This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Vicnum Project"
From OWASP
(→Project About) |
(→FAQs) |
||
Line 105: | Line 105: | ||
: There are help folder in the downloads and a pdf manual. Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder. | : There are help folder in the downloads and a pdf manual. Basically set up the database, make sure the apache modules are loaded and modify the http config file to find the perl code in the cgi-bin folder. | ||
; Q2 Is there a way to make the challenges harder or easier? | ; Q2 Is there a way to make the challenges harder or easier? | ||
− | : Sure. Some suggestions are in the help file, one of them of course is to delete the help file. You can also modify the backdoors, allow indexing of folders, or change the encoding of hidden fields. | + | : Sure. Some suggestions are in the help file, one of them of course is to delete the help file. You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden fields. |
; Q3 Is there more to it than just technical challenges? | ; Q3 Is there more to it than just technical challenges? | ||
: Absolutely. In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea. So looking for the back doors and hidden files is definitely a goal here. | : Absolutely. In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good idea. So looking for the back doors and hidden files is definitely a goal here. |
Revision as of 15:04, 22 May 2016
Vicnum was introduced in 2009 as new CTFs have been introduced releases have changed. Recent release upgrades are:
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application
V1.6 (June 2014) Breaking Bad XXE Exploit
V1.7 (December 2015) Basic CTF to parse a pcap
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.