This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "WebGoatPHP"
Shivam Dixit (talk | contribs) |
Shivam Dixit (talk | contribs) |
||
Line 41: | Line 41: | ||
*[[User:Shivam_Dixit|Shivam Dixit]] | *[[User:Shivam_Dixit|Shivam Dixit]] | ||
− | To contribute, fork the code on github and send a pull request. | + | To contribute, fork the code on github and send a pull request. Join the discussion on our [https://lists.owasp.org/mailman/listinfo/owasp_webgoatphp mailing list] |
| valign="top" style="padding-left:25px;width:200px;" | | | valign="top" style="padding-left:25px;width:200px;" | |
Revision as of 00:34, 29 June 2014
OWASP WebGoatPHPWebGoatPHP is a port of WebGoat to PHP and MySQL/SQLite databases. The goal is to create an interactive teaching environment for web application security by offering lessons in the form of challenges. In each challenge the user must exploit the vulnerability to demonstrate their understanding. What is WebGoatPHPWebGoatPHP is a deliberately insecure web application developed using PHP to teach web application security. It offers a set of challenges based on various vulnerabilities listed in OWASP. The application is a realistic teaching environment and supports four different modes. Why WebGoatPHP?WebGoatPHP is suitable for:
|
Different Operating Modes
Types Of Challenges
Major ContributorsTo contribute, fork the code on github and send a pull request. Join the discussion on our mailing list |
Project LeaderQuick Download
WebsiteNews and EventsClassifications
|