This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
OWASP Hackademic Challenges Project
OWASP Hackademic Challenges ProjectIntroductionThe OWASP Hackademic Challenges Project is an open source project that helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controlable and safe environment. Download the current version (v.0.1.1) from Google Code. Development version Github Latest changes implemented in the 'next' branch You can also challenge yourself using the live version hosted here: http://hackademic1.teilar.gr/ Live version in Greek language (includes additional challenges): http://hackademic1.teilar.gr/gr The OWASP Hackademic Challenges have been now also integrated into the Hacking Lab. You can register and play for FREE the Hackademic Challenges at the Hacking Lab by following this link: https://www.hacking-lab.com/events/registerform.html?eventid=302&uk=
DescriptionThe Hackademic Challenges implement realistic scenarios with known vulnerabilities in a safe, controllable environment. Users can attempt to discover and exploit these vulnerabilities in order to learn important concepts of information security through the attacker's perspective. Currently, there are 10 web application security scenarios available. You can choose to start from the one that you find most appealing,although we suggest to follow the order presented on the first page.We intend to expand the available challenges with additional scenarios that involve cryptography, and even vulnerable systems implemented in download-able virtual machines. Target GroupAnyone can use the OWASP Hackademic Challenges to test one's knowledge and skills. Nevertheless, the OWASP Hackademic Challenges have been mainly developed to be used in a live classroom environment. Experience has shown increased interest and engagement from students that actually get to practice application security and see how things work in a realistic environment. Currently they are successfully used in the security courses of the following universities:
DeploymentThe OWASP Hackademic Challenges can be easily deployed to any PHP-capable web server. Current deployments (http://hackademic1.teilar.gr/) have integrated the OWASP Hackademic Challenges with well-known CMS software (e.g. Joomla) in order to provide a complete e-learning environment, where students can register and monitor their progress as they go through the challenges. If you need a assistance in setting up the OWASP Hackademic Challenges in your environment, please don't hesitate to contact the project team by posting your inquire on the OWASP Hackademic Challenges project mailing list. LicensingOWASP Hackademic Challenges Project is free to use. It is licensed under the Apache License V2.0
|
What are Hackademic Challenges?OWASP Hackademic Challenges Project provides:
PresentationProject LeadersAndreas Venieris (Core Developer) (Founder) Related ProjectsOhloh |
Quick DownloadEmail ListNews and Events
In PrintClassifications |
- Q1
- A1
- Q2
- A2
Volunteers
The Hackademic Challenges are developed by a worldwide team of volunteers. The primary contributors to date have been:
Others
- xxx
- xxx
As of July, the priorities are:
- * Building additional challenges that also cover different security domains (e.g. cryptography) or other OWASP Top 10 risks.
- Enrich Hackademic CMS with more features and better security
- ...
For a list of features we would like implemented you can see our Google Summer Of Code ideas page
Involvement in the development and promotion of the Hackademic Challenges is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
- xxx
- xxx
PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|