GameOver Web Security & Hacking

Project GameOver was started with the objective of training and educating newbies about the basics of web security and educate them about the common web attacks and help them understand how they work .  GameOver has been broken down into two sections .
Section 1 consists of  special web applications that are designed especially to teach the basics of Web Security . 

Section 1 will cover 
  •      XSS
  •      CSRF
  •      RFI & LFI
  •      BruteForce Authentication
  •      Directory/Path traversal
  •      Command execution
  •      SQL injection

Section 2  is a collection of dileberately insecure Web applications . This section provides a legal platform to test your skills and to try and exploit the vulnerabilities and sharpen your skills before you pentest live sites. 

We would advice newbies to try and exploit these web applications . These applications provide real life environments and  will boost their confidence.

System Requirements :

In order to run the VM image  , you need to have a VM Player 4.0.2 or higher .(We have not tested it in lower versions of VM Player). You may allocate 256MB or higher RAM to this instance .

In case you do not have a VM Player installed or for some reason you prefer another virtualization software , you may download the .iso and run it in a ‘Live’ mode .

Getting Started :
In case you have chosen the Live CD , select ‘Live’ from the grub menu and Enter.

Login with the following credentials .

username : root
password : gameover

Once you login , type ‘ifconfig’ in your GameOver machine command prompt and hit Enter .     This will give you the ip address of the GameOver machine (Server) .
Now in your client browser enter this IP address and hit Enter .
You should be able to access GameOver now .



Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...