Difference between revisions of "OWASP Vulnerable Web Applications Directory Project"

From OWASP
Jump to: navigation, search
(Created page with "=Main= <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">link=</div> {| style="padding: 0;margin:0;margin-top:10px;t...")
 
(Added other compilations to ACK section)
(32 intermediate revisions by 4 users not shown)
Line 6: Line 6:
 
| valign="top"  style="border-right: 1px dotted gray;padding-right:25px;" |
 
| valign="top"  style="border-right: 1px dotted gray;padding-right:25px;" |
  
==OWASP XXX==
+
==OWASP Vulnerable Web Applications Directory Project==
  
OWASP XXX is...
+
The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.
  
 
==Introduction==
 
==Introduction==
  
Write a short introduction
+
Select from the above tabs to view all of the:
 
+
* On-Line applications
 +
* Off-Line applications
 +
* Virtual Machines and ISO images
  
  
 
==Description==
 
==Description==
  
Write a description that is just a few paragraphs long
+
The OWASP Vulnerable Web Applications Directory (VWAD) Project is a comprehensive and well maintained registry of all known vulnerable web applications currently available. These vulnerable web applications can be used by web developers, security auditors and penetration testers to put in practice their knowledge and skills during training sessions (and especially afterwards), as well as to test at any time the multiple hacking tools and offensive techniques available, in preparation for their next real-world engagement.
  
 +
The main goal of VWAD is to provide a list of vulnerable web applications available to security professionals for hacking and offensive activities, so that they can attack realistic web environments... without going to jail :)
  
==Licensing==
+
The vulnerable web applications have been classified in three categories: On-Line, Off-Line, and VMs/ISOs. Each list has been ordered alphabetically.
OWASP XXX is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
+
  
 +
An initial list that inspired this project was maintained till October 2013 at: http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html.
 +
 +
 +
==Licensing==
 +
OWASP Vulnerable Web Applications Directory Projects is free to use. It is licensed under the Apache 2.0 License, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially.
  
 
| valign="top"  style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |
 
| valign="top"  style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |
  
== What is XXX? ==
+
== What is VWAD? ==
  
OWASP XXX  provides:
+
OWASP VWAD provides:
  
* xxx
+
* A list of all known vulnerable web applications.
* xxx
+
  
  
 
== Presentation ==
 
== Presentation ==
  
Link to presentation
+
Interview with [http://trustedsoftwarealliance.com/2013/10/18/simon-bennetts-the-owasp-web-applications-vulnerability-project/ Simon Bennetts – The OWASP Web Applications Vulnerability Project ].
  
  
  
  
== Project Leader ==
+
== Project Leaders ==
 +
 
 +
*[mailto:raul@raulsiles.com Raul Siles]
 +
*[[User:Simon Bennetts|Simon Bennetts]]
  
Project leader's name
 
  
  
 
== Related Projects ==
 
== Related Projects ==
  
* [[OWASP_CISO_Survey]]
+
* N/A
  
  
Line 57: Line 65:
 
== Quick Download ==
 
== Quick Download ==
  
* Link to page/download
+
* N/A - The project is self contained on the wiki.
  
  
  
 
== News and Events ==
 
== News and Events ==
* [20 Nov 2013] News 2
+
* [16 Oct 2013] Project created.
* [30 Sep 2013] News 1
+
  
  
 
== In Print ==
 
== In Print ==
This project can be purchased as a print on demand book from Lulu.com
+
N/A
  
  
Line 77: Line 84:
 
   | align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=Builders]]   
 
   | align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=Builders]]   
 
   |-
 
   |-
   | align="center" valign="top" width="50%"| [[File:Owasp-defenders-small.png|link=Defenders]]
+
   | align="center" valign="top" width="50%"| [[File:Owasp-breakers-small.png|link=Breakers]]
 
   |-
 
   |-
 
   | colspan="2" align="center"  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]  
 
   | colspan="2" align="center"  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]  
Line 86: Line 93:
 
|}
 
|}
  
=FAQs=
+
=On-Line apps=
  
; Q1
+
{{:OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Online | Online}}
: A1
+
 
 +
Please note that the [https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Online source page] for this tab is automatically generated via the [https://github.com/OWASP/OWASP-VWAD VWAD github project].
 +
 
 +
You can either edit that page directly or submit a pull request.
 +
 
 +
= Off-Line apps =
 +
 
 +
Vulnerable applications that have to be downloaded and used locally:
 +
 
 +
{{:OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline | Offline}}
 +
 
 +
Please note that the [https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Offline source page] for this tab is automatically generated via the [https://github.com/OWASP/OWASP-VWAD VWAD github project].
 +
 
 +
You can either edit that page directly or submit a pull request.
 +
 
 +
 
 +
The following apps are quite old and appear not to be maintained - as such they are probably less useful.
 +
 
 +
{{:OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/OfflineOld | OfflineOld}}
 +
 
 +
Please note that the [https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/OfflineOld source page] for this tab is automatically generated via the [https://github.com/OWASP/OWASP-VWAD VWAD github project].
 +
 
 +
You can either edit that page directly or submit a pull request.
 +
 
 +
= Virtual Machines or ISOs =
 +
 
 +
VMs which contain multiple vulnerable applications:
 +
 
 +
{{:OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/VMs | VMs}}
 +
 
 +
Please note that the [https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/VMs source page] for this tab is automatically generated via the [https://github.com/OWASP/OWASP-VWAD VWAD github project].
 +
 
 +
You can either edit that page directly or submit a pull request.
 +
 
 +
Please add any new apps in alphabetic order, correct mistakes or just comment on this page if you dont have write access to this wiki.
 +
 
 +
The following apps are quite old and appear not to be maintained - as such they are probably less useful.
 +
 
 +
{{:OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/VMsOld | VMsOld}}
 +
 
 +
Please note that the [https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/VMsOld source page] for this tab is automatically generated via the [https://github.com/OWASP/OWASP-VWAD VWAD github project].
 +
 
 +
You can either edit that page directly or submit a pull request.
  
; Q2
 
: A2
 
  
 
= Acknowledgements =
 
= Acknowledgements =
 
==Volunteers==
 
==Volunteers==
XXX is developed by a worldwide team of volunteers. The primary contributors to date have been:
+
VWAD is developed by a worldwide team of volunteers. The primary contributors to date have been:
  
* xxx
+
*[mailto:raul@raulsiles.com Raul Siles]
* xxx
+
*[[User:Simon Bennetts|Simon Bennetts]]
  
 
==Others==
 
==Others==
* xxx
+
* [mailto:achim@owasp.org Achim Hoffmann]
* xxx
+
* [[User:Zakiakhmad|Zaki Akhmad]]
 +
 
 +
==On-line resources used==
 +
* [http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html Hacking Vulnerable Web Applications Without Going To Jail]
 +
* [http://securitythoughts.wordpress.com/2010/03/22/vulnerable-web-applications-for-learning/ Vulnerable Web Applications for learning]
 +
* [http://code.google.com/p/owaspbwa/wiki/UserGuide OWASP BWA User Guide]
 +
 
 +
==Other vulnerable web-app compilations==
 +
* [http://www.amanhardikar.com/mindmaps/Practice.html Penetration Testing Practice Labs - Vulnerable Apps/Systems]
  
 
= Road Map and Getting Involved =
 
= Road Map and Getting Involved =
As of XXX, the priorities are:
+
As of October 15, 2013, the priorities are:
* xxx
+
* Document all known Vulnerable Web Applications
* xxx
+
* Publicise
* xxx
+
* Keep up to date
 +
* Please add a more robust/descriptive roadmap.
  
Involvement in the development and promotion of XXX is actively encouraged!
+
Involvement in the development and promotion of the OWASP Vulnerable Web Applications Directory Project is actively encouraged!
 
You do not have to be a security expert in order to contribute.
 
You do not have to be a security expert in order to contribute.
 
Some of the ways you can help:
 
Some of the ways you can help:
* xxx
+
* Update the wiki with any missing apps
* xxx
+
  
  
  
 
=Project About=
 
=Project About=
{{:Projects/OWASP_Example_Project_About_Page}}  
+
{{:Projects/OWASP_Vulnerable_Web_Applications_Directory_Project}}  
  
 
__NOTOC__ <headertabs />  
 
__NOTOC__ <headertabs />  
  
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]
+
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Breakers]]  [[Category:OWASP_Document]]

Revision as of 16:10, 20 November 2013

[edit]

OWASP Project Header.jpg

OWASP Vulnerable Web Applications Directory Project

The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.

Introduction

Select from the above tabs to view all of the:

  • On-Line applications
  • Off-Line applications
  • Virtual Machines and ISO images


Description

The OWASP Vulnerable Web Applications Directory (VWAD) Project is a comprehensive and well maintained registry of all known vulnerable web applications currently available. These vulnerable web applications can be used by web developers, security auditors and penetration testers to put in practice their knowledge and skills during training sessions (and especially afterwards), as well as to test at any time the multiple hacking tools and offensive techniques available, in preparation for their next real-world engagement.

The main goal of VWAD is to provide a list of vulnerable web applications available to security professionals for hacking and offensive activities, so that they can attack realistic web environments... without going to jail :)

The vulnerable web applications have been classified in three categories: On-Line, Off-Line, and VMs/ISOs. Each list has been ordered alphabetically.

An initial list that inspired this project was maintained till October 2013 at: http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html.


Licensing

OWASP Vulnerable Web Applications Directory Projects is free to use. It is licensed under the Apache 2.0 License, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially.

What is VWAD?

OWASP VWAD provides:

  • A list of all known vulnerable web applications.


Presentation

Interview with Simon Bennetts – The OWASP Web Applications Vulnerability Project .



Project Leaders


Related Projects

  • N/A


Quick Download

  • N/A - The project is self contained on the wiki.


News and Events

  • [16 Oct 2013] Project created.


In Print

N/A


Classifications

Owasp-incubator-trans-85.png Owasp-builders-small.png
Owasp-breakers-small.png
Cc-button-y-sa-small.png
Project Type Files DOC.jpg

App Name / Link Technology Author Notes
Acuart PHP Acunetix Art shopping
Acublog .NET Acunetix Blog
Acuforum ASP Acunetix Forum
Altoro Mutual IBM/Watchfire (jsmith/Demo1234)
Crack Me Bank Cenzic
Enigma Group Enigma Group
Gruyere Python Google
Hackademic Challenges Project PHP - Joomla OWASP
Hacker Challenge PCTechtips
Hacking Lab Hacking Lab
Hack.me eLearnSecurity Beta
HackThisSite HackThisSite Basic & Realistic (web) Missions
hackxor First 2 levels online (algo/smurf), rest offline
Pentester Academy
Security Tweets Acunetix HTML5
Vicnum Project Perl & PHP
Web Scanner Test Site NTOSpider (testuser/testpass)
XSS Test Suite
Zero Bank HP/SpiDynamics (admin/admin)

Please note that the source page for this tab is automatically generated via the VWAD github project.

You can either edit that page directly or submit a pull request.

Vulnerable applications that have to be downloaded and used locally:

App Name / Link Technology Other links Author Notes
BadStore Perl(CGI)
BodgeIt Store Java download
Bricks PHP download docs OWASP
Butterfly Security Project PHP download Last updated in 2008
bWAPP PHP download docs
Cyclone Transfers Ruby on Rails
Damn Vulnerable Web Application - DVWA PHP download RandomStorm
Damn Vulnerable Web Services - DVWS PHP download Secure Ideas
Gruyere Python download Google
Hackademic Challenges Project PHP download OWASP
Hacme Bank - Android McAfee / Foundstone
Hacme Bank .NET download McAfee / Foundstone
Hacme Books Java download McAfee / Foundstone
Hacme Casino Ruby on Rails download McAfee / Foundstone
Hacme Shipping ColdFusion download McAfee / Foundstone
Hacme Travel C++ download McAfee / Foundstone
hackxor First 2 levels online, rest offline
LampSecurity PHP
Mutillidae PHP download
Peruggia PHP download
Puzzlemall Java download docs
Rails Goat Ruby on Rails download docs OWASP
SecuriBench Java Stanford
SecuriBench Micro Java download Stanford
SQLI-labs PHP download blog
SQLol PHP download
twitterlike PHP git repository Sakti Dwi Cahyono
VulnApp .NET CVS download vulns
Vulnerable Web App Exploit.co.il
WackoPicko PHP download whitepaper
Wavsep - Web Application Vulnerability Scanner Evaluation Project Java download docs
WebGoat Java download guide OWASP
WebGoat.NET C# download OWASP
WIVET - Web Input Vector Extractor Teaser download tests

Please note that the source page for this tab is automatically generated via the VWAD github project.

You can either edit that page directly or submit a pull request.


The following apps are quite old and appear not to be maintained - as such they are probably less useful.

App Name / Link Technology Other links Author Notes
WebMaven/Buggy Bank
Insecure Web App Project Java download OWASP
SiteGenerator ASP.NET OWASP

Please note that the source page for this tab is automatically generated via the VWAD github project.

You can either edit that page directly or submit a pull request.

VMs which contain multiple vulnerable applications:

App Name / Link Technology Other links Author Notes
BadStore ISO download
Bee-Box bWAPP VMware
Broken Web Applications Project (BWA) VMware download OWASP
Drunk Admin Web Hacking Challenge VMware download
Exploit.co.il Vuln Web App VMware download
GameOver VMware download
Hackxor VMware download hints&tips
Hacme Bank Prebuilt VM VMware download
Kioptrix4 VMware & Hyper-V download
LAMPSecurity VMware download doc
Metasploitable VMware download doc
Metasploitable 2 VMware download
Moth VMware download
PentesterLab - The Exercises ISO & PDF
PHDays I-Bank VMware download
Samurai WTF ISO - list download
Sauron  Quemu solutions
Virtual Hacking Lab ZIP download
Web Security Dojo VMware, VirtualBox download
WordPress CD VirtualBox download ethicalhack3r WPScan

Please note that the source page for this tab is automatically generated via the VWAD github project.

You can either edit that page directly or submit a pull request.

Please add any new apps in alphabetic order, correct mistakes or just comment on this page if you dont have write access to this wiki.

The following apps are quite old and appear not to be maintained - as such they are probably less useful.


App Name / Link Technology Other links Author Notes
UltimateLAMP VMware download

Please note that the source page for this tab is automatically generated via the VWAD github project.

You can either edit that page directly or submit a pull request.


Volunteers

VWAD is developed by a worldwide team of volunteers. The primary contributors to date have been:

Others

On-line resources used

Other vulnerable web-app compilations

As of October 15, 2013, the priorities are:

  • Document all known Vulnerable Web Applications
  • Publicise
  • Keep up to date
  • Please add a more robust/descriptive roadmap.

Involvement in the development and promotion of the OWASP Vulnerable Web Applications Directory Project is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:

  • Update the wiki with any missing apps


PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What releases are available for this project?
what is this project?
Name: OWASP Vulnerable Web Applications Directory Project
Purpose: The OWASP Vulnerable Web Applications Directory is a comprehensive and well maintained registry of all known vulnerable web applications currently available.
License: Apache 2.0 License (fewest restrictions, even allowing proprietary modifications and proprietary forks of your project)
who is working on this project?
Project Leader(s):
  • Raul Siles @
  • Simon Bennetts @
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: Mailing List Archives
Project Roadmap: Not Yet Created
Key Contacts
  • Contact Raul Siles @ to contribute to this project
  • Contact Raul Siles @ to review or sponsor this project
  • Contact the GPC to report a problem or concern about this project or to update information.
current release
Not Yet Published
last reviewed release
Not Yet Reviewed


other releases