This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Vicnum Project"
From OWASP
(→Where is Vicnum?) |
(→Introduction) |
||
Line 17: | Line 17: | ||
Vicnum applications are commonly used in Capture the Flag exercises at security conferences. | Vicnum applications are commonly used in Capture the Flag exercises at security conferences. | ||
− | + | A sample view is typically available at http://vicnum.ciphertechs.com/ | |
==Project Goal== | ==Project Goal== |
Revision as of 00:29, 23 May 2016
Vicnum was introduced in 2009, Early releases introduced several vulnerable apps (and CTFs) including Guessnum, Jotto and the Union Challenge. Recent release upgrades are:
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application
V1.6 (June 2014) Breaking Bad XXE Exploit
V1.7 (December 2015) Basic CTF to parse a pcap
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.