OWASP Vicnum
Main
Quick Downloadshttp://vicnum.sourceforge.net/ for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge http://vicnum.sourceforge.net/ for a VM of early Vicnum applications such as Guessnum, Jotto, and the Union Challenge https://github.com/mordecai/vicnum for the Guessnum, Jotto, and the Union Challenge code https://github.com/mordecai/vicnum for the Guessnum, Jotto, and the Union Challenge code https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app https://github.com/fridaygoldsmith/bwa_cyclone_transfers for Cylcone a vulnerable Rails app https://sourceforge.net/projects/xxe/ for a VM of an intentionally vulnerable web services exploitable with XXE written in GRAILS https://sourceforge.net/projects/xxe/ for a VM of an intentionally vulnerable web services exploitable with XXE written in GRAILS https://github.com/mordecai/BasicCTF for a basic CTF requiring the player to parse a PCAP and work their way around a web app https://github.com/mordecai/BasicCTF for a basic CTF requiring the player to parse a PCAP and work their way around a web app News and EventsNews and EventsSponsored BySponsored ByThis project is sponsored by CipherTechs. This project is sponsored by CipherTechs. |
</td>
</table>
FAQs
FAQs
- Q1 Anything I need to set up vicnum?
- Q1 Anything I need to set up vicnum? There are help folder in some downloads, and readmes on github as There are help folder in some downloads, and readmes on github as well as a pdf manual. Basically set up the database, make sure the well as a pdf manual. Basically set up the database, make sure the apache modules are loaded and for Guessnum and Jotto modify the http apache modules are loaded and for Guessnum and Jotto modify the http config file to find the perl code in the cgi-bin folder. config file to find the perl code in the cgi-bin folder.
- Q2 Is there a way to make the challenges harder or easier?
- Q2 Is there a way to make the challenges harder or easier? Sure. Some suggestions are in the help file, one of them of course Sure. Some suggestions are in the help file, one of them of course is to delete the help file. You can also modify the backdoors, is to delete the help file. You can also modify the backdoors, allow/disallow indexing of folders, or change the encoding of hidden allow/disallow indexing of folders, or change the encoding of hidden fields. fields.
- Q3 Is there more to it than just technical challenges?
- Q3 Is there more to it than just technical challenges? Absolutely. In hacking a web application looking at the nature of Absolutely. In hacking a web application looking at the nature of the app or examining the so-called business logic is always a good the app or examining the so-called business logic is always a good idea. So looking for the back doors and hidden files is definitely a idea. So looking for the back doors and hidden files is definitely a goal here. goal here.
Acknowledgements
Acknowledgements
Volunteers
Volunteers
Vicnum is developed by a worldwide team of volunteers. The primary Vicnum is developed by a worldwide team of volunteers. The primary contributors to date have been: contributors to date have been:
- Nicole Becher
- Nicole Becher
- Mordecai Kraushar
- Mordecai Kraushar
Others
Others
Vicnum has been demonstrated at many chapter events, many attendees have Vicnum has been demonstrated at many chapter events, many attendees have provided feedback afterwards. In particular a big shout out to Daniel provided feedback afterwards. In particular a big shout out to Daniel Zabib, Anthony Martini and Albert Fong who helped customize Vicnum Zabib, Anthony Martini and Albert Fong who helped customize Vicnum applications for the APPSECUSA conference. applications for the APPSECUSA conference.
The Vicnum Project is affiliated with the Brooklyn OWASP chapter. The Vicnum Project is affiliated with the Brooklyn OWASP chapter.
Road Map and Getting Involved
Road Map and Getting Involved
The vulnerable API ! The vulnerable API !
API’s are everywhere! Mobile & web applications applications, cloud API’s are everywhere! Mobile & web applications applications, cloud services, the Internet of Things and embedded devices are all services, the Internet of Things and embedded devices are all communicating via API’s. A vulnerable API can be just as destructive as communicating via API’s. A vulnerable API can be just as destructive as a vulnerable web application. So, how do you test an API? The a vulnerable web application. So, how do you test an API? The vulnerable API has a number of serious issues including many of the vulnerable API has a number of serious issues including many of the classic OWASP Top 10 vulnerabilities. This release is meant for pen classic OWASP Top 10 vulnerabilities. This release is meant for pen testers, breakers and developers and will demonstrate some of the common testers, breakers and developers and will demonstrate some of the common flaws that are found in API’s such as: flaws that are found in API’s such as:
Authentication Authentication
Injection Injection
Verbosity Verbosity
Transport Encryption Denial of Service Transport Encryption Denial of Service
Insecure Direct Object References Insecure Direct Object References
Unrestricted File Uploads Unrestricted File Uploads
Involvement in the development and promotion of Vicnum is actively Involvement in the development and promotion of Vicnum is actively encouraged! You do not have to be a security expert in order to encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help: contribute. Some of the ways you can help:
- Coming up with a name (and maybe themes for a vulnerable API
- Coming up with a name (and maybe themes for a vulnerable API program) program)
Project About
Project About
NOTOC
Vicnum was introduced in 2009, Early releases introduced several Vicnum was introduced in 2009, Early releases introduced several vulnerable apps (and CTFs) including Guessnum, Jotto and the Union vulnerable apps (and CTFs) including Guessnum, Jotto and the Union Challenge. Recent release upgrades are: Challenge. Recent release upgrades are:
V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application V1.5 (December 2013) Cyclone, a vulnerable Ruby on Rails Application
V1.6 (June 2014) Breaking Bad XXE Exploit V1.6 (June 2014) Breaking Bad XXE Exploit
V1.7 (December 2015) Basic CTF to parse a pcap V1.7 (December 2015) Basic CTF to parse a pcap
V2.0 will be introduced in May 2016 and will include an intentionally V2.0 will be introduced in May 2016 and will include an intentionally vulnerable API. vulnerable API.
Category:OWASP Project Category:OWASP Project Category:OWASP_Builders Category:OWASP_Builders Category:OWASP_Defenders Category:OWASP_Defenders Category:OWASP_Document Category:OWASP_Document
Example
Put whatever you like here: news, screenshots, features, supporters, or remove this file and don’t use tabs at all.