You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We currently serve the OWASP Juiceshop as a vulnerable application.
In August there will be an on-site live hacking event that would include us as a target. We have not committed fully yet, within 2 weeks we will have to make a decision. Some of our crew would be there to coach the hackers and perform really fast triaging and analysis, since the event is short we have to decide very quickly.
It would be useful to have multiple vulnerable applications in various languages. This could vary from a simple PHP script to a vulnerable app.
Proposed solution
Add a PHP vulnerable app or a simple script (vulnerable to SQLi and/or XSS)
It looks like this still needs to be done in preparation for future bug bounties and similar programmes. Although maybe not urgent. Removing stale label.
Motivation
We currently serve the OWASP Juiceshop as a vulnerable application.
In August there will be an on-site live hacking event that would include us as a target. We have not committed fully yet, within 2 weeks we will have to make a decision. Some of our crew would be there to coach the hackers and perform really fast triaging and analysis, since the event is short we have to decide very quickly.
It would be useful to have multiple vulnerable applications in various languages. This could vary from a simple PHP script to a vulnerable app.
Proposed solution
Alternatives
The text was updated successfully, but these errors were encountered: