Help
RSS
API
Feed
Maltego
Contact
Domain > www.samurai-wtf.org
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2014-01-28
216.34.181.97
(
ClassC
)
2024-09-14
204.246.191.92
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: CloudFrontDate: Sat, 14 Sep 2024 00:57:13 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveLocation: https://www.samurai-wtf.org/X-Cache: Redirect from cloudfrontVia: 1.1 1b3d71a6a953237249e639f3f6ef9c3c.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO50-C2Alt-Svc: h3:443; ma86400X-Amz-Cf-Id: uxpiuVAKuAOOGfoJNRAL9YLyIqvItxmL9_6ELLg3maC18RW1OEx9RQ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>CloudFront/center>/body>/html>
Port 443
HTTP/1.1 200 OKContent-Type: text/htmlContent-Length: 6322Connection: keep-aliveDate: Wed, 04 Sep 2024 13:27:11 GMTServer: AmazonS3Accept-Ranges: bytesETag: 9720c486124fb393bd52bfdcf5d2e632Last-Modified: Sat, 10 Aug 2024 01:21:34 GMTCache-Control: public, max-age0, s-maxage31536000Vary: Accept-EncodingX-Cache: Hit from cloudfrontVia: 1.1 98b030ba90f9fb8f8b176298ebb3ab78.cloudfront.net (CloudFront)X-Amz-Cf-Pop: HIO50-C2Alt-Svc: h3:443; ma86400X-Amz-Cf-Id: 9FjNJY3cAzwtHDAE2PVn5ptce9ZQG9vSgBFK8AAKjmVIsoSzlA96TgAge: 819002 !DOCTYPE html>html langen>head> meta charsetUTF-8> meta nameviewport contentwidthdevice-width, initial-scale1.0> title>OWASP SamuraiWTF/title> link relstylesheet hrefstyles.css>/head>body>header classhero> nav> div classcontainer> div classnav-wrapper> a href# classlogo> img srcsamurai-basic-logo.png altOWASP Samurai Web Training Framework> /a> ul classnav-links> li>a hrefhttps://github.com/SamuraiWTF/samuraiwtf>GitHub/a>/li> li>a hrefhttps://github.com/SamuraiWTF/samuraiwtf/wiki>Documentation/a>/li> li>a hrefhttp://tiny.si/samurai classbutton>Download VM/a>/li> /ul> /div> /div> /nav> div classhero-content> img srcsamurai-basic-logo.png altOWASP Samurai Web Training Framework height78> h1>OWASP SamuraiWTF/h1> p>The best security training environment for Developers and AppSec Professionals/p> /div>/header>nav classsub-nav> div classcontainer> ul> li>a href#about>About/a>/li> li>a href#history>History/a>/li> li>a href#core-contributors>Core Contributors/a>/li> li>a href#alumni>Alumni/a>/li> li>a href#sponsors>Sponsors/a>/li> /ul> /div>/nav>main classcontainer> section idabout> h2>About/h2> div classcontent> p>OWASP SamuraiWTF is a complete linux desktop for use in application security training. It is free and open-source, distributed both as pre-built VMs and as i>source code/i>. The source consists of a Vagrantfile, static assets, and build scripts. During the build process, it retrieves a variety of tools and training targets. Most of these are open-source projects managed by their own respective teams and contributors. Some examples are:/p> ul> li>OWASP Juice Shop/li> li>OWASP Zed Attack Proxy/li> li>Mutillidae/li> li>SQLMap/li> /ul> p>It also includes some proprietary software, such as the Community Edition of PortSwiggers Burp Suite./p> p>OWASP SamuraiWTF welcomes and encourages issues on the GitHub repository for bugs and enhancements. If you have the skills to contribute, pull requests are also always welcome./p> /div> /section> section idhistory> h2>History/h2> div classcontent> p>OWASP SamuraiWTF was created in August of 2008. Originally it was a bootable environment designed to provide web application testing tools. The goal was to mimic Backtrack (Now Kali) but focus only on the tools used during a web penetration test. The bootable ISO was hosted on Sourceforge, and updated as the team found time. Over the years this bootable ISO was retired and virtual machines became the primary distribution./p> p>Around 2016, the SamuraiWTF project team made two big changes. First, the project was moved to Github to enable better coordination between developers. The team also started to focus more on building out a training environment, instead of just trying to build a testing platform. This is because knowledge sharing is a core part of the teams ethics and fits perfectly the open source concepts./p> p>The current version 5.0 is based on Vagrant. This allows the team to support multiple environments and platforms. For example, the main branch supports being built in AWS and as a local virtual machine./p> /div> /section> section idcore-contributors> h2>Core Contributors/h2> div classcontributors> div classcontributor> img srcimages/kevin.jpg altKevin Johnson> h3>Kevin Johnson/h3> p>Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and application development. He has been involved in building incident response and forensic teams, architecting security solutions for large enterprises and penetration testing everything from government agencies to Fortune 100 companies. In addition, Kevin is a faculty member at IANS and was an instructor and author for the SANS Institute./p> /div> div classcontributor> img srcimages/jasongillam.png altJason Gillam> h3>Jason Gillam/h3> p>Jason Gillam is Chief Information Officer (CIO) at Secure Ideas and an IANS faculty member. He has over 20 years of industry experience in enterprise software development, system architecture, and application security. Jason has spent most of his career in technical leadership roles ranging from startups to fortune 100 companies and has learned the business acumen necessary to advise everyone from developers to senior executives on security and architecture./p> /div> div classcontributor> img srcimages/mic.png altMic Whitehorn-Gillam> h3>Mic Whitehorn-Gillam/h3> p>Mic Whitehorn-Gillam is a senior security consultant for Secure Ideas. Before entering the information security field he spent about a decade in web application architecture and development, and nearly five years in systems integration consulting. He possesses broad knowledge across many programming languages ranging from legacy COBOL to enterprise Java and C# to modern Ruby, Python, and JavaScript./p> /div> /div> /section> section idalumni> h2>Alumni/h2> p>Justin Searle/p> /section> section idsponsors> h2>Sponsors/h2> p>a hrefhttps://www.secureideas.com classsponsor-link>Secure Ideas/a>/p> /section>/main>footer> div classcontainer> p>© 2024 OWASP SamuraiWTF. All rights reserved./p> /div>/footer>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]