Modified License text and format to reflect GPL license. Reformatted most of the code. git-svn-id: http://webgoat.googlecode.com/svn/trunk@60 4033779f-a91e-0410-96ef-6bf7bf53c507
		
			
				
	
	
		
			78 lines
		
	
	
		
			3.6 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			78 lines
		
	
	
		
			3.6 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
<%@ page contentType="text/html; charset=ISO-8859-1" language="java"  
 | 
						|
	errorPage="" %>
 | 
						|
 | 
						|
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
 | 
						|
<html xmlns="http://www.w3.org/1999/xhtml">
 | 
						|
<head>
 | 
						|
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1" />
 | 
						|
<title>WebGoat V5</title>
 | 
						|
<link rel="stylesheet" href="css/webgoat_challenge.css" type="text/css" />
 | 
						|
</head>
 | 
						|
 | 
						|
<body>
 | 
						|
	<div id="wrap_ch">
 | 
						|
		<div id="top_ch"><img src="images/header/header.jpg" width="500" height="86" /></div>
 | 
						|
		<div id="start_ch">
 | 
						|
		  <p>Thank you for using WebGoat!</p>
 | 
						|
		  <p>This program is a demonstration of common web application flaws.  
 | 
						|
		  The exercises are intended to provide hands on experience with application 
 | 
						|
		  penetration testing techniques.</p>
 | 
						|
		  <div id="team_ch">
 | 
						|
		  	<table width="400" border="0" align="center" class="lessonText">
 | 
						|
                <tr>
 | 
						|
                  <td width="50%"><div align="center"><span class="style1_ch">WebGoat Design Team </span></div></td>
 | 
						|
                  <td width="50%"><div align="center"><span class="style1_ch">Lesson Contributers </span></div></td>
 | 
						|
                </tr>
 | 
						|
                <tr>
 | 
						|
                  <td><div align="center" class="style2_ch">Jeff Williams</div></td>
 | 
						|
                  <td><div align="center" class="style2_ch">Aspect Security <br />
 | 
						|
                  (http://www.aspectsecurity.com) </div></td>
 | 
						|
                </tr>
 | 
						|
                <tr>
 | 
						|
                  <td><div align="center" class="style2_ch">Bruce Mayhew</div></td>
 | 
						|
                  <td><div align="center" class="style2_ch">Alex Smolen <br />
 | 
						|
                  (http://www.parasoft.com) </div></td>
 | 
						|
                </tr>
 | 
						|
                <tr>
 | 
						|
                  <td><div align="center" class="style2_ch">Laurence Casey</div></td>
 | 
						|
                  <td><div align="center" class="style2">Rogan Dawes <br />
 | 
						|
                  (http://dawes.za.net/rogan) </div></td>
 | 
						|
                </tr>
 | 
						|
                <tr>
 | 
						|
                  <td><div align="center" class="style2_ch">David Anderson</div></td>
 | 
						|
                  <td><div align="center" class="style2_ch">Chuck Willis<br />
 | 
						|
                  (http://www.securityfoundry.com) </div></td>
 | 
						|
                </tr>
 | 
						|
                <tr>
 | 
						|
                  <td height="18"><div align="center" class="style2_ch">Eric Sheridan</div></td>
 | 
						|
                  <td><div align="center"><span class="style2_ch"></span></div></td>
 | 
						|
                </tr>
 | 
						|
            </table>
 | 
						|
			<form id="form" name="form" method="post" action="attack">
 | 
						|
	    			<div align="center">  
 | 
						|
    			        <input type="submit" name="start" value="Start" />
 | 
						|
	    			</div>
 | 
						|
			</form>
 | 
						|
		  </div>
 | 
						|
	  </div>
 | 
						|
		<div id="warning_ch"> WARNING<br /> 
 | 
						|
	      While running this program your machine will be extremely vulnerable to attack. 
 | 
						|
	      You should disconnect from the Internet while using this program.
 | 
						|
		  <br/>
 | 
						|
		  <br/>
 | 
						|
		  This program is for educational purposes only. 
 | 
						|
		  If you attempt these techniques without authorization, 
 | 
						|
		  you are very likely to get caught.  
 | 
						|
		  If you are caught engaging in unauthorized hacking, 
 | 
						|
		  most companies will fire you. 
 | 
						|
		  Claiming that you were doing security research will 
 | 
						|
		  not work as that is the first thing that all hackers claim.
 | 
						|
	  </div>
 | 
						|
		<div id="bottom_ch">
 | 
						|
			<div align="center"><img src="images/logos/owasp.jpg" alt="OWASP Foundation" width="166" height="29" longdesc="http://www.owasp.org" /><a href="http://www.owasp.org"><br />
 | 
						|
© 2006 Project WebGoat</a></div>
 | 
						|
	  	</div>
 | 
						|
	</div>
 | 
						|
</body>
 | 
						|
</html>
 |