Vulnado - Purposely Vulnerable Coffee Application To Assistance Pb Secure Coding Workshops
This application in addition to exercises volition stimulate got yous through around of the OWASP happen ten Vulnerabilities in addition to how to forestall them.
Up in addition to running
Architecture
The docker network created past times
Exercises
Up in addition to running
- Install Docker for MacOS or Windows. You'll require to do a Docker concern human relationship if yous don't already stimulate got one.
git clone git://github.com/ScaleSec/vulnado
cd vulnado
docker-compose up
- Open a browser in addition to navigate to the customer to brand certain it's working: http://localhost:1337
- Then dorsum inwards your lastly verify yous stimulate got connector to your API server:
nc -vz localhost 8080
Architecture
The docker network created past times
docker-compose
maps pretty good to a multi-tier architecture where a spider web server is publicly available in addition to at that spot are other network resources similar a database in addition to internal site that are non publicly available.Exercises
- SQL Injection
- XSS - Cross Site Scripting
- SSRF - Server Side Request Forgery
- RCE - Remote Code Execution & Reverse Shell