This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP A&D Project"
From OWASP
(→How can I participate in your project?) (Tag: Visual edit) |
(→Project Resources) (Tag: Visual edit) |
||
(22 intermediate revisions by 2 users not shown) | |||
Line 6: | Line 6: | ||
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
==OWASP A&D Project== | ==OWASP A&D Project== | ||
− | A&D stands for Attack and Defense. OWASP A&D Project is a | + | [[File:Slide.png|alt=Introductory slide.|thumb|200x200px|[https://www.slideshare.net/yuichihattori1/owasp-ad-project Link to the slide is here.]]][[File:Competition slide.png|alt=Introductory slide.|thumb|200x200px|[https://www.slideshare.net/yuichihattori1/owasp-ad-project-competition-mode Link to the slide is here.]]]A&D stands for Attack and Defense. OWASP A&D Project is a Deliberately Vulnerable Web-application Interactive Platform focuses on web application developers to fix its vulnerabilities through the real world like environment. We call this platform A&D platform. |
− | The platform will include standalone mode for self-study and | + | The platform will include standalone mode for self-study and competition mode for event, and also it will support attack to the web application from operator and state of web application vulnerabilities. |
==Description== | ==Description== | ||
Line 19: | Line 19: | ||
== Project Resources == | == Project Resources == | ||
− | [https:// | + | [https://gitlab.com/owasp-ad/ Source Code] Link to Github |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
== Project Leader == | == Project Leader == | ||
[https://www.owasp.org/index.php/User:Takaharu.ogasa Takaharu Ogasa] [https://twitter.com/TakaharuOgasa Twitter] | [https://www.owasp.org/index.php/User:Takaharu.ogasa Takaharu Ogasa] [https://twitter.com/TakaharuOgasa Twitter] | ||
− | [ | + | [https://www.owasp.org/index.php/User:Eidwinds Yuichi Hattori] [https://twitter.com/Eidwinds Twitter] |
− | [ | + | [https://www.owasp.org/index.php/User:Sa10 Shota Sato] [https://twitter.com/luckbizzo Twitter] |
+ | |||
+ | === Project Member === | ||
+ | Yoshihiro Isago [https://twitter.com/135yshr Twitter] | ||
== Related Projects == | == Related Projects == | ||
Line 54: | Line 49: | ||
== News and Events == | == News and Events == | ||
− | * [ | + | * [28 July 2018] Alpha version of scoring server for Competition Mode is released. |
+ | * [27 May 2018] Alpha version release will be scheduled on July 21. | ||
+ | * [16 Apr 2018] OWASP A&D Project will be announced and A&D Competition event will be held at Attack and Defense Sendai event on 21 Apr 2018. | ||
|} | |} | ||
Line 72: | Line 69: | ||
* [https://www.owasp.org/index.php/User:Takaharu.ogasa Takaharu Ogasa] [https://twitter.com/TakaharuOgasa Twitter] | * [https://www.owasp.org/index.php/User:Takaharu.ogasa Takaharu Ogasa] [https://twitter.com/TakaharuOgasa Twitter] | ||
− | * [ | + | * [https://www.owasp.org/index.php/User:Eidwinds Yuichi Hattori] [https://twitter.com/Eidwinds Twitter] |
− | * [[ | + | * [[User:Sa10|Shota Sato]] [https://twitter.com/luckbizzo Twitter] |
+ | * Yoshihiro Isago [https://twitter.com/135yshr Twitter] | ||
= Road Map and Getting Involved = | = Road Map and Getting Involved = | ||
Line 86: | Line 84: | ||
Deliverables: | Deliverables: | ||
− | * Attack and | + | * Attack and Defense Quick Start Guide(PDF). |
* Deliberately vulnerable web-application platform source code, docker image, and vm image. | * Deliberately vulnerable web-application platform source code, docker image, and vm image. | ||
* Insecure web application's source code, docker image, and vm image. | * Insecure web application's source code, docker image, and vm image. | ||
Line 115: | Line 113: | ||
=Project About= | =Project About= | ||
− | + | The OWASP A&D project is intended as place for people to learn about new, modern and different web related application security issues and learn how to fix the issues through hands on environment. It also has contest mode with scoring functionality for easy to use for CTF-like event. More pieces will be released as they are available, as well as training and other learning aids. | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||