This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Project Information:template Vicnum Project"
m (→Introduction) |
m (→Project Goal) |
||
Line 20: | Line 20: | ||
==Project Goal== | ==Project Goal== | ||
+ | |||
+ | Have fun and stimulate interest in the field | ||
Test web application scanners | Test web application scanners |
Revision as of 16:01, 10 February 2014
OWASP Vicnum ProjectOWASP Vicnum Project is a collection of intentionally vulnerable web applications. Introduction“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills” They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting. Vicnum applications are commonly used in Capture the Flag exercises at security conferences. See http://vicnum.ciphertechs.com/appsec2012.html Project GoalHave fun and stimulate interest in the field Test web application scanners Test manual attack techniques Test source code analysis tools Look at the code that allows the vulnerabilities Test web application firewalls Examine evidence left by attacks LicensingOWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
|
Where is Vicnum?Vulnerable VM of some Vicnum applications is downloadable from sourceforge. Since individual applications within the project are contstantly being updated, not everything is on that VM. Individual components are either on sourceforge or on github. Vicnum applications are also distributed as part of the Broken Web Application Project (see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project) Vicnum applications are also typically available online at http://vicnum.ciphertechs.com Presentationhttp://www.slideshare.net/mkraushar/vicnumdescription Project LeaderMordecai Kraushar Nicole Becher
Related Projectshttps://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project |
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project Quick Downloadshttp://vicnum.sourceforge.net/ https://github.com/fridaygoldsmith/bwa_cyclone_transfers News and EventsIn PrintThis project can be purchased as a print on demand book from Lulu.com
Classifications |
- Q1
- A1
- Q2
- A2
Volunteers
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:
- xxx
- xxx
Others
- xxx
- xxx
As of February, the priorities are:
- xxx
- xxx
- xxx
Involvement in the development and promotion of Vicnum is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
- xxx
- xxx