NOWASP(Mutillidae)v2.2.2 released

Change Log for NOWASP 2.2.2 (Codename: Mutillidae):
  •         Improved error handling and error exception bubbling in the MySQL class to make it easier to diagnose errors in the bubble hint handler.
  •         Imporved bubble handler code via refactoring
  •         Patched a bug in the show/hide bubble hints
  •         Converted add-to-your-blog to object oriented MySQLHandler
  •         Corrected minor error handling bug in browser-info.php
  •         Added logging to add to your blog to create more opportunity to poison logs
  •         Added Method switching vulnerability to user poll
  •         Cleaned up code in user poll
  •         Fixed cross site scripting vulnerability in user poll when in secure mode (ironic)
  •         Added logging to user poll
NOWASP (Mutillidae) is a free, open source web application provided to allow security enthusiest to pen-test a web application. NOWASP (Mutillidae) can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to administrate a webserver. It is already installed on Samurai WTF and Rapid7 Metasploitable-2. The existing version can be updated on either. NOWASP (Mutillidae) contains dozens of vulns and hints to help the user; providing an easy-to-use web hacking environment deliberately designed to be used as a lab for security enthusiast, classrooms, labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability assessment software.

NOWASP (Mutillidae) has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and oth

Features :

  1. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver.
  2. Installs easily by dropping project files into the "htdocs" folder of XAMPP.
  3. Preinstalled on Rapid7 Metasploitable 2
  4. Preinstalled on Samurai Web Testing Framework (WTF)
  5. Has dozen of vulnerablities and challenges. Contains at least one vulnearbility for each of the OWASP Top Ten 2007 and 2010
  6. System can be restored to default with single-click of "Setup" button
  7. Switches between secure and insecure mode
  8. Secure and insecure source code for each page stored in the same PHP file for easy comparison
  9. Used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software
  10. Contains 2 levels of hints to help users get started
  11. Instructional Videos: http://www.youtube.com/user/webpwnized
  12. Updates tweeted to @webpwnized
  13. Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools
Download : 
LATEST-mutillidae-2.2.2.zip (7.2 MB)
Download other Version
For more information -
Previous post regarding NOWASP(Mutillidae)