This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Vicnum Project"
From OWASP
m (→Quick Downloads) |
(→Quick Downloads) |
||
(9 intermediate revisions by the same user not shown) | |||
Line 17: | Line 17: | ||
Vicnum applications are commonly used in Capture the Flag exercises at security conferences. | Vicnum applications are commonly used in Capture the Flag exercises at security conferences. | ||
− | + | A sample view is typically available at http://vicnum.ciphertechs.com/ | |
==Project Goal== | ==Project Goal== | ||
Line 44: | Line 44: | ||
== Where is Vicnum? == | == Where is Vicnum? == | ||
− | Vulnerable VM of some Vicnum applications | + | Vulnerable VM of some Vicnum applications aredownloadable from sourceforge. |
− | + | The individual code is also downloadable from github. | |
− | |||
− | Vicnum applications are also distributed as part of the Broken Web Application Project | + | Some Vicnum applications are also distributed as part of the Broken Web Application Project |
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) | (see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) | ||
Line 73: | Line 72: | ||
http://vicnum.sourceforge.net/ for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge | http://vicnum.sourceforge.net/ for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge | ||
+ | |||
+ | https://github.com/mordecai/vicnum for the Guessnum, Jotto, and the Union Challenge code | ||
https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app | https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app | ||
+ | |||
+ | https://sourceforge.net/projects/xxe/ for a VM of an intentionally vulnerable web services exploitable with XXE written in GRAILS | ||
+ | |||
+ | https://github.com/mordecai/BasicCTF for a basic CTF requiring the player to parse a PCAP and work their way around a web app | ||
== News and Events == | == News and Events == | ||
Line 103: | Line 108: | ||
; Q1 Anything I need to set up vicnum? | ; Q1 Anything I need to set up vicnum? | ||
− | : There are help folder in | + | : There are help folder in some downloads, and readmes on github as well as a pdf manual. Basically set up the database, make sure the apache modules are loaded and for Guessnum and Jotto modify the http config file to find the perl code in the cgi-bin folder. |
; Q2 Is there a way to make the challenges harder or easier? | ; Q2 Is there a way to make the challenges harder or easier? | ||
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file. You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields. | : Sure. Some suggestions are in the help file, one of them of course is to delete the help file. You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields. | ||
Line 127: | Line 132: | ||
API’s are everywhere! Mobile & web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s. A vulnerable API can be just as destructive as a vulnerable web application. So, how do you test an API? The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities. This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as: | API’s are everywhere! Mobile & web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s. A vulnerable API can be just as destructive as a vulnerable web application. So, how do you test an API? The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities. This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as: | ||
+ | ---- | ||
Authentication | Authentication | ||
---- | ---- | ||
Line 153: | Line 159: | ||
[[Category:OWASP Project]] [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] | [[Category:OWASP Project]] [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] | ||
− | Vicnum was introduced in 2009 | + | Vicnum was introduced in 2009, Early releases introduced several vulnerable apps (and CTFs) including Guessnum, Jotto and the Union Challenge. Recent release upgrades are: |
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application | V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application |
Latest revision as of 00:49, 23 May 2016
Vicnum was introduced in 2009, Early releases introduced several vulnerable apps (and CTFs) including Guessnum, Jotto and the Union Challenge. Recent release upgrades are:
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application
V1.6 (June 2014) Breaking Bad XXE Exploit
V1.7 (December 2015) Basic CTF to parse a pcap
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.