This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

OWASP Hackademic Challenges Project

From OWASP
Jump to: navigation, search
Lab big.jpg


OWASP Hackademic Challenges Project

Hackademic transp logo.png

Introduction

The OWASP Hackademic Challenges Project helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment.

Download the old version (v.0.1.1) from Google Code.

the Latest Version is on GitHub.

Developers checkout the Development Branch.


The servers are down due to changes in the Uni's datacenter, it will be up soon.

Live version in Greek language (includes additional challenges): http://hackademic1.teilar.gr/gr

You can also challenge yourself using the live version hosted here: http://hackademic1.teilar.gr/

Description

The Hackademic Challenges implement realistic scenarios with known vulnerabilities in a safe, controllable environment. Users can attempt to discover and exploit these vulnerabilities in order to learn important concepts of information security through the attacker's perspective.

Currently, there are 10 web application security scenarios available.

You can choose to start from the one that you find most appealing,although we suggest to follow the order presented on the first page.We intend to expand the available challenges with additional scenarios that involve cryptography, and even vulnerable systems implemented in download-able virtual machines.

Target Group

Anyone can use the OWASP Hackademic Challenges to test one's knowledge and skills.

Nevertheless, the OWASP Hackademic Challenges have been mainly developed to be used in a live classroom environment. Experience has shown increased interest and engagement from students that actually get to practice application security and see how things work in a realistic environment.

Currently they are successfully used in the security courses of the following universities:

Deployment

The OWASP Hackademic Challenges can be easily deployed to any PHP-capable web server running mysql/mariadb.

Current deployments (http://hackademic1.teilar.gr/) have integrated the OWASP Hackademic Challenges with well-known CMS software (e.g. Joomla) in order to provide a complete e-learning environment, where students can register and monitor their progress as they go through the challenges.

Contact

OWASP Hackademic Challenges project Mailing List mailing list.
Irc Channel #hackademic-dev on freenode

Licensing

OWASP Hackademic Challenges Project is free to use. It is licensed under the Apache License V2.0


What are Hackademic Challenges?

OWASP Hackademic Challenges Project provides:

  • The Hackademic Challenges is an open source project that can be used to test and improve one's knowledge of web application security.
  • The Hackademic Challenges project implements realistic scenarios with known vulnerabilities in a safe, controllable environment. Users can attempt to discover and exploit these vulnerabilities in order to learn important concepts of information security through the attacker's perspective.
  • They have been especially designed for use in a classroom environment where they have been proved a valuable educational tool. Using hackademic challenges students have the chance to experience application security in a realistic environment, something that triggers their interest and provokes a lot of interesting discussions.
  • The Hackademic Challenges are currently used in several Universities and have received very positive feedback from both professors and students.


Presentation

Project Leaders

Konstantinos Papapanagiotou

Spyros Gasteratos

Andreas Venieris (Core Developer) (Founder)

Related Projects

Ohloh

Quick Download

Download

Email List

News and Events

In Print

Classifications

Midlevel projects.png Owasp-builders-small.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png
Project Type Files CODE.jpg