<rss version="2.0"><channel><title>DevSlop on CRS Project</title><link>https://31d2f1a5.website-1u6.pages.dev/tags/devslop/</link><description>Recent content in CRS Project</description><item><title>How the CRS protects the vulnerable web application Pixi by OWASP DevSlop</title><link>https://31d2f1a5.website-1u6.pages.dev/20190909/how-the-crs-protects-the-vulnerable-web-application-pixi-by-owasp-devslop/</link><pubDate>Mon, 09 Sep 2019 10:37:38 +0200</pubDate><description>&lt;p>How could the functionality of a WAF be better demonstrated than with a vulnerable web application?&lt;/p>
&lt;p>In this blog post I introduce Pixi, an intentionally vulnerable web application by the OWASP project DevSlop. I show its known vulnerabilities and examine how the CRS protects against these vulnerabilities.&lt;/p>
&lt;p>What is Pixi?&lt;/p>
&lt;p>Pixi is a deliberately vulnerable web application that is part of the &lt;a href="https://devslop.co">OWASP DevSlop project&lt;/a>. Beside Tanya Janca, Nicole Becher and Nancy Gariché I am also part of this project. DevSlop is a training ground for DevSecOps. In addition to Pixi, DevSlop also offers many &lt;a href="https://www.youtube.com/channel/UCSmjcWvgVBqF3x_7e5rfe3A">YouTube shows&lt;/a>, blog posts and different &lt;a href="https://devslop.co/Home/Module">modules&lt;/a> on various security topics!&lt;/p></description></item></channel></rss>