GameOver |
Gameover telah dipecah menjadi dua bagian. Bagian 1 terdiri dari aplikasi web khusus yang dirancang khusus untuk mengajarkan dasar-dasar Keamanan Web. Seciton ini akan mencakup :
- XSS
- CSRF
- RFI & LFI
- BruteForce
- Authentication
- Directory/Path traversal
- Command execution
- SQL injection
Bagian 2 adalah kumpulan aplikasi web yang banyak memiliki bug. Bagian ini menyediakan platform hukum untuk menguji kemampuan web dan mencoba dan mengeksploitasi kerentanan dan mempertajam keterampilan Anda sebelum Anda pentest situs web. Saya sarankan bagi pemula untuk mencoba dan mengeksploitasi aplikasi web. Aplikasi ini menyediakan lingkungan kehidupan nyata dan akan meningkatkan kepercayaan diri anda.
System Requirements :
In order to run the VM image, you need to have a VM Player 4.0.2 or higher.(We have not tested it in lower versions of VM Player). You may allocate 256MB or higher RAM to this instance. In case you do not have a VM Player installed or for some reason you prefer another virtualization software, you may download the .iso and run it in a 'Live' mode.
Getting Started :
In case you have chosen the Live CD, select 'Live' from the grub menu and Enter
Login with the following credentials.
username: root
password: gameover
Once you login, type 'ifconfig' in your GameOver machine command prompt and hit Enter.
This will give you the ip address of the GameOver machine (Server). Now in your client browser enter this IP address and hit Enter. You should be able to access GameOver now.
Credits:
Voyage Linu: GameOver has Voyage Linux as its base OS. Voyage is a minimilistic Linux distribution which is in turn based on Debian. For more information regarding Voyage Linux we encourage you to check out their website: http://linux.voyage.hk/.
Web Applications (section 1):
- Damn Vulneable Web Application: (http://www.dvwa.co.uk/)
- OWASP WebGoat:(https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project)
- Ghost (http://www.gh0s7.net/)
- Mutillidae (http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10)
- Zap-Wave: (http://code.google.com/p/zaproxy/)
Web Applications (section 2):
- Owasp Hacademic Challenges : (https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project)
- Owasp Vicnum: (https://www.owasp.org/index.php/Category:OWASP_Vicnum_Project)
- WackoPicko: (http://www.aldeid.com/wiki/WackoPicko)
- Owasp Insecure Web App: (https://www.owasp.org/index.php/Category:OWASP_Insecure_Web_App_Project)
- BodgeIT: (http://code.google.com/p/bodgeit/)
- PuzzleMall: (https://code.google.com/p/puzzlemall/)
- WAVSEP: (https://code.google.com/p/wavsep/)