From c0ce72a2bd8279d4dcfe83a5f2ecd50911f18cd2 Mon Sep 17 00:00:00 2001 From: Nanne Baars Date: Sat, 23 May 2020 16:30:35 +0200 Subject: [PATCH] Remove Github pages, too many things to keep in sync. Let's keep the focus on the OWASP page and the Github README --- docs/index.html | 568 ++++++++++++++++++++++++------------------------ 1 file changed, 290 insertions(+), 278 deletions(-) diff --git a/docs/index.html b/docs/index.html index 9e408e860..5c58e5e04 100644 --- a/docs/index.html +++ b/docs/index.html @@ -2,285 +2,297 @@ - - - - - - WebGoat - - - - - - - - - - - - - - - + + - - - - - - - -
-
-
-
-

Learn the hack - Stop the attack

- - -
-
-
-
-

WebGoat is a deliberately insecure application that allows interested developers just like you to test vulnerabilities - commonly found in Java-based applications that use common and popular open source components.

-
- -
-
-
- - -
-
-

Learn in 3 steps

-
- -
-
- - -
-
-

Goals

-
-
-
-

- Web application security is difficult to learn and practice. Not many people have full blown web applications like online book - stores or online banks that can be used to scan for vulnerabilities. In addition, security professionals frequently need to test - tools against a platform known to be vulnerable to ensure that they perform as advertised. All of this needs to happen in a safe - and legal environment. - -

-
-
-

Even if your intentions are good, we believe you should never attempt to find vulnerabilities without - permission. The primary goal of the WebGoat project is simple: create a de-facto interactive teaching environment for web application security. - In the future, the project team hopes to extend WebGoat into becoming a security benchmarking platform and a Java-based Web site Honeypot. -

-
-
-
-
- - -
-
-

More information

-
-
-
-

For more information about running WebGoat / FAQ see our wiki pages. -

-
-
-

Interested in contributing to WebGoat, take a look at our issues.

- -
-
-
-
- - - - - - - - -
- - - -
- - -
-
- - - -
-
-
-

Explain the vulnerability

-
- -

Teaching is now a first class citizen of WebGoat, we explain explain the vulnerability. Instead of 'just hacking' we now focus on explaining from the beginning what for example a SQL injection is. -

- - - Close -
-
-
-
-
- - -
-
- - - -
-
-
-

Learn by doing

-
- -

During the explanation of a vulnerability we build assignments which will help you understand how it works.

- - - Close -
-
-
-
-
- - -
-
- - - -
-
-
-

Explain mitigations

-
- -

At the end of each lesson you will receive an overview of possible mitigations which will help you during your development work.

- - - Close -
-
-
-
-
- - - - - - - - - - - - + +

+ The page been moved to https://owasp.org/www-project-webgoat/ +

+ - \ No newline at end of file + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + \ No newline at end of file