This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Vulnerable Web Application"

From OWASP
Jump to: navigation, search
(How to contribute)
(github account added)
 
(4 intermediate revisions by the same user not shown)
Line 3: Line 3:
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 
| valign="top"  style="border-right: 1px dotted gray;padding-right:25px;" |
 
| valign="top"  style="border-right: 1px dotted gray;padding-right:25px;" |
 
==OWASP Code Project Template==
 
<span style="color:#ff0000">
 
This section should include an overview of what the project is, why the project was started, and what security issue is being addressed by the project deliverable. Some readers may be discouraged from looking further at the project if they do not understand the significance of the security concern that is being addressed, so provide enough context so the average reader will continue on with reading the description. You shouldn't assume the reader will understand the objective by providing security terminology, e.g. this project builds cryptographic algorithms, but should also endeavor to explain what they are used for.
 
</span>
 
 
The OWASP Code Template Project is a template designed to help Project Leaders create suitable project pages for OWASP Projects.  By following the instructional text in red (and then deleting it) it should be easier to understand what information OWASP and the project users are looking for.  And it's easy to get started by simply creating a new project from the appropriate project template.
 
  
 
==Description==
 
==Description==
Line 16: Line 9:
 
Vulnerable-Web-Application categorically includes Command Execution, File Inclusion, File Upload, SQL and XSS. For database-requiring categories, it creates a database under localhost with one button during setup. In case of corrupted or changed databases, you can create a database again.
 
Vulnerable-Web-Application categorically includes Command Execution, File Inclusion, File Upload, SQL and XSS. For database-requiring categories, it creates a database under localhost with one button during setup. In case of corrupted or changed databases, you can create a database again.
  
 +
[https://github.com/OWASP/Vulnerable-Web-Application Vulnerable Web Application Project Repository]
 
==Licensing==
 
==Licensing==
 
[https://www.gnu.org/licenses/gpl-3.0.html GPL]
 
[https://www.gnu.org/licenses/gpl-3.0.html GPL]
Line 22: Line 16:
  
 
== How to Contribute ==
 
== How to Contribute ==
 +
 +
*Solve the challenges in the [https://github.com/OWASP/Vulnerable-Web-Application Vulnerable Web Application Project]
 +
*Choose a category or create new category (CSRF,XML Entity etc.)
 +
*Create the challenge under the choosen category
 +
*Submit your work
 +
 +
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |
  
 
== Supporters ==
 
== Supporters ==
Line 42: Line 43:
 
[https://github.com/ufuksungu Ufuk Süngü]
 
[https://github.com/ufuksungu Ufuk Süngü]
  
 
== Related Projects ==
 
<span style="color:#ff0000">
 
This is where you can link to other OWASP Projects that are similar to yours.
 
</span>
 
* [[OWASP_Tool_Project_Template]]
 
* [[OWASP_Documentation_Project_Template]]
 
  
 
==Classifications==
 
==Classifications==

Latest revision as of 19:05, 21 March 2019

OWASP Project Header.jpg

Description

Vulnerable-Web-Application is a website that is prepared for people who are interested in web penetration and who want to have information about this subject or to be working. In fact, the website is quite simple to install and use.

Vulnerable-Web-Application categorically includes Command Execution, File Inclusion, File Upload, SQL and XSS. For database-requiring categories, it creates a database under localhost with one button during setup. In case of corrupted or changed databases, you can create a database again.

Vulnerable Web Application Project Repository

Licensing

GPL

The "General Public License" protects users' four essential freedoms, among other things by requiring someone who distributes software derived from yours to also publish the source code for the modifications. Anyone can charge money for distributing copies of the software, but cannot prevent its recipients from redistributing it for free. The GPL allows the copyright holders to distribute the software under additional licenses, too, which can be a way to make it proprietary-friendly.

How to Contribute

  • Solve the challenges in the Vulnerable Web Application Project
  • Choose a category or create new category (CSRF,XML Entity etc.)
  • Create the challenge under the choosen category
  • Submit your work

Supporters

Hummingbirds Cyber Security Community

Project Leader

Fatih Çelik

Linkedin Github

Core Team

Mehmet Oğuz Tozkoparan

Ömer Faruk Şenyayla

Ramazan Emre Erkan

Ufuk Süngü


Classifications

Project Type Files CODE.jpg
Incubator Project Owasp-builders-small.png
Owasp-defenders-small.png
Affero General Public License 3.0