Skip to content

Commit 7d11bf2

Browse files
committed
add rest of logos that are available
1 parent 1713ada commit 7d11bf2

File tree

15 files changed

+76
-2
lines changed

15 files changed

+76
-2
lines changed
60.7 KB
Loading

assets/images/logos/crs.png

55.7 KB
Loading
304 KB
Loading
9.25 KB
Loading
54.1 KB
Loading

assets/images/logos/webgoat.png

87.9 KB
Loading

assets/images/logos/webwolf.png

6.67 KB
Loading
92.9 KB
Loading

draft/09-training-education/01-vulnerable-apps/02-webgoat.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,18 @@ permalink: /draft/training_education/vulnerable_applications/webgoat/
1212

1313
{% include breadcrumb.html %}
1414

15+
<style type="text/css">
16+
.image-right {
17+
height: 180px;
18+
display: block;
19+
margin-left: auto;
20+
margin-right: auto;
21+
float: right;
22+
}
23+
</style>
24+
25+
![WebGoat logo](../../../../assets/images/logos/webgoat.png "OWASP WebGoat"){: .image-right }
26+
1527
### 7.1.2 WebGoat
1628

1729
The OWASP [WebGoat][webgoat] project is a deliberately insecure web application that can be
@@ -72,6 +84,8 @@ The browser should now be displaying the WebGoat lessons, such as 'Hijack a sess
7284

7385
#### How to use WebWolf
7486

87+
![WebWolf logo](../../../../assets/images/logos/webwolf.png "OWASP WebWolf"){: .image-right }
88+
7589
WebWolf is provided alongside both the WebGoat docker images and the WebGoat JAR file.
7690
WebWolf is accessed using port 9090 on the Docker container,
7791
and this can usually be mapped to localhost port 9090 as in the example given above.

draft/09-training-education/04-samurai-wtf.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,18 @@ permalink: /draft/training_education/samurai_wtf/
1212

1313
{% include breadcrumb.html %}
1414

15+
<style type="text/css">
16+
.image-right {
17+
height: 180px;
18+
display: block;
19+
margin-left: auto;
20+
margin-right: auto;
21+
float: right;
22+
}
23+
</style>
24+
25+
![SamuraiWTF logo](../../../assets/images/logos/samurai_wtf.png "OWASP SamuraiWTF"){: .image-right }
26+
1527
### 7.4 SamuraiWTF
1628

1729
The OWASP [SamuraiWTF][samurai-wtf] (Web Training and Testing Framework) is a linux desktop distribution
@@ -42,7 +54,7 @@ SamuraiWTF is easy to use and comes as a virtual machine, which makes it ideal i
4254
or as an attack tool targeted specifically against web applications.
4355
The applications provided by Samurai-Dojo provides a set of real world applications to attack;
4456
these applications are contained within the Samurai Web Training Framework virtual machine so none of the
45-
attack traffic will leak from the environment - and avoids triggering network intrusion detection systems.
57+
attack traffic will leak from the environment - and so avoid triggering network intrusion detection systems.
4658

4759
#### How to use it
4860

0 commit comments

Comments
 (0)