This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Vicnum Project"
From OWASP
(→Where is Vicnum?) |
(→Quick Downloads) |
||
(3 intermediate revisions by the same user not shown) | |||
Line 17: | Line 17: | ||
Vicnum applications are commonly used in Capture the Flag exercises at security conferences. | Vicnum applications are commonly used in Capture the Flag exercises at security conferences. | ||
− | + | A sample view is typically available at http://vicnum.ciphertechs.com/ | |
==Project Goal== | ==Project Goal== | ||
Line 72: | Line 72: | ||
http://vicnum.sourceforge.net/ for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge | http://vicnum.sourceforge.net/ for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge | ||
+ | |||
+ | https://github.com/mordecai/vicnum for the Guessnum, Jotto, and the Union Challenge code | ||
https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app | https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app | ||
Line 106: | Line 108: | ||
; Q1 Anything I need to set up vicnum? | ; Q1 Anything I need to set up vicnum? | ||
− | : There are help folder in | + | : There are help folder in some downloads, and readmes on github as well as a pdf manual. Basically set up the database, make sure the apache modules are loaded and for Guessnum and Jotto modify the http config file to find the perl code in the cgi-bin folder. |
; Q2 Is there a way to make the challenges harder or easier? | ; Q2 Is there a way to make the challenges harder or easier? | ||
: Sure. Some suggestions are in the help file, one of them of course is to delete the help file. You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields. | : Sure. Some suggestions are in the help file, one of them of course is to delete the help file. You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields. | ||
Line 130: | Line 132: | ||
API’s are everywhere! Mobile & web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s. A vulnerable API can be just as destructive as a vulnerable web application. So, how do you test an API? The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities. This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as: | API’s are everywhere! Mobile & web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s. A vulnerable API can be just as destructive as a vulnerable web application. So, how do you test an API? The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities. This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as: | ||
+ | ---- | ||
Authentication | Authentication | ||
---- | ---- |
Latest revision as of 00:49, 23 May 2016
Vicnum was introduced in 2009, Early releases introduced several vulnerable apps (and CTFs) including Guessnum, Jotto and the Union Challenge. Recent release upgrades are:
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application
V1.6 (June 2014) Breaking Bad XXE Exploit
V1.7 (December 2015) Basic CTF to parse a pcap
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.