Difference between revisions of "OWASP Faux Bank Project"

Jump to: navigation, search
Line 28: Line 28:
=The Vulnerabilities=
=The Vulnerabilities=
This section will be properly fleshed out.
For the moment, the first 5 vulnerabilities can be read about on my blog:
[http://www.thatcoderguy.co.uk/2014/05/13/is-your-web-application-secure-part-1-cross-site-request-forgery/ Is your web application secure? – Part 1: Cross Site Request Forgery]
[http://www.thatcoderguy.co.uk/2014/05/20/hacking-websites-part-2-cross-site-scripting/ Hacking Websites – Part 2: Cross Site Scripting]
[http://www.thatcoderguy.co.uk/2014/05/27/hacking-websites-part-3-broken-authentication-session-management/ Hacking Websites – Part 3: Broken Authentication and Session Management]
[http://www.thatcoderguy.co.uk/2014/06/17/hacking-websites-part-4-sql-injection-attack/ Hacking Websites – Part 4: SQL Injection Attack]
[http://www.thatcoderguy.co.uk/2014/07/01/hacking-websites-part-5-missing-function-level-access-control/ Hacking Websites – Part 5: Missing Function Level Access Control]

Revision as of 17:01, 7 July 2014

OWASP Project Header.jpg


OWASP Faux Bank is a real-world type system with all 10 of OWASPs top 10 vulnerabilities implemented. The idea behind this project is to have a website with vulnerabilities that developers can play with an exploit, and then view the source code to see the site is vulnerable. OWASP Faux Bank also features a "secure mode", which prevents exploits, so that developers can also see how these vulnerabilities can be prevented within web applications.

The full source code is available from GitHub at: github.com/thatcoderguy/owasp-faux-bank

Currently OWASP Faux Bank is written in Classic ASP, but eventually there will also be PHP and .Net versions written, so that developers of these languages can also see how the vulnerabilities work.

OWASP Faux Bank is also running at: www.fauxbank.co.uk with all of the vulnerabilities implemented.

Project Leader

Davie Elliott

I am a web developer with 9 years commercial experience, currently in a Technical Director position for a small website company. I have an avid interest in security; network and web application development, and have written numerous pieces security software and also trained developers on how to write secure code. I have my own website: www.thatcoderguy.co.uk which also hosts my bi-weekly blog where I write about security and web development.


OWASP Faux Bank is free to use. It is licensed under the Apache 2.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.

Email List

Sign Up!

What does this OWASP project offer you?
What releases are available for this project?
what is this project?
Name: OWASP Faux Bank Project
Purpose: Faux bank has all 10 of the top vulnerabilities implemented, as well as fixes for these vulnerabilities. The idea is that developers can see a real-world system with vulnerabilities, so that they can see what to look for and how to write secure code.
License: Apache 2.0 license
who is working on this project?
Project Leader(s):
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: [owasp_faux_bank Mailing List Archives]
Project Roadmap: Not Yet Created
Key Contacts
  • Contact the GPC to report a problem or concern about this project or to update information.
current release
OWASP Faux Bank v0.5 - 5th June 2014 - (download)
Release description:
  • 5 of the 10 vulnerabilities have been implemented in the Classic ASP version.
Rating: Projects/OWASP Faux Bank Project/GPC/Assessment/OWASP Faux Bank v0.5
last reviewed release
Not Yet Reviewed

other releases