Skip to content

Commit 7fe7b2c

Browse files
committed
add reference to VWAD
1 parent 19dd755 commit 7fe7b2c

File tree

5 files changed

+30
-5
lines changed

5 files changed

+30
-5
lines changed

.wordlist.txt

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -494,3 +494,4 @@ OAuth
494494
OpenID
495495
Multifactor
496496
XXE
497+
VWAD

contributing.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -121,13 +121,13 @@ Follow instructions to install the command line [lychee][lychee-install] and [pa
121121
To install `markdownlint-cli2` use npm: `npm install markdownlint-cli2 --global`,
122122
and to install `pyspelling` use pip: `pip install pyspelling`
123123

124-
## Release process
124+
#### Release process
125125

126126
The release process is automatic, and triggers when the repo is tagged with a version number.
127127
To trigger the release this process from within a cloned repo:
128128

129-
1. tag the release, for example: `git tag 4.1.2`
130-
2. push to the repo, for example: `git push origin 4.1.2`
129+
1. tag the release, for example: `git tag 4.1.3`
130+
2. push to the repo, for example: `git push origin 4.1.3`
131131

132132
The github release workflow then creates the pull request
133133
with modifications to the release area promoted from the draft area.

draft/09-training-education/01-vulnerable-apps/00-toc.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,16 @@ described in the SAMM [Training and Awareness][sammgegta] section,
2020
which in turn is part of the SAMM [Education & Guidance][sammgeg] security practice
2121
within the [Governance][sammg] business function.
2222

23-
The vulnerable applications provide a safe environment where various vulnerable targets can be attacked.
23+
The intentionally-vulnerable applications provide a safe environment where various vulnerable targets can be attacked.
2424
This provides practice in using various penetration tools available to a tester,
2525
without the risk of attack traffic triggering intrusion detection systems.
26+
The OWASP [Vulnerable Web Applications Directory Project][vwad] (VWAD) provides a comprehensive list of
27+
available intentionally-vulnerable web applications:
28+
29+
* Vulnerable [mobile applications][vwad-mobile]
30+
* [Offline][vwad-offline] vulnerable web applications
31+
* [Containerized][vwad-containers] vulnerable web applications
32+
* vulnerable web applications [available Online][vwad-online]
2633

2734
Sections:
2835

@@ -39,5 +46,10 @@ The OWASP Developer Guide is a community effort; if there is something that need
3946
[sammg]: https://owaspsamm.org/model/governance/
4047
[sammgeg]: https://owaspsamm.org/model/governance/education-and-guidance/
4148
[sammgegta]: https://owaspsamm.org/model/governance/education-and-guidance/stream-a/
49+
[vwad]: https://owasp.org/www-project-vulnerable-web-applications-directory/
50+
[vwad-containers]: https://owasp.org/www-project-vulnerable-web-applications-directory/#div-container
51+
[vwad-mobile]: https://owasp.org/www-project-vulnerable-web-applications-directory/#div-mobile
52+
[vwad-online]: https://owasp.org/www-project-vulnerable-web-applications-directory/#div-online
53+
[vwad-offline]: https://owasp.org/www-project-vulnerable-web-applications-directory/#div-offline
4254

4355
\newpage

draft/09-training-education/01-vulnerable-apps/toc.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,13 @@ within the [Governance][sammg] business function.
3434
The vulnerable applications provide a safe environment where various vulnerable targets can be attacked.
3535
This provides practice in using various penetration tools available to a tester,
3636
without the risk of attack traffic triggering intrusion detection systems.
37+
The OWASP [Vulnerable Web Applications Directory Project][vwad] (VWAD) provides a comprehensive list of
38+
available intentionally-vulnerable web applications:
39+
40+
* Vulnerable [mobile applications][vwad-mobile]
41+
* [Offline][vwad-offline] vulnerable web applications
42+
* [Containerized][vwad-containers] vulnerable web applications
43+
* vulnerable web applications [available Online][vwad-online]
3744

3845
Sections:
3946

@@ -52,3 +59,8 @@ then [submit an issue][issue0910] or [edit on GitHub][edit0910].
5259
[sammg]: https://owaspsamm.org/model/governance/
5360
[sammgeg]: https://owaspsamm.org/model/governance/education-and-guidance/
5461
[sammgegta]: https://owaspsamm.org/model/governance/education-and-guidance/stream-a/
62+
[vwad]: https://owasp.org/www-project-vulnerable-web-applications-directory/
63+
[vwad-containers]: https://owasp.org/www-project-vulnerable-web-applications-directory/#div-container
64+
[vwad-mobile]: https://owasp.org/www-project-vulnerable-web-applications-directory/#div-mobile
65+
[vwad-online]: https://owasp.org/www-project-vulnerable-web-applications-directory/#div-online
66+
[vwad-offline]: https://owasp.org/www-project-vulnerable-web-applications-directory/#div-offline

draft/09-training-education/04-samurai-wtf.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ From a command prompt run 'katana' to start configuring SamuraiWTF for your trai
8181
* [SamuraiWTF Dojo][samurai-dojo]
8282
* [SamuraiWTF Katana][samurai-katana]
8383
* [SamuraiWTF downloads][samuraiwtf-download]
84-
* OWASP [project][samuraiwtf-project]
84+
* SamuraiWTF [OWASP project][samuraiwtf-project]
8585

8686
----
8787

0 commit comments

Comments
 (0)