<%@ page contentType="text/html; charset=ISO-8859-1" language="java" errorPage="" %> <%@page import="org.owasp.webgoat.session.WebSession"%> <% WebSession webSession = ((WebSession)session.getAttribute("websession")); %> WebGoat V5

Thank you for using WebGoat!

This program is a demonstration of common web application flaws. The exercises are intended to provide hands on experience with application penetration testing techniques. The WebGoat project is lead by Bruce Mayhew. Please send all comments to Bruce at <%= webSession.getWebgoatContext().getFeedbackAddress() %>.

OWASP Foundation
Aspect Security

WebGoat Design Team

Lesson Contributers
Bruce Mayhew
Laurence Casey
David Anderson
Eric Sheridan
Rogan Dawes
Aspect Security
Sherif Koussa
Alex Smolen
Chuck Willis
Special Thanks for V5
Documentation Contributers
OWASP Autumn of Code
(http://www.owasp.org/)
Sherif Koussa
(http://www.macadamian.com)
OWASP Spring of Code
(http://www.owasp.org/)
Erwin Geirnaert
(http://www.zionsecurity.com)
Sherif Koussa
(http://www.macadamian.com)
Robert Sullivan
(http://www.unitedhealthgroup.com/)
Erwin Geirnaert
(http://www.zionsecurity.com/)
To all who have sent comments
 
 
 
 
WARNING
While running this program, your machine is extremely vulnerable to attack. You should disconnect from the network while using this program.

This program is for educational purposes only. Use of these techniques without permission could lead to job termination, financial liability, and/or criminal penalties.