Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

<onlyfor> was added to both readmes #1

Open
wants to merge 9 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
21 changes: 11 additions & 10 deletions README.es.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,5 @@
<!-- hide -->

# OWASP Top 10 Vulnerabilities Exercises

> By [@rosinni](https://github.com/rosinni) and [other contributors](https://github.com/breatheco-de/owasp-top10-exercises/graphs/contributors) at [4Geeks Academy](https://4geeksacademy.co/)
Expand All @@ -7,28 +9,26 @@
[![build by developers](https://img.shields.io/twitter/follow/4geeksacademy?style=social&logo=twitter)](https://twitter.com/4geeksacademy)

*These instructions are [available in english](https://github.com/breatheco-de/owasp-top10-exercises/blob/main/README.md)*

### Antes de empezar...

> ¡Te necesitamos! Estos ejercicios se crean y mantienen en colaboración con personas como tú. Si encuentras algún error o falta de ortografía, contribuye y/o repórtalo.

<!-- endhide -->

## 📝 Instrucciones

## 📝 Instrucciones

[OWASP Top 10](https://owasp.org/www-project-top-ten/) es una lista de las vulnerabilidades de seguridad más críticas en aplicaciones web. Cada una de estas vulnerabilidades representa una debilidad que puede ser explotada por atacantes para obtener acceso no autorizado, robar información sensible, o comprometer la integridad de una aplicación.

En esta actividad, utilizaremos la máquina virtual BeeBox, que contiene la aplicación vulnerable bWAPP, para explorar y explotar las vulnerabilidades incluidas en el OWASP Top 10. A través de este ejercicio, ganarás una visión práctica de cómo se pueden explotar las vulnerabilidades del OWASP Top 10.


**Objetivos:**

- Identificar puntos vulnerables en bWAPP correspondientes a las categorías del OWASP Top 10.
- Explorar cómo cada vulnerabilidad puede ser explotada para acceder a datos sensibles o comprometer la seguridad de la aplicación.



### Antes de empezar...

> ¡Te necesitamos! Estos ejercicios se crean y mantienen en colaboración con personas como tú. Si encuentras algún error o falta de ortografía, contribuye y/o repórtalo.

<!-- endhide -->
<onlyfor saas="false" withBanner="false">

## 🌱 ¿Cómo empezar este proyecto?

Expand All @@ -45,6 +45,7 @@ $ npm i @learnpack/learnpack -g
```bash
$ learnpack start
```
</onlyfor>

<!-- hide -->

Expand All @@ -59,4 +60,4 @@ Gracias a estas personas maravillosas ([emoji key](https://github.com/kentcdodds
Este proyecto sigue la especificación [all-contributors](https://github.com/kentcdodds/all-contributors). ¡Todas las contribuciones son bienvenidas!

Este y otros ejercicios son usados para [aprender a programar](https://4geeksacademy.com/es/aprender-a-programar/aprender-a-programar-desde-cero) por parte de los alumnos de 4Geeks Academy [Coding Bootcamp](https://4geeksacademy.com/us/coding-bootcamp) realizado por [Alejandro Sánchez](https://twitter.com/alesanchezr) y muchos otros contribuyentes. Conoce más sobre nuestros [Cursos de Programación](https://4geeksacademy.com/es/curso-de-programacion-desde-cero?lang=es) para convertirte en [Full Stack Developer](https://4geeksacademy.com/es/coding-bootcamps/desarrollador-full-stack/?lang=es), o nuestro [Data Science Bootcamp](https://4geeksacademy.com/es/coding-bootcamps/curso-datascience-machine-learning).Tambien puedes adentrarte al mundo de ciberseguridad con nuestro [Bootcamp de ciberseguridad](https://4geeksacademy.com/es/coding-bootcamps/curso-ciberseguridad).
<!-- endhide -->
<!-- endhide -->
19 changes: 12 additions & 7 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,5 @@
<!-- hide -->

# OWASP Top 10 Vulnerabilities Exercises

> By [@rosinni](https://github.com/rosinni) and [other contributors](https://github.com/breatheco-de/owasp-top10-exercises/graphs/contributors) at [4Geeks Academy](https://4geeksacademy.co/)
Expand All @@ -6,9 +8,14 @@
[![build by developers](https://img.shields.io/badge/build_by-Developers-blue)](https://4geeks.com)
[![build by developers](https://img.shields.io/twitter/follow/4geeksacademy?style=social&logo=twitter)](https://twitter.com/4geeksacademy)

*Estas instrucciones [están disponibles en 🇪🇸 español](https://github.com/breatheco-de/owasp-top10-exercises/blob/main/README.es.md) :es:*
*Estas instrucciones [están disponibles en 🇪🇸 español](https://github.com/breatheco-de/owasp-top10-exercises/blob/main/README.es.md)*

### Before you start...

> We need you! These exercises are built and maintained in collaboration with contributors like yourself. If you find any bugs or misspellings, please contribute and/or report them.
<!-- endhide -->


## 📝 Instructions

[OWASP Top 10](https://owasp.org/www-project-top-ten/) is a list of the most critical security vulnerabilities in web applications. Each of these vulnerabilities represents a weakness that can be exploited by attackers to gain unauthorized access, steal sensitive information, or compromise the integrity of an application.
Expand All @@ -20,14 +27,11 @@ In this activity, we will use the BeeBox virtual machine, which contains the vul
- Identify vulnerable points in bWAPP corresponding to the OWASP Top 10 categories.
- Explore how each vulnerability can be exploited to access sensitive data or compromise the application's security.



<!-- hide -->
### Before you start...

> We need you! These exercises are built and maintained in collaboration with contributors like yourself. If you find any bugs or misspellings, please contribute and/or report them.
<!-- endhide -->

<onlyfor saas="false" withBanner="false">

## 🌱 How to start a project?

Clone this repository in your debian virtual machine ([how to clone this repository](https://github.com/breatheco-de/owasp-top10-exercises)) and follow the steps below:
Expand All @@ -43,6 +47,7 @@ $ npm i @learnpack/learnpack -g
```bash
$ learnpack start
```
</onlyfor>

<!-- hide -->
## Contributors
Expand All @@ -57,4 +62,4 @@ Thanks goes to these wonderful people ([emoji key](https://github.com/kentcdodds
This project follows the [all-contributors](https://github.com/kentcdodds/all-contributors) specification. Contributions of any kind are welcome!

This and many other exercises are built by students as part of the 4Geeks Academy [Coding Bootcamp](https://4geeksacademy.com/us/coding-bootcamp) by [Alejandro Sánchez](https://twitter.com/alesanchezr) and many other contributors. Find out more about our [Full Stack Developer Course](https://4geeksacademy.com/us/coding-bootcamps/part-time-full-stack-developer), and [Data Science Bootcamp](https://4geeksacademy.com/us/coding-bootcamps/datascience-machine-learning).You can alse deepdive in the world of cybersecurity with our [Cybersecurity Bootcamp](https://4geeksacademy.com/us/coding-bootcamps/cybersecurity)
<!-- endhide -->
<!-- endhide -->
3 changes: 3 additions & 0 deletions learn.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,9 @@
"grading": "isolated",
"difficulty": "intermediate",
"duration": 4,
"template_url": "self",
"projectType": "tutorial",
"autoPlay": "true",
"technologies": ["cybersecurity", "pentesting", "red team", "ciberseguridad", "owasp", "owasp top 10"],
"preview": "https://github.com/breatheco-de/owasp-top10-exercises/blob/main/oswap-top-10.png?raw=true",
"description": {
Expand Down