Difference between revisions of "Project Information:template Vicnum Project"

From OWASP
Jump to: navigation, search
(New page: ---- {| style="width:100%" border="0" align="center" ! colspan="8" align="center" style="background:#4058A0; color:white"|<font color="white">'''PROJECT INFORMATION''' |- | style="widt...)
 
(38 intermediate revisions by 4 users not shown)
Line 1: Line 1:
----
+
=Main=
{| style="width:100%" border="0" align="center"
+
! colspan="8" align="center" style="background:#4058A0; color:white"|<font color="white">'''PROJECT INFORMATION'''
+
|-
+
| style="width:15%; background:#7B8ABD" align="center"|'''Project Name'''
+
| colspan="7" style="width:85%; background:#cccccc" align="left"|<font color="black">'''OWASP XXXX Project'''
+
|-
+
| style="width:15%; background:#7B8ABD" align="center"| '''Short Project Description'''
+
| colspan="7" style="width:85%; background:#cccccc" align="left"|
+
Projects description here XXXX
+
|-
+
| style="width:15%; background:#7B8ABD" align="center"|
+
'''Key Project Information'''
+
| style="width:14%; background:#cccccc" align="center"|
+
Project Leader<br>[mailto:XXXX '''XXXX'']
+
| style="width:15%; background:#cccccc" align="center"|
+
Project Contibutors<br>[mailto: XXXX '''XXXX'']
+
| style="width:10%; background:#cccccc" align="center"|
+
Mailing List<br>[XXXX '''Subscribe here''']<br>[mailto: XXXX '''Use here''']
+
| style="width:17%; background:#cccccc" align="center"|
+
License<br>[http://creativecommons.org/licenses/by-sa/3.0/ '''Creative Commons Attribution Share Alike 3.0''']
+
| style="width:14%; background:#cccccc" align="center"|
+
Project Type<br>[[:Category:OWASP_Project#Alpha_Status_Projects|'''Tool''']]
+
| style="width:15%; background:#cccccc" align="center"|
+
Sponsors<br>if any, add link
+
|}
+
{| style="width:100%" border="0" align="center"
+
! align="center" style="background:#7B8ABD; color:white"|<font color="black">'''Release Status'''
+
! align="center" style="background:#7B8ABD; color:white"|<font color="black">'''Main Links'''
+
! align="center" style="background:#7B8ABD; color:white"|<font color="black">'''Related Projects'''
+
|-
+
| style="width:29%; background:#cccccc" align="center"|
+
Provisory '''[[:Category:OWASP Project Assessment#Alpha Quality Tool Criteria|Apha Quality]]'''<br>(under review)<br>[[:OWASP XXXX Project - Assessment Frame|Please see here for complete information.]]
+
| style="width:42%; background:#cccccc" align="center"|
+
* add link(s)
+
| style="width:29%; background:#cccccc" align="center"|
+
*  if any, add link(s)
+
|}
+
----
+
Project’s Assessment Frame
+
  
[[:Category:OWASP XXXX Project|Click here to return to project's main page]].
+
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
{| style="width:100%" border="0" align="center"
+
 
! colspan="2" align="center" style="background:#4058A0; color:white"|<font color="white">'''PROJECT IDENTIFICATION'''
+
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
|-
+
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |
| style="width:15%; background:#7B8ABD" align="center"|'''Project Name'''
+
==OWASP Vicnum Project==
  | colspan="1" style="width:85%; background:#cccccc" align="left"|<font color="black">'''OWASP XXXX Project'''
+
 
|}
+
OWASP Vicnum Project is a collection of intentionally vulnerable web applications.
{| style="width:100%" border="0" align="center"
+
 
! colspan="5" align="center" style="background:#4058A0; color:white"|ASSESSMENT AND REVIEW PROCESS
+
==Introduction==
|-
+
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”
| style="width:15%; background:#6C82B5" align="center"|'''Reviewer'''
+
 
| style="width:21%; background:#b3b3b3" align="center"|'''Author's Self Evaluation'''<br>[mailto:XXXX '''XXXX ''']<br>(applicable for Alpha Quality&further) 
+
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.
| style="width:21%; background:#b3b3b3" align="center"|'''First Reviewer'''<br>[mailto:XXXX '''XXXX ''']<br>(applicable for Alpha Quality&further)
+
 
| style="width:21%; background:#b3b3b3" align="center"|'''Second Reviewer'''<br>[[mailto:XXXX '''XXXX ''']<br>(applicable for Beta Quality&further)
+
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.
| style="width:22%; background:#b3b3b3" align="center"|'''OWASP Board Member'''<br>[mailto:XXXX '''XXXX ''']<br>(applicable just for Release Quality)  
+
 
|-
+
See http://vicnum.ciphertechs.com/
| style="width:15%; background:#7B8ABD" align="center"|'''Review'''
+
 
| style="width:21%; background:#C2C2C2" align="center"|Objectives & Deliveries reached?<br>'''Yes/No'''<br>(To update)<br>---------<br>Which status has been reached?<br>'''Provisory Alpha Quality'''<br>(To update)<br>---------<br>[[OWASP XXXX Project - Assessment Frame - First Review - Self Evaluation - A|See&Edit:Final Review/SelfEvaluation (A)]]
+
==Project Goal==
| style="width:21%; background:#C2C2C2" align="center"|Objectives & Deliveries reached?<br>'''Yes/No'''<br>(To update)<br>---------<br>Which status has been reached?<br>'''Provisory Alpha Quality'''<br>(To update)<br>---------<br>[[OWASP XXXX Project - Assessment Frame - First Review - First Reviewer - B|See&Edit: Final Review/1st Reviewer (B)]]
+
Have fun and stimulate interest in the field
| style="width:21%; background:#C2C2C2" align="center"|Objectives & Deliveries reached?<br>'''Yes/No'''<br>(To update)<br>---------<br>Which status has been reached?<br>'''Provisory Alpha Quality'''<br>(To update)<br>---------<br>[[OWASP XXXX Project - Assessment Frame - First Review - Second Reviewer - C|See&Edit: Final Review/2nd Reviewer (C)]]
+
 
| style="width:22%; background:#C2C2C2" align="center"|Objectives & Deliveries reached?<br>'''Yes/No'''<br>(To update)<br>---------<br>Which status has been reached?<br>'''Provisory Alpha Quality'''<br>(To update)<br>---------<br>[[OWASP XXXX Project - Assessment Frame - First Review - OWASP Board Member - D|See/Edit: Final Review/Board Member (D)]]
+
Test web application scanners
  |-
+
   
|}
+
Test manual attack techniques
 +
 
 +
Test source code analysis tools
 +
 
 +
Look at the code that allows the vulnerabilities
 +
 
 +
Test web application firewalls
 +
 +
Examine evidence left by attacks
 +
 
 +
| valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |
 +
 
 +
== Where is Vicnum? ==
 +
 
 +
Vulnerable VM of some Vicnum applications is downloadable from sourceforge.
 +
 
 +
Since individual applications within the project are constantly being updated, not everything is on that VM.
 +
Individual components are either on sourceforge or on github.
 +
 
 +
Vicnum applications are also distributed as part of the Broken Web Application Project
 +
(see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project)
 +
 
 +
Vicnum applications are also typically available online at http://vicnum.ciphertechs.com
 +
 
 +
== Presentation ==
 +
 
 +
http://www.slideshare.net/mkraushar/vicnumdescription
 +
 
 +
== Project Leader ==
 +
 
 +
Mordecai Kraushar
 +
 
 +
Nicole Becher
 +
 
 +
== Related Projects ==
 +
 
 +
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project
 +
 
 +
== Ohloh ==
 +
 
 +
*https://www.ohloh.net/p/OWASP-VicNum
 +
 
 +
==Licensing==
 +
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
 +
 
 +
| valign="top"  style="padding-left:25px;width:200px;" |  
 +
 
 +
== Quick Downloads ==
 +
 
 +
http://vicnum.sourceforge.net/
 +
 
 +
https://github.com/fridaygoldsmith/bwa_cyclone_transfers
 +
 
 +
== News and Events ==
 +
 
 +
== Sponsored By ==
 +
This project is sponsored by CipherTechs.
 +
 
 +
http://www.ciphertechs.com/
 +
 
 +
==Classifications==
 +
 
 +
  {| width="200" cellpadding="2"
 +
  |-
 +
  | align="center" valign="top" width="50%" rowspan="2"| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]
 +
  | align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=]]   
 +
  |-
 +
  | align="center" valign="top" width="50%"| [[File:Owasp-defenders-small.png|link=]]
 +
  |-
 +
  | colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]
 +
  |-
 +
  | colspan="2" align="center" | [[File:Project_Type_Files_CODE.jpg|link=]]
 +
  |}
 +
 
 +
|}
 +
 
 +
=FAQs=
 +
 
 +
; Q1
 +
: A1
 +
 
 +
; Q2
 +
: A2
 +
 
 +
= Acknowledgements =
 +
==Volunteers==
 +
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:
 +
 
 +
* xxx
 +
* xxx
 +
 
 +
==Others==
 +
* xxx
 +
* xxx
 +
 
 +
= Road Map and Getting Involved =
 +
As of February, the priorities are:
 +
* xxx
 +
* xxx
 +
* xxx
 +
 
 +
Involvement in the development and promotion of Vicnum is actively encouraged!
 +
You do not have to be a security expert in order to contribute.
 +
Some of the ways you can help:
 +
* xxx
 +
* xxx
 +
 
 +
 
 +
 
 +
=Project About=
 +
{{:Projects/OWASP_Vicnum_Project}} 
 +
 
 +
__NOTOC__ <headertabs />  
 +
 
 +
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]

Revision as of 18:32, 14 July 2014

[edit]

OWASP Project Header.jpg

OWASP Vicnum Project

OWASP Vicnum Project is a collection of intentionally vulnerable web applications.

Introduction

“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”

They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.

Vicnum applications are commonly used in Capture the Flag exercises at security conferences.

See http://vicnum.ciphertechs.com/

Project Goal

Have fun and stimulate interest in the field

Test web application scanners

Test manual attack techniques

Test source code analysis tools

Look at the code that allows the vulnerabilities

Test web application firewalls

Examine evidence left by attacks

Where is Vicnum?

Vulnerable VM of some Vicnum applications is downloadable from sourceforge.

Since individual applications within the project are constantly being updated, not everything is on that VM. Individual components are either on sourceforge or on github.

Vicnum applications are also distributed as part of the Broken Web Application Project (see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project)

Vicnum applications are also typically available online at http://vicnum.ciphertechs.com

Presentation

http://www.slideshare.net/mkraushar/vicnumdescription

Project Leader

Mordecai Kraushar

Nicole Becher

Related Projects

https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project

Ohloh

Licensing

OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.

Quick Downloads

http://vicnum.sourceforge.net/

https://github.com/fridaygoldsmith/bwa_cyclone_transfers

News and Events

This project is sponsored by CipherTechs.

http://www.ciphertechs.com/

Classifications

New projects.png Owasp-builders-small.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png
Project Type Files CODE.jpg

Q1
A1
Q2
A2

Volunteers

Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:

  • xxx
  • xxx

Others

  • xxx
  • xxx

As of February, the priorities are:

  • xxx
  • xxx
  • xxx

Involvement in the development and promotion of Vicnum is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:

  • xxx
  • xxx