Loading...
Tuesday, July 24, 2012

OWASPBWA 1.0! - OWASP Broken Web Applications Project

Open Web Application Security Project (OWASP) Broken Web Applications Project, a collection of vulnerable web applications that is distributed on a Virtual Machine in VMware format compatible with their no-cost and commercial VMware products.

The Broken Web Applications Project (BWA) is an effort to provide a wealth of applications with known vulnerabilities for those interested in:
  • learning about web application security
  • testing manual assessment techniques
  • testing automated tools
  • testing source code analysis tools
  • observing web attacks
  • testing WAFs and similar code technologies
all the while saving people interested in doing either learning or testing the pain of having to compile, configure, and catalog all of the things normally involved in doing this process from scratch.
Features
  • OWASP
  • Virtual Machine
  • Vulnerable Web Apps
Download -
Download other versions -

Change log for version OWASPBWA 1.0
Release notes for the Open Web Application Security Project (OWASP) 

The VM can be downloaded as a .zip file or as a much smaller .7z 7-zip
Archive. BOTH FILES CONTAIN THE EXACT SAME VM! 
 We recommend that you download the .7z archive if possible to save bandwidth (and time).
7-zip is available for Windows, Mac, Linux, and other Operating Systems.

!!! This VM has many serious security issues. We strongly recommend that you run it only on the "host only" or "NAT" network in the virtual machine settings !!!

Version 1.0 - 2012-07-24
- Added new application: WIVET (http://code.google.com/p/wivet/)
- Updated WAVSEP, Mutillidae, Vicnum
- Created new category for "Applications for Testing Tools", containing
  OWASP ZAP WAVE, WIVET, and WAVSEP
- Major update to User Guide at http://code.google.com/p/owaspbwa/wiki/UserGuide.
  Removed some other project Wiki pages that were incorporated into User Guide.
- More improvements to index.html

Visit Website -
http://www.owaspbwa.org/.
Screenshot -




0 comments:

Post a Comment

 
TOP