<h1>Web Security Dojo</h1>
<p>An open source self-contained training environment for Web Application Security penetration testing. <br />
Tools + Targets = Dojo</p>
<h3>What?</h3>
<p>Various web application security testing tools and vulnerable web applications were added to a clean install of xubuntu 16.04. Build scripts are available in git at Sourceforge.</p>
<h3>Why?</h3>
<p>For learning and practicing web app security testing techniques. It does not need a network connection since it contains both tools and targets. Therefore, it is ideal for self-study, training classes, and conferences. Also, this removes the possibility of remote attack on the targets, which are insecure by design.</p>
<h3>Where?</h3>
<p>See <a href="http://dojo.mavensecurity.com">http://dojo.mavensecurity.com</a> for more details and updates.</p>
<h3>Who?</h3>
<p>Sponsored by Maven Security Consulting. Open source, so contributions, suggestions, and collaboration is welcome.</p>
<h1>Credits</h1>
<p>Thanks go out to:</p>
<p><a href="http://www.ubuntu.com">Ubuntu</a> for making a really nice Linux <br />
Splash screen and desktop background based on <a href="http://commons.wikimedia.org/wiki/File:Kendoka,_Torino.jpg">work</a> by Flickr.com user “Lucio”<br />
<a href="http://www.owasp.org"><span class="caps">OWASP</span></a> for various tools and information, and leading the industry as an educational institution.<br />
PortSwigger for <a href="http://www.portswigger.net/suite/">Burp Suite</a>. Redistributed with permission <br />
ethicalhack3r for <a href="https://sourceforge.net/projects/dvwa/"><span class="caps">DVWA</span></a> <br />
Foundstone for <a href="https://sourceforge.net/scm/?type=cvs&group_id=143089">Hacme Casino</a> <br />
lcamtuf for <a href="http://code.google.com/p/ratproxy/">Ratproxy</a><br />
Bernardo Damele A. G. and Daniele Bellucci for <a href="http://sqlmap.sourceforge.net/">sqlmap</a><br />
Matthias Rohr for <a href="http://www.owasp.org/index.php/Category:OWASP_Skavenger_Project">Skavenger</a><br />
Chris Sullo for <a href="http://code.google.com/p/davtest/">Davtest</a><br />
Bruce Leban, Mugdha Bendre, and Parisa Tabriz for <a href="http://google-gruyere.appspot.com/">Gruyere</a><br />
Lawrence Angrave for <a href="http://www.owasp.org/index.php/Category:OWASP_Insecure_Web_App_Project">insecure web app</a><br />
Ian de Villiers for <a href="http://www.sensepost.com/labs/tools/pentest/j-baah">J-Baah</a><br />
Yiannis Pavlosoglou and Nathan Sportsman for <a href="http://www.owasp.org/index.php/Category:OWASP_JBroFuzz#tab=Project_Details">jbrofuzz</a><br />
HD Moore and the metasploit team for <a href="http://www.metasploit.com/">metasploit</a><br />
Fortify Software, Inc for “<span class="caps">RATS</span>”: https://www.fortify.com/ssa-elements/threat-intelligence/rats.html<br />
lcamtuf for <a href="http://code.google.com/p/skipfish/">skipfish</a><br />
Andres Riancho and the <a href="http://w3af.sourceforge.net/">w3af project</a> for w3af and the w3af test environment<br />
Bruce Mayhew and the webgoat team for <a href="http://www.owasp.org/index.php/Category:OWASP_WebGoat_Project">webgoat</a><br />
<span class="caps">GNUCITIZEN</span> for <a href="http://www.websecurify.com">websecurify</a><br />
Tasos Zapotek Laskos for "Arachni:http://zapotek.github.com/arachni/<br />
Psiinon and the <span class="caps">ZAP</span> team for <a href="https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project"><span class="caps">OWASP</span> Zed Attack Proxy</a><br />
Andreas Schmidt for <a href="http://sourceforge.net/apps/mediawiki/watobo/index.php"><span class="caps">WATOBO</span></a><br />
Shay Chen for <a href="http://code.google.com/p/wavsep/"><span class="caps">WAVSEP</span></a><br />
BeEF developers for <a href="http://beefproject.com/">BeEF</a><br />
Many other open source/free software developers who have created great foundational tools</p>