This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Vicnum Project"
From OWASP
m (→Project About) |
m (→Where is Vicnum?) |
||
Line 44: | Line 44: | ||
== Where is Vicnum? == | == Where is Vicnum? == | ||
− | Vulnerable VM of some Vicnum applications is downloadable from sourceforge. | + | Vulnerable VM of some Vicnum applications is downloadable from sourceforge and github. |
− | |||
− | |||
− | Vicnum applications are also distributed as part of the Broken Web Application Project | + | Some Vicnum applications are also distributed as part of the Broken Web Application Project |
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) | (see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) | ||
Revision as of 00:26, 23 May 2016
Vicnum was introduced in 2009, Early releases introduced several vulnerable apps (and CTFs) including Guessnum, Jotto and the Union Challenge. Recent release upgrades are:
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application
V1.6 (June 2014) Breaking Bad XXE Exploit
V1.7 (December 2015) Basic CTF to parse a pcap
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.