[Owasp-leaders] OWASP Vulnerable Web Applications Directory Project

Amro amro at owasp.org
Fri Oct 18 15:29:50 UTC 2013


This is great!! Well done Simon and Raul!

I would suggest that we use this project during the development of any 
testing projects (which requires screenshots or demonstrations "PoC") to 
promote it

Cheers,
Amro

On 10/18/13 6:55 PM, psiinon wrote:
> Hi leaders,
>
> I've been working with Raul to make the list of vulnerable web 
> applications he was maintaining on his blog 
> (http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html) 
> into an OWASP Project.
>
> The result is the OWASP Vulnerable Web Applications Directory Project 
> <https://www.owasp.org/index.php?title=OWASP_Vulnerable_Web_Applications_Directory_Project> 
> :)
>
> To quote from the project description:
>
> "OWASP Vulnerable Web Applications Directory (VWAD) Project is a 
> comprehensive and well maintained registry of all known vulnerable web 
> applications currently available. These vulnerable web applications 
> can be used by web developers, security auditors and penetration 
> testers to put in practice their knowledge and skills during training 
> sessions (and specially afterwards), as well as to test at any time 
> the multiple hacking tools and offensive techniques available, in 
> preparation for their next real-world engagement.
>
> VWAD main goal is to provide a list of vulnerable web applications 
> available to security professionals for hacking and offensive 
> activities, so that they can attack realistic web environments... 
> without going to jail :)
>
> The vulnerable web applications have been classified in three 
> categories: On-Line, Off-Line, and VMs/ISOs. Each list has been 
> ordered alphabetically.
>
> An initial list that inspired this project was maintained till the end 
> on 2013 at: 
> http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html."
>
> Please let us know if anything is wrong or missing.
> Or even better, just update the page yourself - the project is self 
> contained on the OWASP wiki so anyone can go in and correct things.
>
> And let us know if you have any suggestions for ways it could be improved.
>
> Oh, and spread the word - we want it to be the top result when you 
> search for "vulnerable web applications" using your favourite search 
> engine.
>
> Cheers,
>
> Simon
>
> -- 
> OWASP ZAP <https://www.owasp.org/index.php/ZAP> Project leader
>
>
> _______________________________________________
> OWASP-Leaders mailing list
> OWASP-Leaders at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-leaders

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp-leaders/attachments/20131018/8e50ecf2/attachment.html>


More information about the OWASP-Leaders mailing list