From b07661f256f9488f02fb4f558ad133dd27de7ad0 Mon Sep 17 00:00:00 2001
From: lorenagubaira <102861577+Lorenagubaira@users.noreply.github.com>
Date: Tue, 19 Nov 2024 09:17:41 -0400
Subject: [PATCH 1/9] was added to both readmes
---
README.es.md | 20 ++++++++++----------
README.md | 10 +++++++---
2 files changed, 17 insertions(+), 13 deletions(-)
diff --git a/README.es.md b/README.es.md
index 22f790a..265bebc 100644
--- a/README.es.md
+++ b/README.es.md
@@ -1,3 +1,5 @@
+
+
# OWASP Top 10 Vulnerabilities Exercises
> By [@rosinni](https://github.com/rosinni) and [other contributors](https://github.com/breatheco-de/owasp-top10-exercises/graphs/contributors) at [4Geeks Academy](https://4geeksacademy.co/)
@@ -6,29 +8,26 @@
[![build by developers](https://img.shields.io/badge/build_by-Developers-blue)](https://4geeks.com)
[![build by developers](https://img.shields.io/twitter/follow/4geeksacademy?style=social&logo=twitter)](https://twitter.com/4geeksacademy)
-*These instructions are [available in english](https://github.com/breatheco-de/owasp-top10-exercises/blob/main/README.md)*
+### Antes de empezar...
+
+> ¡Te necesitamos! Estos ejercicios se crean y mantienen en colaboración con personas como tú. Si encuentras algún error o falta de ortografía, contribuye y/o repórtalo.
+
-## 📝 Instrucciones
+*These instructions are [available in english](https://github.com/breatheco-de/owasp-top10-exercises/blob/main/README.md)*
+## 📝 Instrucciones
[OWASP Top 10](https://owasp.org/www-project-top-ten/) es una lista de las vulnerabilidades de seguridad más críticas en aplicaciones web. Cada una de estas vulnerabilidades representa una debilidad que puede ser explotada por atacantes para obtener acceso no autorizado, robar información sensible, o comprometer la integridad de una aplicación.
En esta actividad, utilizaremos la máquina virtual BeeBox, que contiene la aplicación vulnerable bWAPP, para explorar y explotar las vulnerabilidades incluidas en el OWASP Top 10. A través de este ejercicio, ganarás una visión práctica de cómo se pueden explotar las vulnerabilidades del OWASP Top 10.
-
**Objetivos:**
- Identificar puntos vulnerables en bWAPP correspondientes a las categorías del OWASP Top 10.
- Explorar cómo cada vulnerabilidad puede ser explotada para acceder a datos sensibles o comprometer la seguridad de la aplicación.
-
-
-### Antes de empezar...
-
-> ¡Te necesitamos! Estos ejercicios se crean y mantienen en colaboración con personas como tú. Si encuentras algún error o falta de ortografía, contribuye y/o repórtalo.
-
-
+
## 🌱 ¿Cómo empezar este proyecto?
@@ -45,6 +44,7 @@ $ npm i @learnpack/learnpack -g
```bash
$ learnpack start
```
+
diff --git a/README.md b/README.md
index 4d3f196..5ddbbab 100644
--- a/README.md
+++ b/README.md
@@ -1,3 +1,5 @@
+
+
# OWASP Top 10 Vulnerabilities Exercises
> By [@rosinni](https://github.com/rosinni) and [other contributors](https://github.com/breatheco-de/owasp-top10-exercises/graphs/contributors) at [4Geeks Academy](https://4geeksacademy.co/)
@@ -6,9 +8,10 @@
[![build by developers](https://img.shields.io/badge/build_by-Developers-blue)](https://4geeks.com)
[![build by developers](https://img.shields.io/twitter/follow/4geeksacademy?style=social&logo=twitter)](https://twitter.com/4geeksacademy)
-*Estas instrucciones [están disponibles en 🇪🇸 español](https://github.com/breatheco-de/owasp-top10-exercises/blob/main/README.es.md) :es:*
+*Estas instrucciones [están disponibles en 🇪🇸 español](https://github.com/breatheco-de/owasp-top10-exercises/blob/main/README.es.md)*
+
## 📝 Instructions
[OWASP Top 10](https://owasp.org/www-project-top-ten/) is a list of the most critical security vulnerabilities in web applications. Each of these vulnerabilities represents a weakness that can be exploited by attackers to gain unauthorized access, steal sensitive information, or compromise the integrity of an application.
@@ -20,14 +23,14 @@ In this activity, we will use the BeeBox virtual machine, which contains the vul
- Identify vulnerable points in bWAPP corresponding to the OWASP Top 10 categories.
- Explore how each vulnerability can be exploited to access sensitive data or compromise the application's security.
-
-
### Before you start...
> We need you! These exercises are built and maintained in collaboration with contributors like yourself. If you find any bugs or misspellings, please contribute and/or report them.
+
+
## 🌱 How to start a project?
Clone this repository in your debian virtual machine ([how to clone this repository](https://github.com/breatheco-de/owasp-top10-exercises)) and follow the steps below:
@@ -43,6 +46,7 @@ $ npm i @learnpack/learnpack -g
```bash
$ learnpack start
```
+
## Contributors
From 6fe89b5c5426937a2d0bcbef943c83f40e9081ee Mon Sep 17 00:00:00 2001
From: lorenagubaira <102861577+Lorenagubaira@users.noreply.github.com>
Date: Wed, 20 Nov 2024 14:53:40 -0400
Subject: [PATCH 2/9] Update README.es.md
---
README.es.md | 9 +++++----
1 file changed, 5 insertions(+), 4 deletions(-)
diff --git a/README.es.md b/README.es.md
index 265bebc..5b8cdb4 100644
--- a/README.es.md
+++ b/README.es.md
@@ -8,13 +8,14 @@
[![build by developers](https://img.shields.io/badge/build_by-Developers-blue)](https://4geeks.com)
[![build by developers](https://img.shields.io/twitter/follow/4geeksacademy?style=social&logo=twitter)](https://twitter.com/4geeksacademy)
+*These instructions are [available in english](https://github.com/breatheco-de/owasp-top10-exercises/blob/main/README.md)*
+
### Antes de empezar...
> ¡Te necesitamos! Estos ejercicios se crean y mantienen en colaboración con personas como tú. Si encuentras algún error o falta de ortografía, contribuye y/o repórtalo.
-*These instructions are [available in english](https://github.com/breatheco-de/owasp-top10-exercises/blob/main/README.md)*
## 📝 Instrucciones
@@ -27,7 +28,7 @@ En esta actividad, utilizaremos la máquina virtual BeeBox, que contiene la apli
- Identificar puntos vulnerables en bWAPP correspondientes a las categorías del OWASP Top 10.
- Explorar cómo cada vulnerabilidad puede ser explotada para acceder a datos sensibles o comprometer la seguridad de la aplicación.
-
+
## 🌱 ¿Cómo empezar este proyecto?
@@ -44,7 +45,7 @@ $ npm i @learnpack/learnpack -g
```bash
$ learnpack start
```
-
+
@@ -59,4 +60,4 @@ Gracias a estas personas maravillosas ([emoji key](https://github.com/kentcdodds
Este proyecto sigue la especificación [all-contributors](https://github.com/kentcdodds/all-contributors). ¡Todas las contribuciones son bienvenidas!
Este y otros ejercicios son usados para [aprender a programar](https://4geeksacademy.com/es/aprender-a-programar/aprender-a-programar-desde-cero) por parte de los alumnos de 4Geeks Academy [Coding Bootcamp](https://4geeksacademy.com/us/coding-bootcamp) realizado por [Alejandro Sánchez](https://twitter.com/alesanchezr) y muchos otros contribuyentes. Conoce más sobre nuestros [Cursos de Programación](https://4geeksacademy.com/es/curso-de-programacion-desde-cero?lang=es) para convertirte en [Full Stack Developer](https://4geeksacademy.com/es/coding-bootcamps/desarrollador-full-stack/?lang=es), o nuestro [Data Science Bootcamp](https://4geeksacademy.com/es/coding-bootcamps/curso-datascience-machine-learning).Tambien puedes adentrarte al mundo de ciberseguridad con nuestro [Bootcamp de ciberseguridad](https://4geeksacademy.com/es/coding-bootcamps/curso-ciberseguridad).
-
\ No newline at end of file
+
From c70ba7621bc21bbd2dda0dca891c8154db67f120 Mon Sep 17 00:00:00 2001
From: lorenagubaira <102861577+Lorenagubaira@users.noreply.github.com>
Date: Wed, 20 Nov 2024 14:56:22 -0400
Subject: [PATCH 3/9] Update README.md
---
README.md | 11 ++++++-----
1 file changed, 6 insertions(+), 5 deletions(-)
diff --git a/README.md b/README.md
index 5ddbbab..0aa0e30 100644
--- a/README.md
+++ b/README.md
@@ -8,9 +8,10 @@
[![build by developers](https://img.shields.io/badge/build_by-Developers-blue)](https://4geeks.com)
[![build by developers](https://img.shields.io/twitter/follow/4geeksacademy?style=social&logo=twitter)](https://twitter.com/4geeksacademy)
+*Estas instrucciones [están disponibles en 🇪🇸 español](https://github.com/breatheco-de/owasp-top10-exercises/blob/main/README.es.md)*
+
-*Estas instrucciones [están disponibles en 🇪🇸 español](https://github.com/breatheco-de/owasp-top10-exercises/blob/main/README.es.md)*
## 📝 Instructions
@@ -29,8 +30,8 @@ In this activity, we will use the BeeBox virtual machine, which contains the vul
> We need you! These exercises are built and maintained in collaboration with contributors like yourself. If you find any bugs or misspellings, please contribute and/or report them.
-
-
+
+
## 🌱 How to start a project?
Clone this repository in your debian virtual machine ([how to clone this repository](https://github.com/breatheco-de/owasp-top10-exercises)) and follow the steps below:
@@ -46,7 +47,7 @@ $ npm i @learnpack/learnpack -g
```bash
$ learnpack start
```
-
+
## Contributors
@@ -61,4 +62,4 @@ Thanks goes to these wonderful people ([emoji key](https://github.com/kentcdodds
This project follows the [all-contributors](https://github.com/kentcdodds/all-contributors) specification. Contributions of any kind are welcome!
This and many other exercises are built by students as part of the 4Geeks Academy [Coding Bootcamp](https://4geeksacademy.com/us/coding-bootcamp) by [Alejandro Sánchez](https://twitter.com/alesanchezr) and many other contributors. Find out more about our [Full Stack Developer Course](https://4geeksacademy.com/us/coding-bootcamps/part-time-full-stack-developer), and [Data Science Bootcamp](https://4geeksacademy.com/us/coding-bootcamps/datascience-machine-learning).You can alse deepdive in the world of cybersecurity with our [Cybersecurity Bootcamp](https://4geeksacademy.com/us/coding-bootcamps/cybersecurity)
-
\ No newline at end of file
+
From f5323be7895c9cb43b5a9ef8874a8d022c2ec135 Mon Sep 17 00:00:00 2001
From: lorenagubaira <102861577+Lorenagubaira@users.noreply.github.com>
Date: Wed, 20 Nov 2024 14:57:24 -0400
Subject: [PATCH 4/9] Update README.md
---
README.md | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/README.md b/README.md
index 0aa0e30..be5a03d 100644
--- a/README.md
+++ b/README.md
@@ -10,6 +10,9 @@
*Estas instrucciones [están disponibles en 🇪🇸 español](https://github.com/breatheco-de/owasp-top10-exercises/blob/main/README.es.md)*
+### Before you start...
+
+> We need you! These exercises are built and maintained in collaboration with contributors like yourself. If you find any bugs or misspellings, please contribute and/or report them.
@@ -25,9 +28,6 @@ In this activity, we will use the BeeBox virtual machine, which contains the vul
- Explore how each vulnerability can be exploited to access sensitive data or compromise the application's security.
-### Before you start...
-
-> We need you! These exercises are built and maintained in collaboration with contributors like yourself. If you find any bugs or misspellings, please contribute and/or report them.
From e645534e91036de02504d1bab4ad8cc933747315 Mon Sep 17 00:00:00 2001
From: lorenagubaira <102861577+Lorenagubaira@users.noreply.github.com>
Date: Fri, 22 Nov 2024 07:27:20 -0400
Subject: [PATCH 5/9] Update README.es.md
---
README.es.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/README.es.md b/README.es.md
index 5b8cdb4..75e5785 100644
--- a/README.es.md
+++ b/README.es.md
@@ -28,7 +28,7 @@ En esta actividad, utilizaremos la máquina virtual BeeBox, que contiene la apli
- Identificar puntos vulnerables en bWAPP correspondientes a las categorías del OWASP Top 10.
- Explorar cómo cada vulnerabilidad puede ser explotada para acceder a datos sensibles o comprometer la seguridad de la aplicación.
-
+
## 🌱 ¿Cómo empezar este proyecto?
From 0eb5fa2e6e6e6b2de65b9ba8b1e067f85b2203f9 Mon Sep 17 00:00:00 2001
From: lorenagubaira <102861577+Lorenagubaira@users.noreply.github.com>
Date: Fri, 22 Nov 2024 07:27:50 -0400
Subject: [PATCH 6/9] Update README.md
---
README.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/README.md b/README.md
index be5a03d..8ae5320 100644
--- a/README.md
+++ b/README.md
@@ -30,7 +30,7 @@ In this activity, we will use the BeeBox virtual machine, which contains the vul
-
+
## 🌱 How to start a project?
From c9df737cdec40878dbfdb142619a38beb2816e54 Mon Sep 17 00:00:00 2001
From: lorenagubaira <102861577+Lorenagubaira@users.noreply.github.com>
Date: Tue, 26 Nov 2024 21:24:05 -0400
Subject: [PATCH 7/9] Update README.es.md
---
README.es.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/README.es.md b/README.es.md
index 75e5785..ac4ce4c 100644
--- a/README.es.md
+++ b/README.es.md
@@ -28,7 +28,7 @@ En esta actividad, utilizaremos la máquina virtual BeeBox, que contiene la apli
- Identificar puntos vulnerables en bWAPP correspondientes a las categorías del OWASP Top 10.
- Explorar cómo cada vulnerabilidad puede ser explotada para acceder a datos sensibles o comprometer la seguridad de la aplicación.
-
+
## 🌱 ¿Cómo empezar este proyecto?
From 52ced70c8bc86c01444957122152d7e5c4eed6e2 Mon Sep 17 00:00:00 2001
From: lorenagubaira <102861577+Lorenagubaira@users.noreply.github.com>
Date: Tue, 26 Nov 2024 21:24:32 -0400
Subject: [PATCH 8/9] Update README.md
---
README.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/README.md b/README.md
index 8ae5320..2c2de9a 100644
--- a/README.md
+++ b/README.md
@@ -30,7 +30,7 @@ In this activity, we will use the BeeBox virtual machine, which contains the vul
-
+
## 🌱 How to start a project?
From 856544e6e05a51078a7df44ce41db6a432d0979b Mon Sep 17 00:00:00 2001
From: lorenagubaira <102861577+Lorenagubaira@users.noreply.github.com>
Date: Wed, 11 Dec 2024 19:32:32 -0400
Subject: [PATCH 9/9] Update learn.json
---
learn.json | 3 +++
1 file changed, 3 insertions(+)
diff --git a/learn.json b/learn.json
index 5410222..26fdc30 100644
--- a/learn.json
+++ b/learn.json
@@ -2,6 +2,9 @@
"grading": "isolated",
"difficulty": "intermediate",
"duration": 4,
+ "template_url": "self",
+ "projectType": "tutorial",
+ "autoPlay": "true",
"technologies": ["cybersecurity", "pentesting", "red team", "ciberseguridad", "owasp", "owasp top 10"],
"preview": "https://github.com/breatheco-de/owasp-top10-exercises/blob/main/oswap-top-10.png?raw=true",
"description": {