You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This application and exercises will take you through some of the OWASP top 10 Vulnerabilities and how to prevent them.
4
-
5
-
## Up and running
6
-
7
-
1. Install Docker for [MacOS](https://hub.docker.com/editions/community/docker-ce-desktop-mac) or [Windows](https://hub.docker.com/editions/community/docker-ce-desktop-windows). You'll need to create a Docker account if you don't already have one.
8
-
2.`git clone git://github.com/ScaleSec/vulnado`
9
-
3.`cd vulnado`
10
-
4.`docker-compose up`
11
-
5. Open a browser and navigate to the client to make sure it's working: [http://localhost:1337](http://localhost:1337)
12
-
6. Then back in your terminal verify you have connection to your API server: `nc -vz localhost 8080`
13
-
14
-
## Architecture
15
-
16
-
The docker network created by `docker-compose` maps pretty well to a multi-tier architecture where a web server is publicly available and there are other network resources like a database and internal site that are not publicly available.
17
-
18
-

3
+
This application and exercises will take you through some of the OWASP top 10 Vulnerabilities
0 commit comments