Difference between revisions of "Set up bWAPP for MacOS (M1 Chip)"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
(Created page with "== Summary == bWAPP (Buggy Web Application) is an intentionally insecure web application designed for educational and training purposes. It was created to provide security professionals, developers, and students with practical experience in the field of web application security. bWAPP contains a variety of security vulnerabilities and weaknesses, allowing users to practice and understand various attack techniques. == Requirements == * Operating system: KaliLinux or B...")
 
Line 1: Line 1:
== Summary ==  
== Summary ==  


bWAPP (Buggy Web Application) is an intentionally insecure web application designed for educational and training purposes. It was created to provide security professionals, developers, and students with practical experience in the field of web application security. bWAPP contains a variety of security vulnerabilities and weaknesses, allowing users to practice and understand various attack techniques.
bWAPP (Buggy Web Application) is an intentionally insecure web application designed for educational and training purposes. It was created to provide security professionals, developers, and students with practical experience in the field of web application security. bWAPP contains a variety of security vulnerabilities and weaknesses from the TOP 10 OWASP, allowing users to practice and understand the most critical web application security risks.


== Requirements ==
== Requirements ==

Revision as of 14:05, 20 December 2023

Summary

bWAPP (Buggy Web Application) is an intentionally insecure web application designed for educational and training purposes. It was created to provide security professionals, developers, and students with practical experience in the field of web application security. bWAPP contains a variety of security vulnerabilities and weaknesses from the TOP 10 OWASP, allowing users to practice and understand the most critical web application security risks.

Requirements

  • Operating system: KaliLinux or BeeBox VM

In order to complete these steps, you must have followed Some Other Documentation before.

Description

Step 1

Enter these commands in the shell

echo foo
echo bar

Step 2

Make sure to read

  • War and Peace
  • Lord of the Rings
  • The Baroque Cycle

Used Hardware

Device to be used with this documentation Maybe another device to be used with this documentation

Courses

References