[Owasp-leaders] CTF services

Ali Khalfan ali.khalfan at owasp.org
Wed Jul 13 20:31:46 UTC 2016

Thanks, Michael !

On July 13, 2016 11:29:03 PM GMT+03:00, Michael Born <michael.born at owasp.org> wrote:
>Hi Ali,
>I'm happy to share the vulnerable VM I developed for Fred Donovan's and
>Offensive Python class. There are a slew of application and host based
>vulnerabilities to beat up on. Feel free to use it and the Python
>as you need. I designed the vulnerable VM to accommodate beginner to
>intermediate penetration testers. If you have questions, I'm happy to
>answer them! The download link to the VM and scripts is below:
>Additionally, vulnhub (http://vulnhub.com) is a great place to download
>custom made vulnerable VM's developed by some smart people in the
>community. VulnHub is not endorsed by OWASP by any means but I use them
>regularly to keep up on my skill set as a penetration tester.
>Thank you,
>Michael Born
>OWASP Omaha
>Michael.Born at OWASP.org
>On Wed, Jul 13, 2016 at 11:50 AM, Ali Khalfan <ali.khalfan at owasp.org>
>> Does anyone know of any provider/site/company that offers CTF simply
>> training and developing pen testing skills ?  I know the AppSec CTF
>> reserved for conferences only and I'd like to recommend places where
>> would-be pen testers can keep their skills polished and be up to date
>> (not to mention test some OWASP endorsed products).
>> _______________________________________________
>> OWASP-Leaders mailing list
>> OWASP-Leaders at lists.owasp.org
>> https://lists.owasp.org/mailman/listinfo/owasp-leaders

Sent from my Android device with K-9 Mail. Please excuse my brevity.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp-leaders/attachments/20160713/422e4594/attachment.html>

More information about the OWASP-Leaders mailing list