This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Vicnum Project"
From OWASP
m (→Where is Vicnum?) |
m (→Where is Vicnum?) |
||
Line 44: | Line 44: | ||
== Where is Vicnum? == | == Where is Vicnum? == | ||
− | Vulnerable VM of some Vicnum applications is downloadable from sourceforge | + | Vulnerable VM of some Vicnum applications is downloadable from sourceforge. |
+ | The individual code is also downloadable from github. | ||
Some Vicnum applications are also distributed as part of the Broken Web Application Project | Some Vicnum applications are also distributed as part of the Broken Web Application Project |
Revision as of 00:27, 23 May 2016
Vicnum was introduced in 2009, Early releases introduced several vulnerable apps (and CTFs) including Guessnum, Jotto and the Union Challenge. Recent release upgrades are:
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application
V1.6 (June 2014) Breaking Bad XXE Exploit
V1.7 (December 2015) Basic CTF to parse a pcap
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.