NOWASP Mutillidae v2.3.9! - Web Pen-Test Practice Application
NOWASP (Mutillidae) is a free, open source, deliberately vulnerable web-application providing a target for web-security enthusiest. NOWASP (Mutillidae) can be installed on Linux and Windows using LAMP, WAMP, and XAMMP for users who do not want to administrate a webserver. It is pre-installed on SamuraiWTF, Rapid7 Metasploitable-2, and OWASP BWA. The existing version can be updated on pre-installed platforms. With dozens of vulns and hints to help the user; this is an easy-to-use web hacking environment deliberately designed for labs, security enthusiast, classrooms, CTF, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, corporate web sec training courses, and as an "assess the assessor" target for vulnerability assessment software.
Instructional videos using NOWASP (Mutillidae) are available on the "webpwnized" YouTube account at https://www.youtube.com/user/webpwnized. Updates on the project and video posts are tweeted to @webpwni
NOWASP (Mutillidae) Web Site
Features -
Download other versions
Source -
http://sourceforge.net/projects/mutillidae/
Screenshot -
Instructional videos using NOWASP (Mutillidae) are available on the "webpwnized" YouTube account at https://www.youtube.com/user/webpwnized. Updates on the project and video posts are tweeted to @webpwni
NOWASP (Mutillidae) Web Site
Features -
- Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. Mutillidae is confirmed to work on XAMPP, WAMP, and LAMP. XAMPP is the "default" deployment.
- Installs easily by dropping project files into the "htdocs" folder of XAMPP.
- Will attempt to detect if the MySQL database is available for the user
- Preinstalled on Rapid7 Metasploitable 2, Samurai Web Testing Framework (WTF), and OWASP Broken Web Apps (BWA)
- Contains 2 levels of hints to help users get started
- Has dozen of vulnerablities and challenges. Contains at least one vulnearbility for each of the OWASP Top Ten 2007 and 2010
- Includes bubble-hints to help point out vulnerable locations
- System can be restored to default with single-click of "Setup" button
- Switches between secure and insecure mode
- Secure and insecure source code for each page stored in the same PHP file for easy comparison
- Used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" target for vulnerability software
- Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools
- Instructional Videos: http://www.youtube.com/user/webpwnized
- Updates tweeted to @webpwnized
- Moved the change log file into the documentation folder
- Added the JavaScript Object Notation (JSON) pages to the SQL injection menu as well as the HTML-5 menu
- Fixed bug on capture data page where SQL Injection protection was in the wrong place
- Added new global style for success messages
- Corrected CSS errors on Add to your Blog and View Blogs
- Added new challenge page named user-agent-impersonation.php The goal is to impersonate an iPad fairly closely. Added browser fingerprint elements that can be changed by User-Agent Switcher and some elements that have to be changed in the browser configuration.
Download other versions
Source -
http://sourceforge.net/projects/mutillidae/
Screenshot -