Convert Figma logo to code with AI

rapid7 logohackazon

A modern vulnerable web app

1,002
365
1,002
15

Top Related Projects

11,593

Damn Vulnerable Web Application (DVWA)

8,485

WebGoat is a deliberately insecure application

1,742

XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security.

Quick Overview

Hackazon is a free, vulnerable test site that is an e-commerce application built with modern technologies. It's designed to be an intentionally vulnerable web application, serving as a platform for security professionals and enthusiasts to practice and improve their web application security testing skills.

Pros

  • Provides a realistic, modern e-commerce application for security testing
  • Includes a wide range of vulnerabilities and security flaws for comprehensive learning
  • Regularly updated to reflect current web technologies and security challenges
  • Offers a safe environment for practicing ethical hacking techniques

Cons

  • May require significant system resources to run locally
  • Some vulnerabilities might be too obvious or unrealistic for real-world scenarios
  • Limited documentation for some features and setup processes
  • Potential for misuse if not properly secured in a controlled environment

Getting Started

To set up Hackazon locally:

  1. Clone the repository:

    git clone https://github.com/rapid7/hackazon.git
    
  2. Install dependencies (assuming you have Docker installed):

    cd hackazon
    docker-compose up -d
    
  3. Access the application: Open your web browser and navigate to http://localhost:8080

  4. Start exploring and testing the various vulnerabilities within the application.

Note: Ensure you're running Hackazon in a controlled, isolated environment to prevent any unintended security risks.

Competitor Comparisons

11,593

Damn Vulnerable Web Application (DVWA)

Pros of DVWA

  • Simpler setup and easier to get started with for beginners
  • More focused on specific web application vulnerabilities
  • Better documentation and explanations for each vulnerability

Cons of DVWA

  • Less realistic compared to modern web applications
  • Limited in scope and functionality
  • Outdated technology stack (PHP-based)

Code Comparison

DVWA (SQL Injection example):

$id = $_GET['id'];
$query = "SELECT first_name, last_name FROM users WHERE user_id = '$id';";
$result = mysqli_query($GLOBALS["___mysqli_ston"], $query) or die('<pre>' . mysqli_error($GLOBALS["___mysqli_ston"]) . '</pre>' );

Hackazon (SQL Injection example):

$sql = "SELECT * FROM products WHERE id = :id";
$stmt = $this->pixie->db->prepare($sql);
$stmt->execute(['id' => $id]);
$product = $stmt->fetch();

The DVWA code demonstrates a vulnerable SQL query, while Hackazon uses prepared statements to prevent SQL injection. This reflects the different purposes of the two projects: DVWA intentionally includes vulnerabilities for learning, while Hackazon aims to be more secure and realistic.

8,485

WebGoat is a deliberately insecure application

Pros of WebGoat

  • More comprehensive, covering a wider range of web application security vulnerabilities
  • Better documentation and learning resources, including detailed lessons and explanations
  • Larger and more active community, leading to frequent updates and improvements

Cons of WebGoat

  • Steeper learning curve, potentially overwhelming for beginners
  • Less realistic representation of a modern web application compared to Hackazon
  • Primarily focused on Java-based vulnerabilities, which may not be as relevant for all learners

Code Comparison

WebGoat (Java):

@GetMapping("/access-control/{action}")
public @ResponseBody AttackResult completed(@PathVariable String action) {
    User user = userSessionService.getUser();
    if (user.isAdmin()) {
        return success(this).build();
    }
    return failed(this).feedback("access-control.unauthorized").build();
}

Hackazon (PHP):

public function checkAccess()
{
    if (!$this->pixie->auth->user()) {
        $this->redirect('/user/login');
    }
    if (!$this->pixie->auth->user()->hasRole('admin')) {
        $this->redirect('/');
    }
}

Both examples demonstrate access control checks, but WebGoat's implementation is more focused on teaching specific vulnerabilities, while Hackazon's code is more representative of real-world applications.

1,742

XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security.

Pros of xvwa

  • Simpler setup and installation process
  • Focuses specifically on XML-based vulnerabilities
  • Includes detailed explanations of each vulnerability

Cons of xvwa

  • Less comprehensive in terms of overall web application vulnerabilities
  • Not actively maintained (last update in 2017)
  • Limited documentation and community support

Code Comparison

xvwa (PHP):

<?php
$xml = simplexml_load_string($_POST['xml']);
echo $xml->name;
?>

Hackazon (PHP):

<?php
$product = new Product();
$product->name = $request->post('name');
$product->save();
?>

The xvwa code snippet demonstrates a simple XML parsing vulnerability, while the Hackazon example shows a more realistic product creation scenario. Hackazon's code is generally more complex and representative of real-world applications, making it better for comprehensive security testing.

Both projects serve as vulnerable web applications for security testing, but Hackazon offers a more extensive and realistic environment. xvwa is more focused on XML vulnerabilities and may be easier to set up for specific testing scenarios. However, Hackazon provides a broader range of vulnerabilities and is actively maintained, making it a more suitable choice for comprehensive security training and testing.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README

Hackazon

Hackazon is a free, vulnerable test site that is an online storefront built with the same technologies used in today’s rich client and mobile applications. Hackazon has an AJAX interface, strict workflows and RESTful API’s used by a companion mobile app providing uniquely-effective training and testing ground for IT security professionals. And, it’s full of your favorite vulnerabilities like SQL Injection, cross-site scripting and so on.

Today’s web and mobile applications as well as web services have a host of new technologies that are not being adequately tested for security vulnerabilities. It is critical for IT security professionals to have a vulnerable web application to use for testing the effectiveness of their tools and for honing their skills.

Hackazon enables users to configure each area of the application in order to change the vulnerability landscape to prevent “known vuln testing” or any other form of ‘cheating.’ Since the application includes RESTful interfaces that power AJAX functionality and mobile clients (JSON, XML, GwT, and AMF), users will need to the latest application security testing tools and techniques to discover all the vulnerabilities. Hackazon also requires detailed testing of strict workflows, like shopping carts,that are commonly used in business applications.

Features

Technical Details

Additional Information