities are:&lt;br /&gt;
* Getting the vulnerable API piece working!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216844</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216844"/>
				<updated>2016-05-12T19:56:18Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* FAQs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
They can also be used to test non technical vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: There is a help folder in the download and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2  Is there a way to make the challenges harder or easier?&lt;br /&gt;
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib and Albert FOng who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of May, the priorities are:&lt;br /&gt;
* Getting the vulnerable API piece working!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216843</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216843"/>
				<updated>2016-05-12T19:55:12Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* FAQs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
They can also be used to test non technical vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: A1  There is a help folder in the download and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
; Q2 Is there a way to make the challenges harder or easier?&lt;br /&gt;
: A2 Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: A3 Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib and Albert FOng who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of May, the priorities are:&lt;br /&gt;
* Getting the vulnerable API piece working!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216842</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216842"/>
				<updated>2016-05-12T19:52:32Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
They can also be used to test non technical vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: A1  There is a help folder in the download and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q2 Is there a way to make the challenges harder or easier?&lt;br /&gt;
: A2 Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: A3 Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib and Albert FOng who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of May, the priorities are:&lt;br /&gt;
* Getting the vulnerable API piece working!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* Coming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216840</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216840"/>
				<updated>2016-05-12T19:52:13Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
They can also be used to test non technical vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: A1  There is a help folder in the download and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q2 Is there a way to make the challenges harder or easier?&lt;br /&gt;
: A2 Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: A3 Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib and Albert FOng who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of May, the priorities are:&lt;br /&gt;
* Getting the vulnerable API piece working!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* COming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216839</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216839"/>
				<updated>2016-05-12T19:52:01Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
They can also be used to test non technical vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: A1  There is a help folder in the download and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q2 Is there a way to make the challenges harder or easier?&lt;br /&gt;
: A2 Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: A3 Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib and Albert FOng who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of May, the priorities are:&lt;br /&gt;
* Getting the vulnerable API piece working!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* COming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216838</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216838"/>
				<updated>2016-05-12T19:50:42Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: A1  There is a help folder in the download and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q2 Is there a way to make the challenges harder or easier?&lt;br /&gt;
: A2 Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: A3 Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib and Albert FOng who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of May, the priorities are:&lt;br /&gt;
* Getting the vulnerable API piece working!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* COming up with a name (and maybe themes for a vulnerable API program)&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216837</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216837"/>
				<updated>2016-05-12T19:49:13Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* FAQs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1  Anything I need to set up vicnum?&lt;br /&gt;
: A1  There is a help folder in the download and a pdf manual.  Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Q2 Is there a way to make the challenges harder or easier?&lt;br /&gt;
: A2 Sure. Some suggestions are in the help file, one of them of course is to delete the help file.  You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields.&lt;br /&gt;
; Q3 Is there more to it than just technical challenges?&lt;br /&gt;
: A3 Absolutely.  In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea.  So looking for the back doors and hidden files is definitely a goal here.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib and Albert FOng who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216835</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216835"/>
				<updated>2016-05-12T19:41:24Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Others */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards.&lt;br /&gt;
In particular a big shout out to Daniel Zabib and Albert FOng who helped customize Vicnum applications for the APPSECUSA conference.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216834</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216834"/>
				<updated>2016-05-12T19:37:31Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Volunteers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Nicole Becher&lt;br /&gt;
* Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216275</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216275"/>
				<updated>2016-05-03T13:47:11Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Project Goal */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
Learn how to test API's&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216274</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216274"/>
				<updated>2016-05-03T13:46:49Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* OWASP Vicnum Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216273</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=216273"/>
				<updated>2016-05-03T13:46:37Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* OWASP Vicnum Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and now includes an intentionally vulnerable web API&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=215523</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=215523"/>
				<updated>2016-04-18T19:56:25Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Where is Vicnum? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/  )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=215522</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=215522"/>
				<updated>2016-04-18T19:54:23Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Where is Vicnum? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/ )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com and http://cyclone.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=215521</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=215521"/>
				<updated>2016-04-18T19:52:42Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Where is Vicnum? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
(see https://sourceforge.net/projects/vicnum/ )&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Vicnum_Project&amp;diff=191129</id>
		<title>Category:OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Vicnum_Project&amp;diff=191129"/>
				<updated>2015-03-10T15:51:06Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Quick Downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Vicnum_Project&amp;diff=191128</id>
		<title>Category:OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Vicnum_Project&amp;diff=191128"/>
				<updated>2015-03-10T15:50:04Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Where is Vicnum? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Vicnum_Project&amp;diff=191127</id>
		<title>Category:OWASP Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Vicnum_Project&amp;diff=191127"/>
				<updated>2015-03-10T15:49:53Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Where is Vicnum? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications aredownloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=191122</id>
		<title>Project Information:template Vicnum Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Vicnum_Project&amp;diff=191122"/>
				<updated>2015-03-10T14:52:05Z</updated>
		
		<summary type="html">&lt;p&gt;Vicnum: /* Quick Downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;700&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
! width=&amp;quot;500&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;right&amp;quot; | [[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &lt;br /&gt;
| align=&amp;quot;right&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
==OWASP Vicnum Project==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Vicnum Project is a collection of intentionally vulnerable web applications.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”&lt;br /&gt;
&lt;br /&gt;
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.&lt;br /&gt;
&lt;br /&gt;
See http://vicnum.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Project Goal==&lt;br /&gt;
Have fun and stimulate interest in the field&lt;br /&gt;
&lt;br /&gt;
Test web application scanners &lt;br /&gt;
 &lt;br /&gt;
Test manual attack techniques &lt;br /&gt;
&lt;br /&gt;
Test source code analysis tools &lt;br /&gt;
&lt;br /&gt;
Look at the code that allows the vulnerabilities &lt;br /&gt;
&lt;br /&gt;
Test web application firewalls&lt;br /&gt;
 &lt;br /&gt;
Examine evidence left by attacks&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Where is Vicnum? ==&lt;br /&gt;
&lt;br /&gt;
Vulnerable VM of some Vicnum applications are downloadable from sourceforge.&lt;br /&gt;
&lt;br /&gt;
Since individual applications within the project are constantly being updated, not everything is on that VM.&lt;br /&gt;
Individual components are either on sourceforge or on github.&lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also distributed as part of the Broken Web Application Project&lt;br /&gt;
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) &lt;br /&gt;
&lt;br /&gt;
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
http://www.slideshare.net/mkraushar/vicnumdescription&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Mordecai Kraushar&lt;br /&gt;
&lt;br /&gt;
Nicole Becher&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-VicNum&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Downloads ==&lt;br /&gt;
&lt;br /&gt;
http://vicnum.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
https://github.com/fridaygoldsmith/bwa_cyclone_transfers&lt;br /&gt;
&lt;br /&gt;
http://xxe.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== Sponsored By ==&lt;br /&gt;
This project is sponsored by CipherTechs.&lt;br /&gt;
&lt;br /&gt;
http://www.ciphertechs.com/&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of February, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Vicnum is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Vicnum_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Vicnum</name></author>	</entry>

	</feed>