This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Vicnum Project"
From OWASP
m (→FAQs) |
(→Quick Downloads) |
||
(One intermediate revision by the same user not shown) | |||
Line 72: | Line 72: | ||
http://vicnum.sourceforge.net/ for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge | http://vicnum.sourceforge.net/ for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge | ||
+ | |||
+ | https://github.com/mordecai/vicnum for the Guessnum, Jotto, and the Union Challenge code | ||
https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app | https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app | ||
Line 130: | Line 132: | ||
API’s are everywhere! Mobile & web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s. A vulnerable API can be just as destructive as a vulnerable web application. So, how do you test an API? The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities. This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as: | API’s are everywhere! Mobile & web applications applications, cloud services, the Internet of Things and embedded devices are all communicating via API’s. A vulnerable API can be just as destructive as a vulnerable web application. So, how do you test an API? The vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities. This release is meant for pen testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as: | ||
+ | ---- | ||
Authentication | Authentication | ||
---- | ---- |
Latest revision as of 00:49, 23 May 2016
Vicnum was introduced in 2009, Early releases introduced several vulnerable apps (and CTFs) including Guessnum, Jotto and the Union Challenge. Recent release upgrades are:
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application
V1.6 (June 2014) Breaking Bad XXE Exploit
V1.7 (December 2015) Basic CTF to parse a pcap
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.