This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Vulnerable Web Application"
Fatihcelik (talk | contribs) (github account added) |
Fatihcelik (talk | contribs) (github account added) |
||
(10 intermediate revisions by the same user not shown) | |||
Line 3: | Line 3: | ||
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Description== | ==Description== | ||
Line 26: | Line 9: | ||
Vulnerable-Web-Application categorically includes Command Execution, File Inclusion, File Upload, SQL and XSS. For database-requiring categories, it creates a database under localhost with one button during setup. In case of corrupted or changed databases, you can create a database again. | Vulnerable-Web-Application categorically includes Command Execution, File Inclusion, File Upload, SQL and XSS. For database-requiring categories, it creates a database under localhost with one button during setup. In case of corrupted or changed databases, you can create a database again. | ||
+ | [https://github.com/OWASP/Vulnerable-Web-Application Vulnerable Web Application Project Repository] | ||
==Licensing== | ==Licensing== | ||
− | + | [https://www.gnu.org/licenses/gpl-3.0.html GPL] | |
− | |||
− | |||
− | + | The "General Public License" protects users' four essential freedoms, among other things by requiring someone who distributes software derived from yours to also publish the source code for the modifications. Anyone can charge money for distributing copies of the software, but cannot prevent its recipients from redistributing it for free. The GPL allows the copyright holders to distribute the software under additional licenses, too, which can be a way to make it proprietary-friendly. | |
− | == | + | == How to Contribute == |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | *Solve the challenges in the [https://github.com/OWASP/Vulnerable-Web-Application Vulnerable Web Application Project] | |
− | + | *Choose a category or create new category (CSRF,XML Entity etc.) | |
− | * | + | *Create the challenge under the choosen category |
− | * | + | *Submit your work |
− | * | ||
− | |||
− | + | | style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" | | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | | | ||
== Supporters == | == Supporters == | ||
Line 77: | Line 43: | ||
[https://github.com/ufuksungu Ufuk Süngü] | [https://github.com/ufuksungu Ufuk Süngü] | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Classifications== | ==Classifications== |
Latest revision as of 19:05, 21 March 2019
DescriptionVulnerable-Web-Application is a website that is prepared for people who are interested in web penetration and who want to have information about this subject or to be working. In fact, the website is quite simple to install and use. Vulnerable-Web-Application categorically includes Command Execution, File Inclusion, File Upload, SQL and XSS. For database-requiring categories, it creates a database under localhost with one button during setup. In case of corrupted or changed databases, you can create a database again. Vulnerable Web Application Project Repository LicensingThe "General Public License" protects users' four essential freedoms, among other things by requiring someone who distributes software derived from yours to also publish the source code for the modifications. Anyone can charge money for distributing copies of the software, but cannot prevent its recipients from redistributing it for free. The GPL allows the copyright holders to distribute the software under additional licenses, too, which can be a way to make it proprietary-friendly. How to Contribute
|
SupportersHummingbirds Cyber Security Community Project LeaderCore Team
Classifications |