update NOWASP Mutillidae II v-2.6.8 : Web Pen-Test Practice Application

Change Log for OWASP Mutillidae II 2.6.8:

  • Created new menu with entires for OWASP Top Ten 2013, 2010 and 2007

Change Log for OWASP Mutillidae II 2.6.7:

  • Aligned XML web service with RESTful web service so user can call them the same way. Rewrote the service to use less code, renamed the methods and WSDL, and made logic more simple.
  • Renamed XML web service from lookupAccount to ws-user-account
  • Created new method CreateUser() in XML web service ws-user-account
  • Created new method UpdateUser() in XML web service ws-user-account
  • Created new method DeleteUser() in XML web service ws-user-account
  • Created new method in custom error handler class FormatErrorXML()
  • Added custom XML error handling to the ws-user-account Soap web service
  • Updated listing of vulnerabilities
  • Added a link to the project whitepaper to the side menu, documentation folder, and the instructions
  • Added add blog page to SQLi – Insert Injection menu
  • Added add blog page to Method Tampering (GET for POST) menu
  • Created new vulnerability: application log injection
  • Added add blog page to Application Log Injection menu
  • Added browser info page to reflected XSS menu
  • Added browser info page to HTMLi menu
  • Fixed bug with auto-help hints. Capture data is vulnerable to SQLi; not captured-data page
  • Added new page: back-button-discussion.php
  • Added more information to the unvalidated-redirects-and-forwards hints
  • Refactored some code in DNS lookup CMDi page
  • Added method tampering hint to DNS lookup CMDi page
  • Added DNS lookup CMDi page to Application Log Injection menu
  • Added document-viewer.php page to method tampering
  • Added DNS lookup CMDi page to Javascript Validation Bypass menu
  • Added method tampering and JS validation hints to DNS lookup CMDi page
  • Renamed JavaScript security menu to JavaScript Validation Bypass
  • Added document viewer page to Application Log Injection menu
  • BUG FIX: Erased an old-style hint from document viewer page. Was missed when new hint system installed.
  • BUG FIX: Erased duplicate vulnerability listing for xml-validator.php
  • Added login page to Application Log Injection menu
  • Added new hint to the hints system: application-log-injection
  • Added capture data page to Application Log Injection menu
  • Added registration page to Application Log Injection menu
  • Added repeater page to Javascript Validation Bypass menu
  • BUG FIX: Added missing page to vunerabilities listing
  • BUG FIX: Removed unneeded variables from upload.php page

OWASP Mutillidae II is a free, open source, deliberately vulnerable web-application providing a target for web-security enthusiest. Mutillidae can be installed on Linux and Windows using LAMP, WAMP, and XAMMP for users who do not want to administrate a webserver. It is pre-installed on SamuraiWTF, Rapid7 Metasploitable-2, and OWASP BWA. The existing version can be updated on pre-installed platforms. With dozens of vulns and hints to help the user; this is an easy-to-use web hacking environment designed for labs, security enthusiast, classrooms, CTF, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, corporate web sec training courses, and as an “assess the assessor” target for vulnerability assessment software.

nowasp1
Features

  • Has over 35 vulnerablities and challenges. Contains at least one vulnearbility for each of the OWASP Top Ten 2007 and 2010
  • Actually Vulnerable (User not asked to enter “magic” statement)
  • Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. Mutillidae is confirmed to work on XAMPP, WAMP, and LAMP. XAMPP is the “default” deployment.
  • Installs easily by dropping project files into the “htdocs” folder of XAMPP.
  • Will attempt to detect if the MySQL database is available for the user
  • Preinstalled on Rapid7 Metasploitable 2, Samurai Web Testing Framework (WTF), and OWASP Broken Web Apps (BWA)
  • Contains 2 levels of hints to help users get started
  • Includes bubble-hints to help point out vulnerable locations
  • Bubble-hints automatically give more information as hint level incremented
  • System can be restored to default with single-click of “Setup” button
  • User can switch between secure and insecure modes
  • Secure and insecure source code for each page stored in the same PHP file for easy comparison
  • Provides data capture page and stores captured data in database and file
  • Allows SSL to be enforced in order to practice SSL stripping
  • Used in graduate security courses, in corporate web sec training courses, and as an “assess the assessor” target for vulnerability software
  • Mutillidae has been tested/attacked with Cenzic Hailstorm ARC, W3AF, SQLMAP, Samurai WTF, Backtrack, HP Web Inspect, Burp-Suite, NetSparker Community Edition, and other tools

Mutillidae: Quickstart guide to installing NOWASP Mutillidae on Windows with XAMPP

NOWASP Mutillidae: How to remove PHP errors after installing Mutillidae on Windows XAMP

Download : LATEST-mutillidae-2.6.8.zip (23.7 MB) 
Find Other Version |
sources : NOWASP (Mutillidae)
Our post before : http://seclist.us/update-nowasp-mutillidae-v-2-5-5-web-pen-test-practice-application.html