This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Vulnerable Web Application"
Fatihcelik (talk | contribs) (column corrected) |
Fatihcelik (talk | contribs) (github account added) |
||
(2 intermediate revisions by the same user not shown) | |||
Line 3: | Line 3: | ||
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Description== | ==Description== | ||
Line 16: | Line 9: | ||
Vulnerable-Web-Application categorically includes Command Execution, File Inclusion, File Upload, SQL and XSS. For database-requiring categories, it creates a database under localhost with one button during setup. In case of corrupted or changed databases, you can create a database again. | Vulnerable-Web-Application categorically includes Command Execution, File Inclusion, File Upload, SQL and XSS. For database-requiring categories, it creates a database under localhost with one button during setup. In case of corrupted or changed databases, you can create a database again. | ||
+ | [https://github.com/OWASP/Vulnerable-Web-Application Vulnerable Web Application Project Repository] | ||
==Licensing== | ==Licensing== | ||
[https://www.gnu.org/licenses/gpl-3.0.html GPL] | [https://www.gnu.org/licenses/gpl-3.0.html GPL] | ||
Line 49: | Line 43: | ||
[https://github.com/ufuksungu Ufuk Süngü] | [https://github.com/ufuksungu Ufuk Süngü] | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Classifications== | ==Classifications== |
Latest revision as of 19:05, 21 March 2019
DescriptionVulnerable-Web-Application is a website that is prepared for people who are interested in web penetration and who want to have information about this subject or to be working. In fact, the website is quite simple to install and use. Vulnerable-Web-Application categorically includes Command Execution, File Inclusion, File Upload, SQL and XSS. For database-requiring categories, it creates a database under localhost with one button during setup. In case of corrupted or changed databases, you can create a database again. Vulnerable Web Application Project Repository LicensingThe "General Public License" protects users' four essential freedoms, among other things by requiring someone who distributes software derived from yours to also publish the source code for the modifications. Anyone can charge money for distributing copies of the software, but cannot prevent its recipients from redistributing it for free. The GPL allows the copyright holders to distribute the software under additional licenses, too, which can be a way to make it proprietary-friendly. How to Contribute
|
SupportersHummingbirds Cyber Security Community Project LeaderCore Team
Classifications |