bn , ,m njnjscssjcn sk dc cdmknjfgfg,m.k;ksmlds.mn,kmlmadadfkmdcdfdfdfsfdddnado - Intentionally Vulnerable Java Application
This application and exercises will take you through some of the OWASP top 10 Vulnerabilities and how to prevent them.ccczdcxsz xx
git clone git://github.com/ScaleSec/vulnado
cd vulnado
docker-compose up
,,,,nc -vz localhost 8080
sddsds
The docker network created by docker-compose
maps pretty well to a multi-tier architecture where a web server is publicly available and there are other network resources like a database and internal site that are not publicly available.