This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Project Information:template Vicnum Project"
From OWASP
(→Project About) |
(→Others) |
||
Line 131: | Line 131: | ||
Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards. | Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards. | ||
In particular a big shout out to Daniel Zabib and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference. | In particular a big shout out to Daniel Zabib and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference. | ||
+ | |||
+ | ---- | ||
+ | The Vicnum Project is affiliated with the Brooklyn OWASP chapter. | ||
= Road Map and Getting Involved = | = Road Map and Getting Involved = |
Revision as of 20:22, 12 May 2016
Vicnum was introduced in 2009 as new CTFs have been introduced releases have changed. Recent release upgrades are:
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application
V1.6 (June 2014) Breaking Bad XXE Exploit
V1.7 (December 2015) Basic CTF to parse a pcap
V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API.