This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Vicnum Project"
From OWASP
m (→Road Map and Getting Involved) |
(→Quick Downloads) |
||
Line 72: | Line 72: | ||
http://vicnum.sourceforge.net/ for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge | http://vicnum.sourceforge.net/ for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge | ||
+ | |||
+ | https://github.com/mordecai/vicnum for the Guessnum, Jotto, and the Union Challenge code | ||
https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app | https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app |
Latest revision as of 00:49, 23 May 2016
Vicnum was introduced in 2009, Early releases introduced several vulnerable apps (and CTFs) including Guessnum, Jotto and the Union Challenge. Recent release upgrades are:
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application
V1.6 (June 2014) Breaking Bad XXE Exploit
V1.7 (December 2015) Basic CTF to parse a pcap
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.