diff --git a/ webgoat/main/project/WebContent/webgoat_challenge.jsp b/ webgoat/main/project/WebContent/webgoat_challenge.jsp index 9151aba25..1901cd668 100644 --- a/ webgoat/main/project/WebContent/webgoat_challenge.jsp +++ b/ webgoat/main/project/WebContent/webgoat_challenge.jsp @@ -6,72 +6,90 @@ WebGoat V5 - + -
-
-
+ +
+
+

Thank you for using WebGoat!

This program is a demonstration of common web application flaws. The exercises are intended to provide hands on experience with application - penetration testing techniques.

-
- + penetration testing techniques. The WebGoat project is lead by Bruce Mayhew. Please send all + comments to Bruce at WebGoat@G2-Inc.com.

+
+
- - + + - - + + - - + + - - + + - - + + - - + + -
WebGoat Design Team
Lesson Contributers
OWASP Foundation
Aspect Security
Jeff Williams
Aspect Security
- (http://www.aspectsecurity.com)

WebGoat Design Team

Lesson Contributers
Bruce Mayhew
Alex Smolen
- (http://www.parasoft.com)
+
Bruce Mayhew
+
Laurence Casey
+
David Anderson
+
Eric Sheridan
+
+
Aspect Security
+
Sherif Koussa
+
Alex Smolen
+
Chuck Willis
+ +
Laurence Casey
Rogan Dawes
- (http://dawes.za.net/rogan)
Special Thanks for V5
Documentation Contributers
David Anderson
Chuck Willis
- (http://www.securityfoundry.com)
Sherif Koussa
+ (http://www.macadamian.com)
+
Robert Sullivan
+ (http://www.unitedhealthgroup.com/)
+
Eric Sheridan
OWASP Autumn of Code
+ (http://www.owasp.org/)
Sherif Koussa
(http://www.macadamian.com)
+
+ +
To all who have sent comments
+ + +
 
+ + + +
-
- -
+
+ + +
-
WARNING
- While running this program your machine will be extremely vulnerable to attack. - You should disconnect from the Internet while using this program. +
+
WARNING
+ While running this program, your machine is extremely vulnerable to attack. + You should disconnect from the network while using this program.

This program is for educational purposes only. - If you attempt these techniques without authorization, - you are very likely to get caught. - If you are caught engaging in unauthorized hacking, - most companies will fire you. - Claiming that you were doing security research will - not work as that is the first thing that all hackers claim. -
-
- + Use of these techniques without permission could lead to + job termination, financial liability, and/or criminal penalties.
+