|
1 |
| -# Java Vulnerabilities Experiment |
| 1 | +# Java Vulnerabilities Lab |
2 | 2 |
|
3 |
| -This is a "Vulnerable" Web Application developed by Cyber Security and Privacy Foundation(www.cysecurity.org). This app is intended for the Java Programmers and other people who wish to learn about Web application vulnerabilities and write secure code. |
| 3 | +This is a **vulnerable** Web Application developed by [Cyber Security and Privacy Foundation](www.cysecurity.org). |
| 4 | +This app is intended for the Java Developers and other people who wish to learn about Web Application vulnerabilities or simply write secure code because they are concerned about security - and **`everyone should!`**. |
4 | 5 |
|
5 | 6 | ## Prerequisites:
|
6 | 7 |
|
7 |
| -- [git](https://git-scm.com/downloads) |
| 8 | +- [Git](https://git-scm.com/downloads) |
8 | 9 | - with [Docker](https://docs.docker.com/install/), [docker-compose](https://docs.docker.com/compose/install/) and [Vagrant](https://www.vagrantup.com/docs/installation/)
|
9 | 10 | - or [JDK8+](https://openjdk.java.net/install/), [Maven](http://maven.apache.org/install.html) and [tomcat 8](https://tomcat.apache.org/tomcat-8.5-doc/setup.html)
|
10 | 11 |
|
@@ -58,17 +59,17 @@ And the link at next step will require the server hostname or IP address.
|
58 | 59 |
|
59 | 60 | ## Vulnerabilities Scan
|
60 | 61 |
|
61 |
| -The Open Web Application Security Project (OWASP) team recommends many [tools](https://www.owasp.org/index.php/Appendix_A:_Testing_Tools) to address security matters. |
62 |
| -One of the most popular is the OWASP `Zed Attack Proxy` (**ZAP**) tool to scan the vulnerabilities. please refer to [this guideline](docs/owasp-zap.md). |
63 |
| -Also, if you need to automate everything in your Continuous Integration and Continuous Delivery (**CI/CD**) toolchain, you can go through this [this guideline](docs/sonarqube.md). |
| 62 | +The Open Web Application Security Project (OWASP) team recommends many [tools](https://www.owasp.org/index.php/Appendix_A:_Testing_Tools) to address security matters, allowing to scan the vulnerabilities of Web Applications. |
| 63 | +One of the most popular is OWASP `Zed Attack Proxy` (**ZAP**). Please refer to this [guideline](docs/owasp-zap.md) for more details. |
| 64 | +Also, if you need to automate everything in your Continuous Integration and Continuous Delivery (**CI/CD**) toolchain, you can go through this [guideline](docs/sonarqube.md). |
64 | 65 |
|
65 | 66 | ## Notes
|
66 | 67 |
|
67 | 68 | **The full course on Hacking and Securing Web Java Programs is available in**
|
68 | 69 |
|
69 | 70 | https://www.udemy.com/hacking-securing-java-web-programming/
|
70 | 71 |
|
71 |
| -**Warning**: It's not recommanded to run this app in `Your Main Machine` or in an `online server`. Prefer using Docker or a VM (vagrant). |
| 72 | +**Warning**: It's not recommended to run this app in `Your Main Machine` or in an `online server`. Prefer using Docker or a VM (vagrant). |
72 | 73 |
|
73 | 74 | You can also get the VulnerableSpring Project from [here](https://github.com/CSPF-Founder/VulnerableSpring).
|
74 | 75 |
|
0 commit comments