|Join hundreds of other Developers and InfoSec professionals for Training, Sessions and Community at our first conference of 2019|
[AppSec Tel Aviv, May 26-30th]
Project Information:template Vicnum Project
OWASP Vicnum Project
OWASP Vicnum Project is a collection of intentionally vulnerable web applications and will now includes an intentionally vulnerable web API
“Flexible, realistic, vulnerable web applications useful to auditor’s honing their web application security skills”
They demonstrate common web application vulnerabilities such as SQL injection and cross site scripting.
Vicnum applications are commonly used in Capture the Flag exercises at security conferences.
Have fun and stimulate interest in the field
Test web application scanners
Test manual attack techniques
Test source code analysis tools
Look at the code that allows the vulnerabilities
Test web application firewalls
Examine evidence left by attacks
Learn how to test API's
Where is Vicnum?
Vulnerable VM of some Vicnum applications are downloadable from sourceforge. (see https://sourceforge.net/projects/vicnum/ )
Since individual applications within the project are constantly being updated, not everything is on that VM. Individual components are either on sourceforge or on github. (https://github.com/thedeadrobots/bwa_cyclone_transfers)
Vicnum applications are also distributed as part of the Broken Web Application Project (see https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project)
OWASP Vicnum is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
News and Events
This project is sponsored by CipherTechs.
Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been:
As of February, the priorities are:
Involvement in the development and promotion of Vicnum is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help: