Vulnado – Intentionally Vulnerable Java Application

Vulnado is a purposely vulnerable Java application to help lead secure coding workshops. Vulnado application and exercises will take you through some of the OWASP top 10 Vulnerabilities and how to prevent them.

Up & Running

  • Install Docker for MacOS or Windows. You’ll need to create a Docker account if you don’t already have one.
  • git clone git://github.com/ScaleSec/vulnado
  • cd vulnado
  • docker-compose up
  • Open a browser and navigate to the client to make sure it’s working: http://localhost:1337
  • Then back in your terminal verify you have connection to your API server: nc -vz localhost 8080

Also Read – HiddenEye : Modern Phishing Tool With Advanced Functionality

Architecture

The docker network created by docker-compose maps pretty well to a multi-tier architecture where a web server is publicly available and there are other network resources like a database and internal site that are not publicly available.

Exercises

R K

Recent Posts

The Evolution of Cloud Technology: Where We Started and Where We’re Headed

Image credit:pexels.com If you think back to the early days of personal computing, you probably…

2 days ago

The Evolution of Online Finance Tools In a Tech-Driven World

In an era defined by technological innovation, the way people handle and understand money has…

2 days ago

A Complete Guide to Lenso.ai and Its Reverse Image Search Capabilities

The online world becomes more visually driven with every passing year. Images spread across websites,…

3 days ago

How Web Application Firewalls (WAFs) Work

General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…

1 month ago

How to Send POST Requests Using curl in Linux

How to Send POST Requests Using curl in Linux If you work with APIs, servers,…

1 month ago

What Does chmod 777 Mean in Linux

If you are a Linux user, you have probably seen commands like chmod 777 while…

1 month ago