This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP DVSA"
Line 40: | Line 40: | ||
== Roadmap == | == Roadmap == | ||
* '''25 DEC 2018''': http://serverless.fail (official website) was launched. | * '''25 DEC 2018''': http://serverless.fail (official website) was launched. | ||
− | * ''' | + | * '''08 JAN 2019''': v1.0 beta release [https://github.com/owasp/dvsa GitHub]) |
− | * ''' | + | * '''01 FEB 2019''': v1.0 official version. |
== Project Sponsors == | == Project Sponsors == | ||
Line 67: | Line 67: | ||
[[User:Tal_Mel|Tal Melamed]] | [[User:Tal_Mel|Tal Melamed]] | ||
− | == | + | |
− | + | == Presentation == | |
+ | Soon! | ||
+ | |||
+ | |||
+ | == News & Events == | ||
+ | * [25 Dec 2018]: http://serverless.fail - Launched | ||
+ | * [01 Jan 2019]: Project was donated by [https://protego.io Protego Labs] | ||
+ | * [03 Jan 2019]: [https://www.theregister.co.uk/2019/01/03/damn_vulnerable_serverless_application/ The Register] | ||
+ | * [04 Jan 2019]: [https://sdtimes.com/cloud/sd-times-news-digest-protegos-dvsa-quicklogic-acquires-ai-company-and-iot-interoperability/ SDTimes] | ||
+ | * [07 Jan 2019]: [http://www.eweek.com/security/protego-labs-boosts-serverless-security-with-open-source-project eWEEK] | ||
+ | * [08 Jan 2019]: [https://github.com/owasp/dvsa Beta release!] | ||
Line 74: | Line 84: | ||
==Classifications== | ==Classifications== | ||
− | {| width=" | + | {| width="400" cellpadding="2" |
|- | |- | ||
| colspan="2" align="center" | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]] | | colspan="2" align="center" | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]] |
Revision as of 21:12, 7 January 2019
DVSAa Damn Vulnerable Serverless ApplicationDamn Vulnerable Serverless Application (DVSA) is a deliberately vulnerable application aiming to be an aid for security professionals to test their skills and tools in a legal environment, help developers better understand the processes of securing serverless applications and to aid both students & teachers to learn about serverless application security in a controlled class room environment. The aim of DVSA is to practice some of the most common serverless vulnerabilities, with a simple straightforward interface. Please note, there are both documented and undocumented vulnerabilities with this software. This is intentional. You are encouraged to try and discover as many issues as possible. DisclaimerWe do not take responsibility for the way in which any one uses this application (DVSA). We have made the purposes of the application clear and it should not be used maliciously. We have given warnings and taken measures to prevent users from installing DVSA on to production accounts. LicenseDamn Vulnerable Serverless Application (DVSA) is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. Damn Vulnerable Serverless Application (DVSA) is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with Damn Vulnerable Serverless Application (DVSA). If not, see http://www.gnu.org/licenses/. Deploymentclone project from github
Deploy Backend
Build Client
Deploy Client
Cheat SheetLessons can be found here Roadmap
Project SponsorsThe project was initially developed by Protego Labs:
Getting InvolvedYou do not have to be a security expert or a programmer to contribute. Contact the Project Leader(s) to get involved, we welcome any type of suggestions and comments. |
Project Resources
Project Leader
PresentationSoon!
News & Events
Classifications |