<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=2a373</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=2a373"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/2a373"/>
		<updated>2026-05-22T13:35:10Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:Sqlibench_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=45583</id>
		<title>Project Information:Sqlibench - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:Sqlibench_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=45583"/>
				<updated>2008-11-03T04:43:10Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP_Sqlibench_Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''50% REVIEW PROCESS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#SQL_Injector_Benchmarking_Project_.28SQLiBENCH.29|Sqlibench Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25x%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#SQL_Injector_Benchmarking_Project_.28SQLiBENCH.29|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The Project appears to have reached 95+% of project goals.  The how to document does a good job of replacing the beanshell scripts.  While the other documentation is complete and well written.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#SQL_Injector_Benchmarking_Project_.28SQLiBENCH.29|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The project has approached 100% of completion of deliverables and goals.  The interactive benchmarking criteria application in particular is a very interesting and useful component of the project.&lt;br /&gt;
 |- &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
'''Assessment Criteria'''&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The videos still should be accomplished as soon as is convenient. They will add value to a already successful project.&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions. &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:Sqlibench_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=45582</id>
		<title>Project Information:Sqlibench - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:Sqlibench_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=45582"/>
				<updated>2008-11-03T04:41:22Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP_Sqlibench_Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''50% REVIEW PROCESS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#SQL_Injector_Benchmarking_Project_.28SQLiBENCH.29|Sqlibench Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25x%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#SQL_Injector_Benchmarking_Project_.28SQLiBENCH.29|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The Project appears to have reached 95+% of project goals.  The how to document foes a good job of replacing the beanshell scripts.  While the other documentation is complete and well written.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#SQL_Injector_Benchmarking_Project_.28SQLiBENCH.29|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Th project has approached 100% of completion of deliverables and goals.  The interactive benchmarking criteria application in particular id a very interesting and useful component of the project.&lt;br /&gt;
 |- &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
'''Assessment Criteria'''&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The videos still should be accomplished as soon as is convenient. They will add value to a already successful project.&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions. &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:Sqlibench_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=45581</id>
		<title>Project Information:Sqlibench - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:Sqlibench_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=45581"/>
				<updated>2008-11-03T04:35:04Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP_Sqlibench_Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''50% REVIEW PROCESS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#SQL_Injector_Benchmarking_Project_.28SQLiBENCH.29|Sqlibench Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25x%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#SQL_Injector_Benchmarking_Project_.28SQLiBENCH.29|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The Project appears to have reached 95+% of project goals.  The how to document foes a good job of replacing the beanshell scripts.  While the other documentation is complete and well written.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#SQL_Injector_Benchmarking_Project_.28SQLiBENCH.29|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
'''Assessment Criteria'''&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The videos still should be accomplished as soon as is convenient. They will add value to a already successful project.&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions. &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Testing_Guide_3.0_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=44314</id>
		<title>Project Information:template Testing Guide 3.0 - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Testing_Guide_3.0_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=44314"/>
				<updated>2008-10-21T18:28:50Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Testing Guide 3.0|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Testing Project v3 Roadmap|OWASP Testing Project V3.0 Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Testing Project v3 Roadmap|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The project team accomlished all of it's tasks in a timely manner.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Testing Project v3 Roadmap|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
100%&lt;br /&gt;
 |- &lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
My concern was with the flow of the language as you move from section to section. This, of course, is a direct byproduct of having different authors for different sections and thier different writing styles.  In a couple of spots it made the guide a little  &amp;quot;disjointed&amp;quot; in it's style and delivery. should this be addressed in a future project or ongoing update?&lt;br /&gt;
&lt;br /&gt;
Likewise, Some authors offered detailed samples of using tools and syntax to test for the vulnerability while others offered general discriptions of how to test.  As we move forward perhaps we could look at standardizing this by maybe adding a detailed sample test that could address each vulnerability.  &lt;br /&gt;
&lt;br /&gt;
Or, another code project moving forward would be to create a test checklist based on the testing guide.  I think it would be of benefit to many, including those new to web application pen testing.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None that I know of.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
I concur with Nam.  A pdf document and a presentation are still needed. &lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Testing_Guide_3.0_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=44313</id>
		<title>Project Information:template Testing Guide 3.0 - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Testing_Guide_3.0_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=44313"/>
				<updated>2008-10-21T18:26:54Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Testing Guide 3.0|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Testing Project v3 Roadmap|OWASP Testing Project V3.0 Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Testing Project v3 Roadmap|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The project team accomlished all of it's tasks in a timely manner.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Testing Project v3 Roadmap|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
100%&lt;br /&gt;
 |- &lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
My concern was with the flow of the language as you move from section to section. This, of course, is a direct byproduct of having different authors for different sections and thier different writing styles.  In a couple of spots it made the guide a little  &amp;quot;disjointed&amp;quot; in it's style and delivery. &lt;br /&gt;
&lt;br /&gt;
Likewise, Some authors offered detailed samples of using tools and syntax to test for the vulnerability while others offered general discriptions of how to test.  As we move forward perhaps we could look at standardizing this by maybe adding a detailed sample test that could address each vulnerability.  &lt;br /&gt;
&lt;br /&gt;
Or, another code project moving forward would be to create a test checklist based on the testing guide.  I think it would be of benefit to many, including those new to web application pen testing.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None that I know of.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
I concur with Nam.  A pdf document and a presentation are still needed. &lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Testing_Guide_3.0_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=44312</id>
		<title>Project Information:template Testing Guide 3.0 - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Testing_Guide_3.0_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=44312"/>
				<updated>2008-10-21T18:26:20Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Testing Guide 3.0|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Testing Project v3 Roadmap|OWASP Testing Project V3.0 Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Testing Project v3 Roadmap|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The project team accomlished all of it's tasks in a timely manner.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Testing Project v3 Roadmap|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
100%&lt;br /&gt;
 |- &lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
My concern was with the flow of the language as you move from section to section. This, of course, is a direct byproduct of having different authors for different sections and thier different writing styles.  In a couple of spots it made the guide a little  &amp;quot;disjointed&amp;quot; in it's style. &lt;br /&gt;
&lt;br /&gt;
Likewise, Some authors offered detailed samples of using tools and syntax to test for the vulnerability while others offered general discriptions of how to test.  As we move forward perhaps we could look at standardizing this by maybe adding a detailed sample test that could address each vulnerability.  &lt;br /&gt;
&lt;br /&gt;
Or, another code project moving forward would be to create a test checklist based on the testing guide.  I think it would be of benefit to many, including those new to web application pen testing.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None that I know of.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
I concur with Nam.  A pdf document and a presentation are still needed. &lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Testing_Guide_3.0_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=44311</id>
		<title>Project Information:template Testing Guide 3.0 - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Testing_Guide_3.0_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=44311"/>
				<updated>2008-10-21T18:19:58Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Testing Guide 3.0|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Testing Project v3 Roadmap|OWASP Testing Project V3.0 Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Testing Project v3 Roadmap|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The project team accomlished all of it's tasks in a timely manner.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Testing Project v3 Roadmap|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
100%&lt;br /&gt;
 |- &lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
My concern was with the flow of the language as you move from section to section. This, of course, is a direct by product of havingdifferent authors for different sections and thier different writing styles.  In a couple of spots it made the guide a little  &amp;quot;disjointed&amp;quot; in it's style. &lt;br /&gt;
&lt;br /&gt;
Likewise, Some authors offered detailed samples of using tools and syntax to test for the vulnerability while others offered general discriptions of how to test.  As we move forward perhaps we could look at standardizing this by maybe adding a detailed sample test that could address each vulnerability.  &lt;br /&gt;
&lt;br /&gt;
Or, another code project moving forward would be to create a test checklist based on the testing guide.  I think it would be of benefit to many, including those new to web application pen testing.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None that I know of.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
I concur with Nam.  A pdf document and a presentation are still needed. &lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Testing_Guide_3.0_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=44310</id>
		<title>Project Information:template Testing Guide 3.0 - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Testing_Guide_3.0_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=44310"/>
				<updated>2008-10-21T18:18:22Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Testing Guide 3.0|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Testing Project v3 Roadmap|OWASP Testing Project V3.0 Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Testing Project v3 Roadmap|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The project team accomlished all of it's tasks in a timely manner.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Testing Project v3 Roadmap|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
100%&lt;br /&gt;
 |- &lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
My concern was with the flow of the language as you move from section to section. This, of course, is a direct by product of havingdifferent authors for different sections and thier different writing styles.  In a couple of spots it made the guide a little  &amp;quot;disjointed&amp;quot; in it's style. &lt;br /&gt;
&lt;br /&gt;
Likewise, Some authors offered detailed samples of using tools and syntax to test for the vulnerability while others offered general discriptions of how to test.  As we move forward perhaps we could look at standardizing this by maybe adding a detailed sample test that could address each vulnerability.  &lt;br /&gt;
&lt;br /&gt;
Or, another code project moving forward would be to create a test checklist based on the testing guide.  I think it would be of benefit to many including those new to web application pentesting.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None that I know of.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
I concur with Nam.  A pdf document and a presentation are still needed. &lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Testing_Guide_3.0_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=44309</id>
		<title>Project Information:template Testing Guide 3.0 - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Testing_Guide_3.0_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=44309"/>
				<updated>2008-10-21T18:16:15Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Testing Guide 3.0|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Testing Project v3 Roadmap|OWASP Testing Project V3.0 Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Testing Project v3 Roadmap|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The project team accomlished all of it's tasks in a timely manner.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Testing Project v3 Roadmap|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
100%&lt;br /&gt;
 |- &lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
My concern was with the flow of the language as you move from section to section. This, of course, is a direct by product of different authors for different sections and thier different writing styles.  In a couple  of spots it made the guide a little  &amp;quot;disjointed&amp;quot; in it's style. Likewise, Some authors offered detailed samples of using tools and syntax to test for the vulnerability while others offered general discriptions of how to test.  As we move forward perhaps we could look at adding a detailed sample test that could address each vulnerability.  &lt;br /&gt;
Or, another code project moving forward would be to create a test checklist based on the testing guide.  I think it would be of benefit to many including those new to web application pentesting.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None that I know of.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
I concur with Nam.  A pdf document and a presentation are still needed. &lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Testing_Guide_3.0_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=44308</id>
		<title>Project Information:template Testing Guide 3.0 - Final Review - Second Reviewer - F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Testing_Guide_3.0_-_Final_Review_-_Second_Reviewer_-_F&amp;diff=44308"/>
				<updated>2008-10-21T18:11:14Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Testing Guide 3.0|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Testing Project v3 Roadmap|OWASP Testing Project V3.0 Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Testing Project v3 Roadmap|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
The project team accomlished all of it's tasks in a timely manner.&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Testing Project v3 Roadmap|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
100%&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
My concern was with the flow of the language as you move from section to section. This, of course, is a direct by product of different authors for different sections and thier different writing styles.  In a couple  of spots it made the guide a little  &amp;quot;disjointed&amp;quot; in it's style. Likewise, Some authors offered detailed samples of using tools and syntax to test for the vulnerability while others offered general discriptions of how to test.  As we move forward perhaps we could look at adding a detailed sample test that could address each vulnerability.  &lt;br /&gt;
Or, another code project moving forward would be to create a test checklist based on the testing guide.  I think it would be of benefit to many including those new to web application pentesting.&lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
None that I know of.&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
None&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
I concur with Nam.  A pdf document and a presentation are still needed.  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40555</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40555"/>
				<updated>2008-09-19T23:08:58Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
4.4 Business Logic Testing &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* The section read out a little longer then the other sections.  All the content was interesting and relevant.  I would suggest taking Example 2 and breaking it out into another example (Example 2.1 or 3?)in order to break up the flow. I found my self losing my train of thought the further I read into it&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.5 Authentication Testing&amp;lt;br&amp;gt; &lt;br /&gt;
*What is &amp;quot;provenance&amp;quot;? It might be better to use adifferent, more common word with the same meaning.  An average user might get confused if they do not know what it means. &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.1 Credentials transport over an encrypted channel &amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several grammar related changes (commas and is vs are)and one content change.  Please crosscheck to insure the context is the same and check for additional grammar issues.&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.2 Testing for user enumeration &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.3 Testing for Guessable (Dictionary) User Account &lt;br /&gt;
*  made several grammar related changes with regard to commas &lt;br /&gt;
4.5.4 Brute Force Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.5 Testing for bypassing authentication schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.6 Testing for vulnerable remember password and pwd reset &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.7 Testing for Logout and Browser Cache Management Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.8 Testing for CAPTCHA &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.9 Testing Multiple Factors Authentication &amp;lt;br&amp;gt;&lt;br /&gt;
*  Changed some grammar (commas, capitalization)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Date 16 Sept, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.6 Authorization testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.1 Testing for path traversal &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2 Testing for bypassing authorization schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.3 Testing for Privilege Escalation &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.7 Session Management Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.1 Testing for Session Management Schema&amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several corrections to capitalization so as to maintain consistency accross the document.&amp;lt;br&amp;gt;&lt;br /&gt;
 4.7.1 Testing for Session Management Schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.2 Testing for Cookies attributes &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.3 Testing for Session Fixation &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.4 Testing for Exposed Session Variables &amp;lt;br&amp;gt;&lt;br /&gt;
*  Changed A first person reference to third person reference ( &amp;quot;My... I would expect&amp;quot; to &amp;quot;When the authenticaion... The user..&amp;quot;)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Date: 17 September 2008&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.7.4 Testing for Exposed Session Variables &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.5 Testing for CSRF &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.6 Testing for HTTP Exploit &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.8 Data Validation Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.1 Testing for Reflected Cross Site Scripting  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.2 Testing for Stored Cross Site Scripting &amp;lt;br&amp;gt; &lt;br /&gt;
4.8.3 Testing for DOM based Cross Site Scripting &amp;lt;br&amp;gt;&lt;br /&gt;
* Section feels incomplete.  The content appears to end abruptly.  The author mentions source code review for Black and Greybox testing.  While this is the likely test process It would be nice to include a tool-based test if one exists for those of us who are not coders and have only rudimentary experience with code.  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.4 Testing for Cross Site Flashing  &amp;lt;br&amp;gt;&lt;br /&gt;
* Grammar changes (singular to plural and vica versa, capitalization. &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.5 Testing for SQL Injection  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.5.1 Oracle Testing  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.5.2 MySQL Testing &lt;br /&gt;
 &amp;lt;br&amp;gt;&lt;br /&gt;
DATE: 19 September, 2008&lt;br /&gt;
&lt;br /&gt;
4.8.5.4 MS Access Testing &lt;br /&gt;
4.8.5.5 Testing PostgreSQL &lt;br /&gt;
4.8.6 Testing for LDAP Injection &lt;br /&gt;
* Changed &amp;quot;LDAP three&amp;quot; to &amp;quot;LDAP tree&amp;quot;&lt;br /&gt;
4.8.7 Testing for ORM Injection &lt;br /&gt;
&lt;br /&gt;
4.8.8 Testing for XML Injection &lt;br /&gt;
&lt;br /&gt;
4.8.9 Testing for SSI Injection &lt;br /&gt;
&lt;br /&gt;
4.8.10 Testing for XPath Injection &lt;br /&gt;
&lt;br /&gt;
4.8.11 IMAP/SMTP Injection &lt;br /&gt;
&lt;br /&gt;
4.8.12 Testing for Code Injection &lt;br /&gt;
&lt;br /&gt;
4.8.13 Testing for Command Injection &lt;br /&gt;
&lt;br /&gt;
4.8.14 Testing for Buffer overflow &lt;br /&gt;
&lt;br /&gt;
4.8.14.1 Testing for Heap overflow &lt;br /&gt;
&lt;br /&gt;
4.8.14.2 Testing for Stack overflow &lt;br /&gt;
&lt;br /&gt;
4.8.14.3 Testing for Format string &lt;br /&gt;
&lt;br /&gt;
4.8.15 Testing for incubated vulnerabilities&lt;br /&gt;
&lt;br /&gt;
4.9 Testing for Denial of Service &lt;br /&gt;
&lt;br /&gt;
(new: F.Mavituna - 100%) 4.9.1 Testing for SQL Wildcard Attacks &lt;br /&gt;
&lt;br /&gt;
4.9.2 Testing for DoS Locking Customer Accounts &lt;br /&gt;
&lt;br /&gt;
4.9.3 Testing for DoS Buffer Overflows &lt;br /&gt;
&lt;br /&gt;
4.9.4 Testing for DoS User Specified Object Allocation &lt;br /&gt;
&lt;br /&gt;
4.9.5 Testing for User Input as a Loop Counter &lt;br /&gt;
&lt;br /&gt;
4.9.6 Testing for Writing User Provided Data to Disk &lt;br /&gt;
&lt;br /&gt;
4.9.7 Testing for DoS Failure to Release Resources &lt;br /&gt;
&lt;br /&gt;
4.9.8 Testing for Storing too Much Data in Session &lt;br /&gt;
&lt;br /&gt;
 4.10 Web Services Testing &lt;br /&gt;
* Changed &amp;quot;HTTP&amp;quot; to &amp;quot;the HTTP&amp;quot;&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;br /&gt;
4.10.1 WS Information Gathering &lt;br /&gt;
&lt;br /&gt;
4.10.2 Testing WSDL &lt;br /&gt;
* I made several grammar and spelling changes to the paragraph on WSDigger and it's use.  The last sentence on use appeared to be incomplete.  I attempted to complete it.  Please review.&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_WSDL_(OWASP-WS-002)&amp;diff=40554</id>
		<title>Testing WSDL (OWASP-WS-002)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_WSDL_(OWASP-WS-002)&amp;diff=40554"/>
				<updated>2008-09-19T23:06:24Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
Once that the WSDL is identified, we can test that entry point.&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue ==&lt;br /&gt;
Check the WSDL of the web service to find the entry points and try to invoke an operation that is not used in a standard SOAP Request. Ensure that the WS doesn’t give you some confidential information.&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
&lt;br /&gt;
Given the Standard SOAP message that the Web services supplier waits from Web services consumer, you can craft a particular message that invoke some hidden operations.&lt;br /&gt;
'''Example:'''&amp;lt;br&amp;gt;&lt;br /&gt;
A good example is WebGoat 5.0 WSDL Scanning lesson. The following is a screenshot from that lesson:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:WSDLWebGoat.png]]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Here we have an interface that invokes a Web Service using only FirstName, LastName, and Login Count as parameters.&amp;lt;br&amp;gt;&lt;br /&gt;
If you look at the relative WSDL you will find:&lt;br /&gt;
&lt;br /&gt;
 ...&lt;br /&gt;
 &amp;lt;wsdl:portType name=&amp;quot;WSDLScanning&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:operation name=&amp;quot;'''getFirstName'''&amp;quot; parameterOrder=&amp;quot;id&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:input message=&amp;quot;impl:getFirstNameRequest&amp;quot; name=&amp;quot;getFirstNameRequest&amp;quot;/&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:output message=&amp;quot;impl:getFirstNameResponse&amp;quot; name=&amp;quot;getFirstNameResponse&amp;quot;/&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;/wsdl:operation&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:operation name=&amp;quot;'''getLastName'''&amp;quot; parameterOrder=&amp;quot;id&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:input message=&amp;quot;impl:getLastNameRequest&amp;quot; name=&amp;quot;getLastNameRequest&amp;quot;/&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:output message=&amp;quot;impl:getLastNameResponse&amp;quot; name=&amp;quot;getLastNameResponse&amp;quot;/&amp;gt;&lt;br /&gt;
 &amp;lt;/wsdl:operation&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;wsdl:operation name=&amp;quot;'''getCreditCard'''&amp;quot; parameterOrder=&amp;quot;id&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:input message=&amp;quot;impl:getCreditCardRequest&amp;quot; name=&amp;quot;getCreditCardRequest&amp;quot;/&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:output message=&amp;quot;impl:getCreditCardResponse&amp;quot; name=&amp;quot;getCreditCardResponse&amp;quot;/&amp;gt;&lt;br /&gt;
 &amp;lt;/wsdl:operation&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;wsdl:operation name=&amp;quot;'''getLoginCount'''&amp;quot; parameterOrder=&amp;quot;id&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:input message=&amp;quot;impl:getLoginCountRequest&amp;quot; name=&amp;quot;getLoginCountRequest&amp;quot;/&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:output message=&amp;quot;impl:getLoginCountResponse&amp;quot; name=&amp;quot;getLoginCountResponse&amp;quot;/&amp;gt;&lt;br /&gt;
 &amp;lt;/wsdl:operation&amp;gt;&lt;br /&gt;
 &amp;lt;/wsdl:portType&amp;gt;&lt;br /&gt;
 ...&lt;br /&gt;
&lt;br /&gt;
We find 4 operations and not only 3. Using WebScarab Web Service  plugin, we can craft a SOAP Request to get the Credit Card given a specific ID.&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:WSDLWebScarab.png]]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The SOAP Request resulting from this request is:&lt;br /&gt;
 POST http://localhost:80/WebGoat/services/SoapRequest HTTP/1.0&lt;br /&gt;
 Accept: application/soap+xml, application/dime, multipart/related, text/*&lt;br /&gt;
 Host: localhost:80&lt;br /&gt;
 Content-Type: text/xml; charset=utf-8&lt;br /&gt;
 SOAPAction: &amp;quot;&amp;quot;&lt;br /&gt;
 Content-length: 576&lt;br /&gt;
 Authorization: Basic Z3Vlc3Q6Z3Vlc3Q=&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;?xml version='1.0' encoding='UTF-8'?&amp;gt;&lt;br /&gt;
 &amp;lt;wsns0:Envelope&lt;br /&gt;
   xmlns:wsns1='http://www.w3.org/2001/XMLSchema-instance'&lt;br /&gt;
   xmlns:xsd='http://www.w3.org/2001/XMLSchema'&lt;br /&gt;
   xmlns:wsns0='http://schemas.xmlsoap.org/soap/envelope/'&amp;gt;&lt;br /&gt;
   &amp;lt;wsns0:Body&lt;br /&gt;
     wsns0:encodingStyle='http://schemas.xmlsoap.org/soap/encoding/'&amp;gt;&lt;br /&gt;
     &amp;lt;wsns2:'''getCreditCard'''&lt;br /&gt;
           xmlns:wsns2='http://lessons.webgoat.owasp.org'&amp;gt;&lt;br /&gt;
       &amp;lt;id xsi:type='xsd:int'&lt;br /&gt;
           xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance'&lt;br /&gt;
       &amp;gt;'''101'''&amp;lt;/id&amp;gt;&lt;br /&gt;
     &amp;lt;/wsns2:getCreditCard&amp;gt;&lt;br /&gt;
   &amp;lt;/wsns0:Body&amp;gt;&lt;br /&gt;
 &amp;lt;/wsns0:Envelope&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And the SOAP Response with the credit card number (987654321) is:&lt;br /&gt;
 &lt;br /&gt;
 HTTP/1.1 200 OK&lt;br /&gt;
 Server: Apache-Coyote/1.1&lt;br /&gt;
 Content-Type: text/xml;charset=utf-8&lt;br /&gt;
 Date: Wed, 28 Mar 2007 10:18:12 GMT&lt;br /&gt;
 Connection: close&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;utf-8&amp;quot;?&amp;gt;&amp;lt;soapenv:Envelope xmlns:soapenv=&amp;quot;http://schemas.xmlsoap.org/soap/envelope/&amp;quot;  xmlns:xsd=&amp;quot;http://www.w3.org/2001/XMLSchema&amp;quot; xmlns:xsi=&amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;soapenv:Body&amp;gt;&lt;br /&gt;
 &amp;lt;ns1:getCreditCardResponse soapenv:encodingStyle=&amp;quot;http://schemas.xmlsoap.org/soap/encoding/&amp;quot;  xmlns:ns1=&amp;quot;http://lessons.webgoat.owasp.org&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;getCreditCardReturn xsi:type=&amp;quot;xsd:string&amp;quot;&amp;gt;'''987654321'''&amp;lt;/getCreditCardReturn&amp;gt;&amp;lt;/ns1:getCreditCardResponse&amp;gt;&lt;br /&gt;
 &amp;lt;/soapenv:Body&amp;gt;&lt;br /&gt;
 &amp;lt;/soapenv:Envelope&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''WSDigger'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WSDigger is a free open source tool to automate web services security testing.&amp;lt;br&amp;gt; &lt;br /&gt;
With this tool we can test our  web services interacting with them trough a simple interface&lt;br /&gt;
and allows to search query and invoke web services dynamically without writing code.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When we interact with the web service malicious data has been entered into WSDigger the web service method must be invoked by clicking on the invoke button.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:wsdigger_part.jpg]] &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Result expected:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The tester should include full details of where the web service application permits access to an operation that is not used during normal SOAP messages and that provides access to confidential data. &lt;br /&gt;
&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* W3Schools schema introduction - http://www.w3schools.com/schema/schema_intro.asp&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
*[[OWASP_WebScarab_Project|OWASP WebScarab]]: Web Services plugin&lt;br /&gt;
* Foundstone WSDigger: http://www.foundstone.com/us/resources/proddesc/wsdigger.htm&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_WSDL_(OWASP-WS-002)&amp;diff=40551</id>
		<title>Testing WSDL (OWASP-WS-002)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_WSDL_(OWASP-WS-002)&amp;diff=40551"/>
				<updated>2008-09-19T23:05:06Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
Once that the WSDL is identified, we can test that entry point.&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue ==&lt;br /&gt;
Check the WSDL of the web service to find the entry points and try to invoke an operation that is not used in a standard SOAP Request. Ensure that the WS doesn’t give you some confidential information.&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
&lt;br /&gt;
Given the Standard SOAP message that the Web services supplier waits from Web services consumer, you can craft a particular message that invoke some hidden operations.&lt;br /&gt;
'''Example:'''&amp;lt;br&amp;gt;&lt;br /&gt;
A good example is WebGoat 5.0 WSDL Scanning lesson. The following is a screenshot from that lesson:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:WSDLWebGoat.png]]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Here we have an interface that invokes a Web Service using only FirstName, LastName, and Login Count as parameters.&amp;lt;br&amp;gt;&lt;br /&gt;
If you look at the relative WSDL you will find:&lt;br /&gt;
&lt;br /&gt;
 ...&lt;br /&gt;
 &amp;lt;wsdl:portType name=&amp;quot;WSDLScanning&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:operation name=&amp;quot;'''getFirstName'''&amp;quot; parameterOrder=&amp;quot;id&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:input message=&amp;quot;impl:getFirstNameRequest&amp;quot; name=&amp;quot;getFirstNameRequest&amp;quot;/&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:output message=&amp;quot;impl:getFirstNameResponse&amp;quot; name=&amp;quot;getFirstNameResponse&amp;quot;/&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;/wsdl:operation&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:operation name=&amp;quot;'''getLastName'''&amp;quot; parameterOrder=&amp;quot;id&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:input message=&amp;quot;impl:getLastNameRequest&amp;quot; name=&amp;quot;getLastNameRequest&amp;quot;/&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:output message=&amp;quot;impl:getLastNameResponse&amp;quot; name=&amp;quot;getLastNameResponse&amp;quot;/&amp;gt;&lt;br /&gt;
 &amp;lt;/wsdl:operation&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;wsdl:operation name=&amp;quot;'''getCreditCard'''&amp;quot; parameterOrder=&amp;quot;id&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:input message=&amp;quot;impl:getCreditCardRequest&amp;quot; name=&amp;quot;getCreditCardRequest&amp;quot;/&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:output message=&amp;quot;impl:getCreditCardResponse&amp;quot; name=&amp;quot;getCreditCardResponse&amp;quot;/&amp;gt;&lt;br /&gt;
 &amp;lt;/wsdl:operation&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;wsdl:operation name=&amp;quot;'''getLoginCount'''&amp;quot; parameterOrder=&amp;quot;id&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:input message=&amp;quot;impl:getLoginCountRequest&amp;quot; name=&amp;quot;getLoginCountRequest&amp;quot;/&amp;gt;&lt;br /&gt;
 &amp;lt;wsdl:output message=&amp;quot;impl:getLoginCountResponse&amp;quot; name=&amp;quot;getLoginCountResponse&amp;quot;/&amp;gt;&lt;br /&gt;
 &amp;lt;/wsdl:operation&amp;gt;&lt;br /&gt;
 &amp;lt;/wsdl:portType&amp;gt;&lt;br /&gt;
 ...&lt;br /&gt;
&lt;br /&gt;
We find 4 operations and not only 3. Using WebScarab Web Service  plugin, we can craft a SOAP Request to get the Credit Card given a specific ID.&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:WSDLWebScarab.png]]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The SOAP Request resulting from this request is:&lt;br /&gt;
 POST http://localhost:80/WebGoat/services/SoapRequest HTTP/1.0&lt;br /&gt;
 Accept: application/soap+xml, application/dime, multipart/related, text/*&lt;br /&gt;
 Host: localhost:80&lt;br /&gt;
 Content-Type: text/xml; charset=utf-8&lt;br /&gt;
 SOAPAction: &amp;quot;&amp;quot;&lt;br /&gt;
 Content-length: 576&lt;br /&gt;
 Authorization: Basic Z3Vlc3Q6Z3Vlc3Q=&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;?xml version='1.0' encoding='UTF-8'?&amp;gt;&lt;br /&gt;
 &amp;lt;wsns0:Envelope&lt;br /&gt;
   xmlns:wsns1='http://www.w3.org/2001/XMLSchema-instance'&lt;br /&gt;
   xmlns:xsd='http://www.w3.org/2001/XMLSchema'&lt;br /&gt;
   xmlns:wsns0='http://schemas.xmlsoap.org/soap/envelope/'&amp;gt;&lt;br /&gt;
   &amp;lt;wsns0:Body&lt;br /&gt;
     wsns0:encodingStyle='http://schemas.xmlsoap.org/soap/encoding/'&amp;gt;&lt;br /&gt;
     &amp;lt;wsns2:'''getCreditCard'''&lt;br /&gt;
           xmlns:wsns2='http://lessons.webgoat.owasp.org'&amp;gt;&lt;br /&gt;
       &amp;lt;id xsi:type='xsd:int'&lt;br /&gt;
           xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance'&lt;br /&gt;
       &amp;gt;'''101'''&amp;lt;/id&amp;gt;&lt;br /&gt;
     &amp;lt;/wsns2:getCreditCard&amp;gt;&lt;br /&gt;
   &amp;lt;/wsns0:Body&amp;gt;&lt;br /&gt;
 &amp;lt;/wsns0:Envelope&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And the SOAP Response with the credit card number (987654321) is:&lt;br /&gt;
 &lt;br /&gt;
 HTTP/1.1 200 OK&lt;br /&gt;
 Server: Apache-Coyote/1.1&lt;br /&gt;
 Content-Type: text/xml;charset=utf-8&lt;br /&gt;
 Date: Wed, 28 Mar 2007 10:18:12 GMT&lt;br /&gt;
 Connection: close&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;utf-8&amp;quot;?&amp;gt;&amp;lt;soapenv:Envelope xmlns:soapenv=&amp;quot;http://schemas.xmlsoap.org/soap/envelope/&amp;quot;  xmlns:xsd=&amp;quot;http://www.w3.org/2001/XMLSchema&amp;quot; xmlns:xsi=&amp;quot;http://www.w3.org/2001/XMLSchema-instance&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;soapenv:Body&amp;gt;&lt;br /&gt;
 &amp;lt;ns1:getCreditCardResponse soapenv:encodingStyle=&amp;quot;http://schemas.xmlsoap.org/soap/encoding/&amp;quot;  xmlns:ns1=&amp;quot;http://lessons.webgoat.owasp.org&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;getCreditCardReturn xsi:type=&amp;quot;xsd:string&amp;quot;&amp;gt;'''987654321'''&amp;lt;/getCreditCardReturn&amp;gt;&amp;lt;/ns1:getCreditCardResponse&amp;gt;&lt;br /&gt;
 &amp;lt;/soapenv:Body&amp;gt;&lt;br /&gt;
 &amp;lt;/soapenv:Envelope&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''WSDigger'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WSDigger is a free open source tool to automate web services security testing.&amp;lt;br&amp;gt; &lt;br /&gt;
With this tool we can test our  web services interacting with them trough a simple interface&lt;br /&gt;
and allows to search query and invoke web services dynamically without writing code.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When we intercat with the web service malicious data has been entered into WSDigger the web service method must be invoked by&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:wsdigger_part.jpg]] &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Result expected:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The tester should include full details of where the web service application permits access to an operation that is not used during normal SOAP messages and that provides access to confidential data. &lt;br /&gt;
&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* W3Schools schema introduction - http://www.w3schools.com/schema/schema_intro.asp&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
*[[OWASP_WebScarab_Project|OWASP WebScarab]]: Web Services plugin&lt;br /&gt;
* Foundstone WSDigger: http://www.foundstone.com/us/resources/proddesc/wsdigger.htm&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40550</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40550"/>
				<updated>2008-09-19T22:54:12Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
4.4 Business Logic Testing &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* The section read out a little longer then the other sections.  All the content was interesting and relevant.  I would suggest taking Example 2 and breaking it out into another example (Example 2.1 or 3?)in order to break up the flow. I found my self losing my train of thought the further I read into it&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.5 Authentication Testing&amp;lt;br&amp;gt; &lt;br /&gt;
*What is &amp;quot;provenance&amp;quot;? It might be better to use adifferent, more common word with the same meaning.  An average user might get confused if they do not know what it means. &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.1 Credentials transport over an encrypted channel &amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several grammar related changes (commas and is vs are)and one content change.  Please crosscheck to insure the context is the same and check for additional grammar issues.&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.2 Testing for user enumeration &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.3 Testing for Guessable (Dictionary) User Account &lt;br /&gt;
*  made several grammar related changes with regard to commas &lt;br /&gt;
4.5.4 Brute Force Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.5 Testing for bypassing authentication schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.6 Testing for vulnerable remember password and pwd reset &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.7 Testing for Logout and Browser Cache Management Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.8 Testing for CAPTCHA &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.9 Testing Multiple Factors Authentication &amp;lt;br&amp;gt;&lt;br /&gt;
*  Changed some grammar (commas, capitalization)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Date 16 Sept, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.6 Authorization testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.1 Testing for path traversal &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2 Testing for bypassing authorization schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.3 Testing for Privilege Escalation &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.7 Session Management Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.1 Testing for Session Management Schema&amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several corrections to capitalization so as to maintain consistency accross the document.&amp;lt;br&amp;gt;&lt;br /&gt;
 4.7.1 Testing for Session Management Schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.2 Testing for Cookies attributes &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.3 Testing for Session Fixation &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.4 Testing for Exposed Session Variables &amp;lt;br&amp;gt;&lt;br /&gt;
*  Changed A first person reference to third person reference ( &amp;quot;My... I would expect&amp;quot; to &amp;quot;When the authenticaion... The user..&amp;quot;)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Date: 17 September 2008&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.7.4 Testing for Exposed Session Variables &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.5 Testing for CSRF &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.6 Testing for HTTP Exploit &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.8 Data Validation Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.1 Testing for Reflected Cross Site Scripting  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.2 Testing for Stored Cross Site Scripting &amp;lt;br&amp;gt; &lt;br /&gt;
4.8.3 Testing for DOM based Cross Site Scripting &amp;lt;br&amp;gt;&lt;br /&gt;
* Section feels incomplete.  The content appears to end abruptly.  The author mentions source code review for Black and Greybox testing.  While this is the likely test process It would be nice to include a tool-based test if one exists for those of us who are not coders and have only rudimentary experience with code.  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.4 Testing for Cross Site Flashing  &amp;lt;br&amp;gt;&lt;br /&gt;
* Grammar changes (singular to plural and vica versa, capitalization. &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.5 Testing for SQL Injection  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.5.1 Oracle Testing  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.5.2 MySQL Testing &lt;br /&gt;
 &amp;lt;br&amp;gt;&lt;br /&gt;
DATE: 19 September, 2008&lt;br /&gt;
&lt;br /&gt;
4.8.5.4 MS Access Testing &lt;br /&gt;
4.8.5.5 Testing PostgreSQL &lt;br /&gt;
4.8.6 Testing for LDAP Injection &lt;br /&gt;
* Changed &amp;quot;LDAP three&amp;quot; to &amp;quot;LDAP tree&amp;quot;&lt;br /&gt;
4.8.7 Testing for ORM Injection &lt;br /&gt;
&lt;br /&gt;
4.8.8 Testing for XML Injection &lt;br /&gt;
&lt;br /&gt;
4.8.9 Testing for SSI Injection &lt;br /&gt;
&lt;br /&gt;
4.8.10 Testing for XPath Injection &lt;br /&gt;
&lt;br /&gt;
4.8.11 IMAP/SMTP Injection &lt;br /&gt;
&lt;br /&gt;
4.8.12 Testing for Code Injection &lt;br /&gt;
&lt;br /&gt;
4.8.13 Testing for Command Injection &lt;br /&gt;
&lt;br /&gt;
4.8.14 Testing for Buffer overflow &lt;br /&gt;
&lt;br /&gt;
4.8.14.1 Testing for Heap overflow &lt;br /&gt;
&lt;br /&gt;
4.8.14.2 Testing for Stack overflow &lt;br /&gt;
&lt;br /&gt;
4.8.14.3 Testing for Format string &lt;br /&gt;
&lt;br /&gt;
4.8.15 Testing for incubated vulnerabilities&lt;br /&gt;
&lt;br /&gt;
4.9 Testing for Denial of Service &lt;br /&gt;
&lt;br /&gt;
(new: F.Mavituna - 100%) 4.9.1 Testing for SQL Wildcard Attacks &lt;br /&gt;
&lt;br /&gt;
4.9.2 Testing for DoS Locking Customer Accounts &lt;br /&gt;
&lt;br /&gt;
4.9.3 Testing for DoS Buffer Overflows &lt;br /&gt;
&lt;br /&gt;
4.9.4 Testing for DoS User Specified Object Allocation &lt;br /&gt;
&lt;br /&gt;
4.9.5 Testing for User Input as a Loop Counter &lt;br /&gt;
&lt;br /&gt;
4.9.6 Testing for Writing User Provided Data to Disk &lt;br /&gt;
&lt;br /&gt;
4.9.7 Testing for DoS Failure to Release Resources &lt;br /&gt;
&lt;br /&gt;
4.9.8 Testing for Storing too Much Data in Session &lt;br /&gt;
&lt;br /&gt;
 4.10 Web Services Testing &lt;br /&gt;
* Changed &amp;quot;HTTP&amp;quot; to &amp;quot;the HTTP&amp;quot;&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Web_Services&amp;diff=40546</id>
		<title>Testing for Web Services</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Web_Services&amp;diff=40546"/>
				<updated>2008-09-19T22:51:57Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
''' 4.10 Web Services Testing '''&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
SOA (Service Orientated Architecture)/Web services applications are up-and-coming systems which are enabling businesses to interoperate and are growing at an unprecedented rate.&lt;br /&gt;
Webservice &amp;quot;clients&amp;quot; are generally not user web front-ends but other backend servers.&lt;br /&gt;
Webservices are exposed to the net like any other service but can be used on HTTP, FTP, SMTP, MQ among other transport protocols.&lt;br /&gt;
The Web Services Framework utilizes the HTTP protocol (as standard Web Application) in conjunction with XML, SOAP, WSDL and UDDI  technologies:&lt;br /&gt;
* The &amp;quot;Web Services Description Language&amp;quot; (WSDL) is used to describe the interfaces of a service.&lt;br /&gt;
* The &amp;quot;Simple Object Access Protocol&amp;quot; (SOAP) provides the means for communication between Web Services and Client Applications with XML and HTTP.&lt;br /&gt;
* &amp;quot;Universal Description, Discovery and Integration&amp;quot; (UDDI) is used to register and publish Web Services and their characteristics so that they can be found from potential clients.&lt;br /&gt;
&lt;br /&gt;
The vulnerabilities in web services are similar to other vulnerabilities, such as SQL injection, information disclosure and leakage, but web services also have unique XML/parser related vulnerabilities, which are discussed here as well.&lt;br /&gt;
&lt;br /&gt;
The following articles describes the web services testing:&lt;br /&gt;
&lt;br /&gt;
[[Testing: WS Information Gathering|4.10.1 WS Information Gathering]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Testing WSDL|4.10.2 Testing WSDL]]&amp;lt;br&amp;gt; &lt;br /&gt;
[[Testing for XML Structural|4.10.3 XML Structural Testing ]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Testing for XML Content-Level|4.10.4 XML Content-level Testing ]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Testing for WS HTTP GET parameters/REST attacks|4.10.5 HTTP GET parameters/REST Testing ]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Testing for Naughty SOAP Attachments|4.10.6 Naughty SOAP attachments ]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Testing for WS Replay|4.10.7 Replay Testing ]]&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40543</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40543"/>
				<updated>2008-09-19T22:31:38Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
4.4 Business Logic Testing &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* The section read out a little longer then the other sections.  All the content was interesting and relevant.  I would suggest taking Example 2 and breaking it out into another example (Example 2.1 or 3?)in order to break up the flow. I found my self losing my train of thought the further I read into it&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.5 Authentication Testing&amp;lt;br&amp;gt; &lt;br /&gt;
*What is &amp;quot;provenance&amp;quot;? It might be better to use adifferent, more common word with the same meaning.  An average user might get confused if they do not know what it means. &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.1 Credentials transport over an encrypted channel &amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several grammar related changes (commas and is vs are)and one content change.  Please crosscheck to insure the context is the same and check for additional grammar issues.&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.2 Testing for user enumeration &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.3 Testing for Guessable (Dictionary) User Account &lt;br /&gt;
*  made several grammar related changes with regard to commas &lt;br /&gt;
4.5.4 Brute Force Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.5 Testing for bypassing authentication schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.6 Testing for vulnerable remember password and pwd reset &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.7 Testing for Logout and Browser Cache Management Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.8 Testing for CAPTCHA &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.9 Testing Multiple Factors Authentication &amp;lt;br&amp;gt;&lt;br /&gt;
*  Changed some grammar (commas, capitalization)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Date 16 Sept, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.6 Authorization testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.1 Testing for path traversal &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2 Testing for bypassing authorization schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.3 Testing for Privilege Escalation &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.7 Session Management Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.1 Testing for Session Management Schema&amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several corrections to capitalization so as to maintain consistency accross the document.&amp;lt;br&amp;gt;&lt;br /&gt;
 4.7.1 Testing for Session Management Schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.2 Testing for Cookies attributes &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.3 Testing for Session Fixation &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.4 Testing for Exposed Session Variables &amp;lt;br&amp;gt;&lt;br /&gt;
*  Changed A first person reference to third person reference ( &amp;quot;My... I would expect&amp;quot; to &amp;quot;When the authenticaion... The user..&amp;quot;)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Date: 17 September 2008&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.7.4 Testing for Exposed Session Variables &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.5 Testing for CSRF &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.6 Testing for HTTP Exploit &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.8 Data Validation Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.1 Testing for Reflected Cross Site Scripting  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.2 Testing for Stored Cross Site Scripting &amp;lt;br&amp;gt; &lt;br /&gt;
4.8.3 Testing for DOM based Cross Site Scripting &amp;lt;br&amp;gt;&lt;br /&gt;
* Section feels incomplete.  The content appears to end abruptly.  The author mentions source code review for Black and Greybox testing.  While this is the likely test process It would be nice to include a tool-based test if one exists for those of us who are not coders and have only rudimentary experience with code.  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.4 Testing for Cross Site Flashing  &amp;lt;br&amp;gt;&lt;br /&gt;
* Grammar changes (singular to plural and vica versa, capitalization. &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.5 Testing for SQL Injection  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.5.1 Oracle Testing  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.5.2 MySQL Testing &lt;br /&gt;
 &amp;lt;br&amp;gt;&lt;br /&gt;
DATE: 19 September, 2008&lt;br /&gt;
&lt;br /&gt;
4.8.5.4 MS Access Testing &lt;br /&gt;
4.8.5.5 Testing PostgreSQL &lt;br /&gt;
4.8.6 Testing for LDAP Injection &lt;br /&gt;
* Changed &amp;quot;LDAP three&amp;quot; to &amp;quot;LDAP tree&amp;quot;&lt;br /&gt;
4.8.7 Testing for ORM Injection &lt;br /&gt;
&lt;br /&gt;
4.8.8 Testing for XML Injection &lt;br /&gt;
&lt;br /&gt;
4.8.9 Testing for SSI Injection &lt;br /&gt;
&lt;br /&gt;
4.8.10 Testing for XPath Injection &lt;br /&gt;
&lt;br /&gt;
4.8.11 IMAP/SMTP Injection &lt;br /&gt;
&lt;br /&gt;
4.8.12 Testing for Code Injection &lt;br /&gt;
&lt;br /&gt;
4.8.13 Testing for Command Injection &lt;br /&gt;
&lt;br /&gt;
4.8.14 Testing for Buffer overflow &lt;br /&gt;
&lt;br /&gt;
4.8.14.1 Testing for Heap overflow &lt;br /&gt;
&lt;br /&gt;
4.8.14.2 Testing for Stack overflow &lt;br /&gt;
&lt;br /&gt;
4.8.14.3 Testing for Format string &lt;br /&gt;
&lt;br /&gt;
4.8.15 Testing for incubated vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40534</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40534"/>
				<updated>2008-09-19T21:15:30Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
4.4 Business Logic Testing &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* The section read out a little longer then the other sections.  All the content was interesting and relevant.  I would suggest taking Example 2 and breaking it out into another example (Example 2.1 or 3?)in order to break up the flow. I found my self losing my train of thought the further I read into it&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.5 Authentication Testing&amp;lt;br&amp;gt; &lt;br /&gt;
*What is &amp;quot;provenance&amp;quot;? It might be better to use adifferent, more common word with the same meaning.  An average user might get confused if they do not know what it means. &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.1 Credentials transport over an encrypted channel &amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several grammar related changes (commas and is vs are)and one content change.  Please crosscheck to insure the context is the same and check for additional grammar issues.&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.2 Testing for user enumeration &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.3 Testing for Guessable (Dictionary) User Account &lt;br /&gt;
*  made several grammar related changes with regard to commas &lt;br /&gt;
4.5.4 Brute Force Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.5 Testing for bypassing authentication schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.6 Testing for vulnerable remember password and pwd reset &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.7 Testing for Logout and Browser Cache Management Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.8 Testing for CAPTCHA &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.9 Testing Multiple Factors Authentication &amp;lt;br&amp;gt;&lt;br /&gt;
*  Changed some grammar (commas, capitalization)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Date 16 Sept, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.6 Authorization testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.1 Testing for path traversal &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2 Testing for bypassing authorization schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.3 Testing for Privilege Escalation &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.7 Session Management Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.1 Testing for Session Management Schema&amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several corrections to capitalization so as to maintain consistency accross the document.&amp;lt;br&amp;gt;&lt;br /&gt;
 4.7.1 Testing for Session Management Schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.2 Testing for Cookies attributes &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.3 Testing for Session Fixation &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.4 Testing for Exposed Session Variables &amp;lt;br&amp;gt;&lt;br /&gt;
*  Changed A first person reference to third person reference ( &amp;quot;My... I would expect&amp;quot; to &amp;quot;When the authenticaion... The user..&amp;quot;)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Date: 17 September 2008&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.7.4 Testing for Exposed Session Variables &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.5 Testing for CSRF &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.6 Testing for HTTP Exploit &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.8 Data Validation Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.1 Testing for Reflected Cross Site Scripting  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.2 Testing for Stored Cross Site Scripting &amp;lt;br&amp;gt; &lt;br /&gt;
4.8.3 Testing for DOM based Cross Site Scripting &amp;lt;br&amp;gt;&lt;br /&gt;
* Section feels incomplete.  The content appears to end abruptly.  The author mentions source code review for Black and Greybox testing.  While this is the likely test process It would be nice to include a tool-based test if one exists for those of us who are not coders and have only rudimentary experience with code.  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.4 Testing for Cross Site Flashing  &amp;lt;br&amp;gt;&lt;br /&gt;
* Grammar changes (singular to plural and vica versa, capitalization. &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.5 Testing for SQL Injection  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.5.1 Oracle Testing  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.5.2 MySQL Testing &lt;br /&gt;
 &amp;lt;br&amp;gt;&lt;br /&gt;
DATE: 19 September, 2008&lt;br /&gt;
&lt;br /&gt;
4.8.5.4 MS Access Testing &lt;br /&gt;
4.8.5.5 Testing PostgreSQL &lt;br /&gt;
4.8.6 Testing for LDAP Injection &lt;br /&gt;
* Changed &amp;quot;LDAP three&amp;quot; to &amp;quot;LDAP tree&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_LDAP_Injection_(OTG-INPVAL-006)&amp;diff=40532</id>
		<title>Testing for LDAP Injection (OTG-INPVAL-006)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_LDAP_Injection_(OTG-INPVAL-006)&amp;diff=40532"/>
				<updated>2008-09-19T21:12:41Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
==  Brief Summary ==&lt;br /&gt;
LDAP is an acronym for Lightweight Directory Access Protocol. LDAP is a protocol to store information about users, hosts, and many other objects.&lt;br /&gt;
[[LDAP injection]] is a server side attack, which could allow sensitive information about users and hosts represented in an LDAP structure to be disclosed, modified, or inserted.&amp;lt;br&amp;gt;&lt;br /&gt;
This is done by manipulating input parameters afterwards passed to internal search, add and modify functions.&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue  == &lt;br /&gt;
&lt;br /&gt;
A web application could use LDAP in order to let users authenticate or search other users information&lt;br /&gt;
inside a corporate structure.&lt;br /&gt;
&lt;br /&gt;
The goal of LDAP injection attacks is to inject LDAP search filters metacharacters in a query which will be executed by the application.&lt;br /&gt;
&lt;br /&gt;
[[http://www.ietf.org/rfc/rfc2254.txt Rfc2254]]&lt;br /&gt;
defines a grammar on how to build a search filter on LDAPv3 and&lt;br /&gt;
extends [[http://www.ietf.org/rfc/rfc1960.txt Rfc1960]] (LDAPv2).&lt;br /&gt;
&lt;br /&gt;
An LDAP search filter is constructed in  Polish notation, &lt;br /&gt;
also known as [[http://en.wikipedia.org/wiki/Polish_notation prefix notation]].&lt;br /&gt;
&lt;br /&gt;
This means that a pseudo code condition on a search filter like this:&lt;br /&gt;
&lt;br /&gt;
 find(&amp;quot;cn=John &amp;amp; userPassword=mypass&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
will be represented as:&lt;br /&gt;
&lt;br /&gt;
 find(&amp;quot;(&amp;amp;(cn=John)(userPassword=mypass))&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
Boolean conditions and group aggregations on an &lt;br /&gt;
LDAP search filter could be applied by using &lt;br /&gt;
the following metacharacters:&lt;br /&gt;
{| border=1&lt;br /&gt;
|| '''Metachar''' || '''Meaning'''&lt;br /&gt;
|-&lt;br /&gt;
||   &amp;amp; || Boolean AND &lt;br /&gt;
|-&lt;br /&gt;
||   | || Boolean OR&lt;br /&gt;
|-&lt;br /&gt;
||  ! || Boolean NOT&lt;br /&gt;
|-&lt;br /&gt;
||   = || Equals &lt;br /&gt;
|-&lt;br /&gt;
||   ~= || Approx&lt;br /&gt;
|-&lt;br /&gt;
||   &amp;gt;= || Greater than&lt;br /&gt;
|-&lt;br /&gt;
||   &amp;lt;= || Less than&lt;br /&gt;
|-&lt;br /&gt;
||   *  || Any character&lt;br /&gt;
|-&lt;br /&gt;
||   () || Grouping parenthesis&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
More complete examples on how to build a search filter can be&lt;br /&gt;
found in the related RFC.&lt;br /&gt;
&lt;br /&gt;
A successful exploitation of an LDAP injection vulnerability could allow the tester to:&lt;br /&gt;
&lt;br /&gt;
* Access unauthorized content&lt;br /&gt;
* Evade application restrictions&lt;br /&gt;
* Gather unauthorized informations&lt;br /&gt;
* Add or modify Objects inside LDAP tree structure.&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Example 1. Search Filters ===&lt;br /&gt;
&lt;br /&gt;
Let's suppose we have a web application using a search&lt;br /&gt;
filter like the following one:&lt;br /&gt;
&lt;br /&gt;
 searchfilter=&amp;quot;(cn=&amp;quot;+user+&amp;quot;)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
which is instantiated by an HTTP request like this:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://www.example.com/ldapsearch?user=John&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If the value 'John' is replaced with a '*',&lt;br /&gt;
by sending the request:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;http://www.example.com/ldapsearch?user=*&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
the filter will look like:&lt;br /&gt;
&lt;br /&gt;
 searchfilter=&amp;quot;(cn=*)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
which matches every object with a 'cn' attribute equals to anything.&lt;br /&gt;
&lt;br /&gt;
If the application is vulnerable to LDAP injection, it will display some or all of the users attributes, depending on the application's execution flow and the permissions of the LDAP connected user,&lt;br /&gt;
&lt;br /&gt;
A tester could use a trial-and-error approach, by inserting in the parameter&lt;br /&gt;
'(', '|', '&amp;amp;', '*' and the other characters, in order to check &lt;br /&gt;
the application for errors.&lt;br /&gt;
&lt;br /&gt;
=== Example 2. Login ===&lt;br /&gt;
&lt;br /&gt;
If a web application uses LDAP to check user credentials during the login process and it is vulnerable to LDAP injection, it is possible to bypass the authentication check by injecting an always true LDAP query (in a similar way to SQL&lt;br /&gt;
and XPATH injection ).&lt;br /&gt;
&lt;br /&gt;
Let's suppose a web application uses a filter to match LDAP user/password pair.&lt;br /&gt;
&lt;br /&gt;
searchlogin= &amp;quot;(&amp;amp;(uid=&amp;quot;+user+&amp;quot;)(userPassword={MD5}&amp;quot;+base64(pack(&amp;quot;H*&amp;quot;,md5(pass)))+&amp;quot;))&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
By using the following values:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;user=*)(uid=*))(|(uid=*&lt;br /&gt;
 pass=password&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
the search filter will results in:&lt;br /&gt;
&lt;br /&gt;
 searchlogin=&amp;quot;(&amp;amp;(uid=*)(uid=*))(|(uid=*)(userPassword={MD5}X03MO1qnZdYdgyfeuILPmQ==))&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
which is correct and always true. &lt;br /&gt;
This way, the tester will gain logged-in status as the first user in LDAP tree.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
Sacha Faust: &amp;quot;LDAP Injection&amp;quot; - http://www.spidynamics.com/whitepapers/LDAPinjection.pdf&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;RFC 1960&amp;lt;/nowiki&amp;gt;: &amp;quot;A String Representation of LDAP Search Filters&amp;quot; - http://www.ietf.org/rfc/rfc1960.txt&amp;lt;br&amp;gt;&lt;br /&gt;
Bruce Greenblatt: &amp;quot;LDAP Overview&amp;quot; - http://www.directory-applications.com/ldap3_files/frame.htm&amp;lt;br&amp;gt;&lt;br /&gt;
IBM paper: &amp;quot;Understanding LDAP&amp;quot; - http://www.redbooks.ibm.com/redbooks/SG244986.html &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
Softerra LDAP Browser - http://www.ldapadministrator.com/download/index.php &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_MS_Access&amp;diff=40528</id>
		<title>Testing for MS Access</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_MS_Access&amp;diff=40528"/>
				<updated>2008-09-19T20:51:55Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Short Description of the Issue == &lt;br /&gt;
This article describes how to exploit SQL Injection vulnerabilties when the&lt;br /&gt;
backend database is MS Access, in particular, the article focuses on how to exploit Blind SQL Injection.&lt;br /&gt;
After an initial introduction on the typical functions that are useful to exploit an SQL Injection vulnerability, &lt;br /&gt;
a method to exploit Blind SQL Injection will be discussed.&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
&lt;br /&gt;
=== Standard Test ===&lt;br /&gt;
First of all, let's show a typical example of SQL error that can encounter when&lt;br /&gt;
a test is executed:&lt;br /&gt;
&lt;br /&gt;
 Fatal error: Uncaught exception 'com_exception' with message '&amp;lt;b&amp;gt;Source:&amp;lt;/b&amp;gt; Microsoft JET Database Engine&amp;lt;br/&amp;gt;&amp;lt;b&amp;gt;Description:&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
That means that maybe we are testing an application with an MS Access Database backend.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, MS Access doesn't support any comment character in the SQL query,&lt;br /&gt;
so it is not possible to use the trick of inserting the characters /* or -- or # to truncate the query. On the other hand, we can fortunately  bypass this limit with the NULL character. If we insert the char %00 at some place in &lt;br /&gt;
the query, all the remaining characters after the NULL are ignored. That happens&lt;br /&gt;
because, internally, strings are NULL terminated.&lt;br /&gt;
However, the NULL character can sometimes cause troubles. We can notice that there is another value that can be used in order to truncate the query.&lt;br /&gt;
The character is 0x16 (%16 in url encoded format) or 22 in decimal. So if we have the following query:&lt;br /&gt;
&lt;br /&gt;
 SELECT [username],[password] FROM users WHERE [username]='$myUsername' AND [password]='$myPassword'&lt;br /&gt;
&lt;br /&gt;
we can truncate the query with the following two urls:&lt;br /&gt;
&lt;br /&gt;
 http://www.example.com/index.php?user=admin'%00&amp;amp;pass=foo&lt;br /&gt;
 http://www.example.com/index.php?user=admin'%16&amp;amp;pass=foo&lt;br /&gt;
&lt;br /&gt;
==== Attributes enumeration ====&lt;br /&gt;
In order to enumerate the attributes of a query, it is possible to use the same method used for the database&lt;br /&gt;
MS SQL Server. In short, we can obtain the name of the attributes by error messages. For example,&lt;br /&gt;
if we know the existence of a parameter because we got it by an error message due to the&lt;br /&gt;
' character, we can also know the name of the remaining attributes with the following query:&lt;br /&gt;
&lt;br /&gt;
 ' GROUP BY Id%00&lt;br /&gt;
&lt;br /&gt;
in the error message received we can notice that the name of the next attribute is shown. We iterate the&lt;br /&gt;
method until we obtain the name of all the attributes. If we don't know the name of at least&lt;br /&gt;
one attribute, we can insert a fictitious column name, and, just like by magic, we obtain the name of&lt;br /&gt;
the first attribute.&lt;br /&gt;
&lt;br /&gt;
==== Obtaining Database Schema ====&lt;br /&gt;
Various tables exist in MS Access that can be used to obtain the name of a table in a&lt;br /&gt;
particular database. In the default configuration these tables are not accessible, however it's&lt;br /&gt;
possible to try it. The names of these table are:&lt;br /&gt;
&lt;br /&gt;
* MSysObjects&lt;br /&gt;
* MSysACEs&lt;br /&gt;
* MSysAccessXML&lt;br /&gt;
&lt;br /&gt;
For example, if a union SQL injection vulnerability exists, you can use the following query:&lt;br /&gt;
&lt;br /&gt;
 ' UNION SELECT Name FROM MSysObjects WHERE Type = 1%00&lt;br /&gt;
&lt;br /&gt;
These are the main steps that you can use to exploit a SQL injection vulnerability on &lt;br /&gt;
MS Access. There are also some functions that can be useful to exploit custom &lt;br /&gt;
queries. Some of these functions are:&lt;br /&gt;
&lt;br /&gt;
* ASC: Obtain the ASCII value of a character passed as input&lt;br /&gt;
* CHR: Obtain the character of the ASCII value passed as input&lt;br /&gt;
* LEN: Return the length of the string passed as parameter&lt;br /&gt;
* IIF: Is the IF construct, for example the following statement IIF(1=1, 'a', 'b') return 'a'&lt;br /&gt;
* MID: This function allows you to extract substring, for example the following statement mid('abc',1,1) return 'a'&lt;br /&gt;
* TOP: This function allows you to specify the maximum number of results that the query should return from the top. For example TOP 1 will return only 1 row.&lt;br /&gt;
* LAST: This function is used to select only the last row of a set of rows. For example the following query SELECT last(*) FROM users will return only the last row of the result.&lt;br /&gt;
&lt;br /&gt;
Some of these functions will be used to exploit a blind SQL injection as we see in the next&lt;br /&gt;
paragraph. For other functions please refer to References.&lt;br /&gt;
&lt;br /&gt;
=== Blind SQL Injection testing ===&lt;br /&gt;
[[Blind SQL Injection]] vulnerabilities are by no means the most frequent type of vulnerability&lt;br /&gt;
that you will find. Generally, you find an SQL injection in a parameter where no union &lt;br /&gt;
query is possible. Also, usually, there is no chance to execute shell commands or to read/write&lt;br /&gt;
a file. All you can do is infer the result of your query. For our test we take the&lt;br /&gt;
following example:&lt;br /&gt;
&lt;br /&gt;
 http://www.example.com/index.php?myId=[sql]&lt;br /&gt;
&lt;br /&gt;
where the id parameter is used in the following query:&lt;br /&gt;
&lt;br /&gt;
 SELECT * FROM orders WHERE [id]=$myId&lt;br /&gt;
&lt;br /&gt;
For our test, we will consider the myId parameter vulnerable to blind SQL injection.&lt;br /&gt;
We want to extract the content of the table users, in particular, of the column&lt;br /&gt;
username (we have already seen how to obtain the name of the attributes thanks&lt;br /&gt;
to the error messages and other techniques). It is supposed that the reader already knows the theory behind&lt;br /&gt;
the blind SQL injection attack, so we go straight to show some examples. A typical query that&lt;br /&gt;
can be used to infer the first character of the username of the 10th rows is:&lt;br /&gt;
&lt;br /&gt;
 http://www.example.com/index.php?id=IIF((select%20mid(last(username),1,1)%20from%20(select%20top%2010%20username%20from%20users))='a',0,'ko') &lt;br /&gt;
&lt;br /&gt;
If the first character is 'a', this query will return a 0 (a &amp;quot;true response&amp;quot;), otherwise a&lt;br /&gt;
'ko' string. Now we will explain why we have used this particular query.&lt;br /&gt;
The first thing to point out is that with the functions IFF, MID and LAST, we extract the first&lt;br /&gt;
character of the username of the selected row. Unfortunately, the original query returns a set of records and not only one record, so we can't use this methodology directly. We must first select only one row. We can use the TOP function, but it only works with the first row. To select the other&lt;br /&gt;
queries we must use a trick. We want to infer the username of the row number 10.&lt;br /&gt;
First we use the TOP function to select the first ten rows with the query:&lt;br /&gt;
&lt;br /&gt;
 SELECT TOP 10 username FROM users&lt;br /&gt;
&lt;br /&gt;
Then, we extract from this set the last row with the function LAST. Once we have only one row and &lt;br /&gt;
exactly the row that we want, we can use the IFF, MID and LAST functions to infer the value&lt;br /&gt;
of the username.&lt;br /&gt;
It may be interesting to notice the use of the IFF. In our example we use IFF to return a number or a string. With this trick we can distinguish when we have a true response or not. This is because id is of a numeric type, so if we compare it with a string we obtain an sql error, otherwise with the 0 value we have no errors. Of course if the parameter was of type string we can use different values. For example, we can have the following query:&lt;br /&gt;
&lt;br /&gt;
 http://www.example.com/index.php?id='%20AND%201=0%20OR%20'a'=IIF((select%20mid(last(username),1,1)%20from%20(select%20top%2010%20username%20from%20users))='a','a','b')%00&lt;br /&gt;
&lt;br /&gt;
that returns a query that is always true if the first character is 'a' or a query that is always false in the other case.&lt;br /&gt;
&lt;br /&gt;
This method allows us to infer the value of the username. To understand when we have &lt;br /&gt;
obtained the complete value we have two choices:&lt;br /&gt;
&lt;br /&gt;
# We try all the printable values, when no one is valid then we have the complete value.&lt;br /&gt;
# We can infer the length of the value (if it's a string value we can use the LEN function) and stop when we have found all the characters.&lt;br /&gt;
&lt;br /&gt;
== Tricks ==&lt;br /&gt;
Sometimes we are blocked by some filtering function, here we see some tricks to bypass these filters.&lt;br /&gt;
&lt;br /&gt;
=== Alternative Delimiter ===&lt;br /&gt;
Some filter strips away the space from the input string. We can bypass this filter using&lt;br /&gt;
the following values as delimiter instead of the white space:&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
9&lt;br /&gt;
a&lt;br /&gt;
c&lt;br /&gt;
d&lt;br /&gt;
20&lt;br /&gt;
2b&lt;br /&gt;
2d&lt;br /&gt;
3d&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
For example we can execute the following query:&lt;br /&gt;
&lt;br /&gt;
 http://www.example.com/index.php?username=foo%27%09or%09%271%27%09=%09%271&lt;br /&gt;
&lt;br /&gt;
to bypass a hypothetical login form.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* http://www.techonthenet.com/access/functions/index_alpha.php&lt;br /&gt;
* http://www.webapptest.org/ms-access-sql-injection-cheat-sheet-IT.html&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40345</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40345"/>
				<updated>2008-09-17T23:12:01Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
4.4 Business Logic Testing &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* The section read out a little longer then the other sections.  All the content was interesting and relevant.  I would suggest taking Example 2 and breaking it out into another example (Example 2.1 or 3?)in order to break up the flow. I found my self losing my train of thought the further I read into it&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.5 Authentication Testing&amp;lt;br&amp;gt; &lt;br /&gt;
*What is &amp;quot;provenance&amp;quot;? It might be better to use adifferent, more common word with the same meaning.  An average user might get confused if they do not know what it means. &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.1 Credentials transport over an encrypted channel &amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several grammar related changes (commas and is vs are)and one content change.  Please crosscheck to insure the context is the same and check for additional grammar issues.&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.2 Testing for user enumeration &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.3 Testing for Guessable (Dictionary) User Account &lt;br /&gt;
*  made several grammar related changes with regard to commas &lt;br /&gt;
4.5.4 Brute Force Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.5 Testing for bypassing authentication schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.6 Testing for vulnerable remember password and pwd reset &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.7 Testing for Logout and Browser Cache Management Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.8 Testing for CAPTCHA &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.9 Testing Multiple Factors Authentication &amp;lt;br&amp;gt;&lt;br /&gt;
*  Changed some grammar (commas, capitalization)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Date 16 Sept, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.6 Authorization testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.1 Testing for path traversal &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2 Testing for bypassing authorization schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.3 Testing for Privilege Escalation &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.7 Session Management Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.1 Testing for Session Management Schema&amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several corrections to capitalization so as to maintain consistency accross the document.&amp;lt;br&amp;gt;&lt;br /&gt;
 4.7.1 Testing for Session Management Schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.2 Testing for Cookies attributes &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.3 Testing for Session Fixation &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.4 Testing for Exposed Session Variables &amp;lt;br&amp;gt;&lt;br /&gt;
*  Changed A first person reference to third person reference ( &amp;quot;My... I would expect&amp;quot; to &amp;quot;When the authenticaion... The user..&amp;quot;)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Date: 17 September 2008&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.7.4 Testing for Exposed Session Variables &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.5 Testing for CSRF &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.6 Testing for HTTP Exploit &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.8 Data Validation Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.1 Testing for Reflected Cross Site Scripting  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.2 Testing for Stored Cross Site Scripting &amp;lt;br&amp;gt; &lt;br /&gt;
4.8.3 Testing for DOM based Cross Site Scripting &amp;lt;br&amp;gt;&lt;br /&gt;
* Section feels incomplete.  The content appears to end abruptly.  The author mentions source code review for Black and Greybox testing.  While this is the likely test process It would be nice to include a tool-based test if one exists for those of us who are not coders and have only rudimentary experience with code.  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.4 Testing for Cross Site Flashing  &amp;lt;br&amp;gt;&lt;br /&gt;
* Grammar changes (singular to plural and vica versa, capitalization. &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.5 Testing for SQL Injection  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.5.1 Oracle Testing  &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.5.2 MySQL Testing &lt;br /&gt;
 &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40338</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40338"/>
				<updated>2008-09-17T20:36:59Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
4.4 Business Logic Testing &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* The section read out a little longer then the other sections.  All the content was interesting and relevant.  I would suggest taking Example 2 and breaking it out into another example (Example 2.1 or 3?)in order to break up the flow. I found my self losing my train of thought the further I read into it&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.5 Authentication Testing&amp;lt;br&amp;gt; &lt;br /&gt;
*What is &amp;quot;provenance&amp;quot;? It might be better to use adifferent, more common word with the same meaning.  An average user might get confused if they do not know what it means. &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.1 Credentials transport over an encrypted channel &amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several grammar related changes (commas and is vs are)and one content change.  Please crosscheck to insure the context is the same and check for additional grammar issues.&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.2 Testing for user enumeration &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.3 Testing for Guessable (Dictionary) User Account &lt;br /&gt;
*  made several grammar related changes with regard to commas &lt;br /&gt;
4.5.4 Brute Force Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.5 Testing for bypassing authentication schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.6 Testing for vulnerable remember password and pwd reset &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.7 Testing for Logout and Browser Cache Management Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.8 Testing for CAPTCHA &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.9 Testing Multiple Factors Authentication &amp;lt;br&amp;gt;&lt;br /&gt;
*  Changed some grammar (commas, capitalization)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Date 16 Sept, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.6 Authorization testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.1 Testing for path traversal &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2 Testing for bypassing authorization schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.3 Testing for Privilege Escalation &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.7 Session Management Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.1 Testing for Session Management Schema&amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several corrections to capitalization so as to maintain consistency accross the document.&amp;lt;br&amp;gt;&lt;br /&gt;
 4.7.1 Testing for Session Management Schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.2 Testing for Cookies attributes &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.3 Testing for Session Fixation &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.4 Testing for Exposed Session Variables &amp;lt;br&amp;gt;&lt;br /&gt;
*  Changed A first person reference to third person reference ( &amp;quot;My... I would expect&amp;quot; to &amp;quot;When the authenticaion... The user..&amp;quot;)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Date: 17 September 2008&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.7.4 Testing for Exposed Session Variables &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.5 Testing for CSRF &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.6 Testing for HTTP Exploit &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.8 Data Validation Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.1 Testing for Reflected Cross Site Scripting &lt;br /&gt;
4.8.2 Testing for Stored Cross Site Scripting &lt;br /&gt;
4.8.3 Testing for DOM based Cross Site Scripting&lt;br /&gt;
* Section feels incomplete.  The content appears to end abruptly.  The author mentions source code review for Black and Greybox testing.  While this is the likely test process It would be nice to include a tool-based test if one exists for those of us who are not coders and have only rudimentary experience with code. &lt;br /&gt;
4.8.4 Testing for Cross Site Flashing &lt;br /&gt;
* Grammar changes (singular to plural and vica versa, capitalization.&lt;br /&gt;
4.8.5 Testing for SQL Injection &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40336</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40336"/>
				<updated>2008-09-17T20:24:14Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
4.4 Business Logic Testing &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* The section read out a little longer then the other sections.  All the content was interesting and relevant.  I would suggest taking Example 2 and breaking it out into another example (Example 2.1 or 3?)in order to break up the flow. I found my self losing my train of thought the further I read into it&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.5 Authentication Testing&amp;lt;br&amp;gt; &lt;br /&gt;
*What is &amp;quot;provenance&amp;quot;? It might be better to use adifferent, more common word with the same meaning.  An average user might get confused if they do not know what it means. &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.1 Credentials transport over an encrypted channel &amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several grammar related changes (commas and is vs are)and one content change.  Please crosscheck to insure the context is the same and check for additional grammar issues.&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.2 Testing for user enumeration &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.3 Testing for Guessable (Dictionary) User Account &lt;br /&gt;
*  made several grammar related changes with regard to commas &lt;br /&gt;
4.5.4 Brute Force Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.5 Testing for bypassing authentication schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.6 Testing for vulnerable remember password and pwd reset &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.7 Testing for Logout and Browser Cache Management Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.8 Testing for CAPTCHA &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.9 Testing Multiple Factors Authentication &amp;lt;br&amp;gt;&lt;br /&gt;
*  Changed some grammar (commas, capitalization)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Date 16 Sept, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.6 Authorization testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.1 Testing for path traversal &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2 Testing for bypassing authorization schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.3 Testing for Privilege Escalation &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.7 Session Management Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.1 Testing for Session Management Schema&amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several corrections to capitalization so as to maintain consistency accross the document.&amp;lt;br&amp;gt;&lt;br /&gt;
 4.7.1 Testing for Session Management Schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.2 Testing for Cookies attributes &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.3 Testing for Session Fixation &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.4 Testing for Exposed Session Variables &amp;lt;br&amp;gt;&lt;br /&gt;
*  Changed A first person reference to third person reference ( &amp;quot;My... I would expect&amp;quot; to &amp;quot;When the authenticaion... The user..&amp;quot;)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Date: 17 September 2008&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.7.4 Testing for Exposed Session Variables &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.5 Testing for CSRF &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.6 Testing for HTTP Exploit &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.8 Data Validation Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.8.1 Testing for Reflected Cross Site Scripting &lt;br /&gt;
4.8.2 Testing for Stored Cross Site Scripting &lt;br /&gt;
4.8.3 Testing for DOM based Cross Site Scripting&lt;br /&gt;
* Section feels incomplete.  The content appears to end abruptly.  The author mentions source code review for Black and Greybox testing.  While this is the likely test process It would be nice to include a tool-based test if one exists for those of us who are not coders and have only rudimentary experience with code. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_CSRF_(OTG-SESS-005)&amp;diff=40335</id>
		<title>Testing for CSRF (OTG-SESS-005)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_CSRF_(OTG-SESS-005)&amp;diff=40335"/>
				<updated>2008-09-17T19:43:12Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
[[CSRF]] is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. With little help of social engineering (like sending a link via email/chat), an attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation, when it targets a normal user. If the targeted end user is the administrator account, a CSRF attack can compromise the entire web application.&lt;br /&gt;
&lt;br /&gt;
==Related Security Activities==&lt;br /&gt;
&lt;br /&gt;
===Description of CSRF Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the OWASP article on [[CSRF]] Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===How to Avoid CSRF Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Guide Project|OWASP Development Guide]] article on how to [[Guide to CSRF |Avoid CSRF]] Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===How to Review Code for CSRF Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Code Review Project|OWASP Code Review Guide]] article on how to [[Reviewing code for Cross-Site Request Forgery issues |Review Code for CSRF]] Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
[[Category:Security Focus Area]]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
==Description of the Issue==&lt;br /&gt;
[[Category:FIXME|This section obviously needs to move, since it's describing CSRF. However, I didn't want to just delete it because it seems that there is content here that isn't in the ASDR. I need an SME to take a look]]&lt;br /&gt;
The way CSRF is accomplished relies on the following facts:&amp;lt;br&amp;gt;&lt;br /&gt;
1) Web browser behavior regarding the handling of session-related information such as cookies and http authentication information;&amp;lt;br&amp;gt;&lt;br /&gt;
2) Knowledge of valid web application URLs on the side of the attacker;&amp;lt;br&amp;gt;&lt;br /&gt;
3) Application session management relying only on information which is known by the browser;&amp;lt;br&amp;gt;&lt;br /&gt;
4) Existence of HTML tags whose presence cause immediate access to an http[s] resource; for example the image tag ''img''.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Points 1, 2, and 3 are essential for the vulnerability to be present, while point 4 is accessory and facilitates the actual exploitation, but is not strictly required.&lt;br /&gt;
&lt;br /&gt;
Point 1) Browsers automatically send information which is used to identify a user session. Suppose ''site'' is a site hosting a web application, and the user ''victim'' has just authenticated himself to ''site''. In response, ''site'' sends ''victim'' a cookie which identifies  requests sent by ''victim'' as belonging to ''victim’s'' authenticated session. Basically, once the browser receives the cookie set by ''site'', it will automatically send it along with any further requests directed to ''site''.&lt;br /&gt;
&lt;br /&gt;
Point 2) If the application does not make use of session-related information in URLs, then it means that the application URLs, their parameters and legitimate values may be identified (either by code analysis or by accessing the application and taking note of forms and URLs embedded in the HTML/JavaScript).&lt;br /&gt;
&lt;br /&gt;
Point 3) By “known by the browser”, we mean information such as cookies or http-based authentication information (such as Basic Authentication; NOT form-based authentication), which are stored by the browser and subsequently resent at each request directed towards an application area requesting that authentication. The vulnerabilities discussed next apply to applications which rely entirely on this kind of information to identify a user session.&lt;br /&gt;
&lt;br /&gt;
Suppose, for simplicity's sake, to refer to GET-accessible URLs (though the discussion applies as well to POST requests). If ''victim'' has already authenticated himself, submitting another request causes the cookie to be automatically sent with it (see picture, where the user accesses an application on www.example.com).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:session_riding.GIF]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The GET request could be originated in several different ways:&lt;br /&gt;
&lt;br /&gt;
* by the user, who is using the actual web application;&lt;br /&gt;
* by the user, who types the URL directly in the browser;&lt;br /&gt;
* by the user, who follows a link (external to the application) pointing to the URL.&lt;br /&gt;
&lt;br /&gt;
These invocations are indistinguishable by the application. In particular, the third may be quite dangerous. There is a number of techniques (and of vulnerabilities) which can disguise the real properties of a link. The link can be embedded in an email message, or appear in a malicious web site where the user is lured, i.e., the link appears in content hosted elsewhere (another web site, an HTML email message, etc.) and points to a resource of the application. If the user clicks on the link, since it was already authenticated by the web application on ''site'', the browser will issue a GET request to the web application, accompanied by authentication information (the session id cookie). This results in a valid operation performed on the web application – probably not what the user expects to happen! Think of a malicious link causing a fund transfer on a web banking application to appreciate the implications...&lt;br /&gt;
&lt;br /&gt;
By using a tag such as ''img'', as specified in point 4 above, it is not even necessary that the user follows a particular link. Suppose the attacker sends the user an email inducing him to visit an URL referring to a page containing the following (oversimplified) HTML:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;html&amp;gt;&amp;lt;body&amp;gt;&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;img src=”https://www.company.example/action” width=”0” height=”0”&amp;gt;&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/body&amp;gt;&amp;lt;/html&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What the browser will do when it displays this page is that it will try to display the specified zero-width (i.e., invisible) image as well. This results into a request being automatically sent to the web application hosted on ''site''. It is not important that the image URL does not refer to a proper image, its presence will trigger the request specified in the ''src'' field anyway; this happens provided that image download is not disabled in the browsers, which is a typical configuration since disabling images would cripple most web applications beyond usability.&lt;br /&gt;
&lt;br /&gt;
The problem here is a consequence of the following facts:&lt;br /&gt;
&lt;br /&gt;
* there are HTML tags whose appearance in a page result in automatic http request execution (''img'' being one of those);&lt;br /&gt;
* the browser has no way to tell that the resource referenced by ''img ''is not actually an image and is in fact not legitimate;&lt;br /&gt;
* image loading happens regardless of the location of the alleged image, i.e., the form and the image itself need not be located in the same host, not even in the same domain. While this is a very handy feature, it makes difficult to compartmentalize applications.&lt;br /&gt;
&lt;br /&gt;
It is the fact that HTML content unrelated to the web application may refer components in the application, and the fact that the browser automatically composes a valid request towards the application, that allows such kind of attacks. As no standards are defined right now, there is no way to prohibit this behavior unless it is made impossible for the attacker to specify valid application URLs. This means that valid URLs must contain information related to the user session, which is supposedly not known to the attacker and therefore make the identification of such URLs impossible.&lt;br /&gt;
&lt;br /&gt;
The problem might be even worse, since in integrated mail/browser environments simply displaying an email message containing the image would result in the execution of the request to the web application with the associated browser cookie.&lt;br /&gt;
&lt;br /&gt;
Things may be obfuscated further, by referencing seemingly valid image URLs such as&lt;br /&gt;
&lt;br /&gt;
&amp;lt;img src=”https://[attacker]/picture.gif” width=”0” height=”0”&amp;gt;&lt;br /&gt;
&lt;br /&gt;
where [attacker] is a site controlled by the attacker, and by utilizing a redirect mechanism on http://[attacker]/picture.gif to http://[thirdparty]/action.&lt;br /&gt;
&lt;br /&gt;
Cookies are not the only example involved in this kind of vulnerability. Web applications whose session information is entirely supplied by the browser are vulnerable too. This includes applications relying on HTTP authentication mechanisms alone, since the authentication information is known by the browser and is sent automatically upon each request. This DOES NOT include form-based authentication, which occurs just once and generates some form of session-related information (of course, in this case, such information is expressed simply as a cookie and can we fall back to one of the previous cases).&lt;br /&gt;
&lt;br /&gt;
'''Sample scenario.'''&lt;br /&gt;
&lt;br /&gt;
Let’s suppose that the victim is logged on to a firewall web management application. To log in, a user has to authenticate himself; subsequently, session information is stored in a cookie.&lt;br /&gt;
&lt;br /&gt;
Let's suppose our firewall web management application has a function that allows an authenticated user to delete a rule specified by its positional number, or all the rules of the configuration if the user enters ‘*’ (quite a dangerous feature, but it will make the example more interesting). The delete page is shown next. Let’s suppose that the form – for the sake of simplicity – issues a GET request, which will be of the form&lt;br /&gt;
&lt;br /&gt;
https://[target]/fwmgt/delete?rule=1&lt;br /&gt;
&lt;br /&gt;
(to delete rule number one)&lt;br /&gt;
&lt;br /&gt;
https://[target]/fwmgt/delete?rule=*&lt;br /&gt;
&lt;br /&gt;
(to delete all rules).&lt;br /&gt;
&lt;br /&gt;
The example is purposely quite naive, but shows in a simple way the dangers of CSRF.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[image:Session Riding Firewall Management.gif]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Therefore, if we enter the value ‘*’ and press the Delete button, the following GET request is submitted.&lt;br /&gt;
&lt;br /&gt;
https://www.company.example/fwmgt/delete?rule=*&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
with the effect of deleting all firewall rules (and ending up in a possibly inconvenient situation...).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[image:Session Riding Firewall Management 2.gif]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Now, this is not the only possible scenario. The user might have accomplished the same results by manually submitting the URL https://[target]/fwmgt/delete?rule=*&lt;br /&gt;
&lt;br /&gt;
or by following a link pointing, directly or via a redirection, to the above URL. Or, again, by accessing an HTML page with an embedded ''img'' tag pointing to the same URL.&lt;br /&gt;
&lt;br /&gt;
In all of these cases, if the user is currently logged in the firewall management application, the request will succeed and will modify the configuration of the firewall. &lt;br /&gt;
&lt;br /&gt;
One can imagine attacks targeting sensitive applications and making automatic auction bids, money transfers, orders, changing the configuration of critical software components, etc.&lt;br /&gt;
&lt;br /&gt;
An interesting thing is that these vulnerabilities may be exercised behind a firewall; i.e., it is sufficient that the link being attacked be reachable by the victim (not directly by the attacker). In particular, it can be any Intranet web server; for example, the firewall management station mentioned before, which is unlikely to be exposed to the Internet. Imagine a CSRF attack targeting an application monitoring a nuclear power plant... Sounds far fetched? Probably, but it is a possibility.&lt;br /&gt;
&lt;br /&gt;
Self-vulnerable applications, i.e., applications that are used both as attack vector and target (such as web mail applications), make things worse. If such an application is vulnerable, the user is obviously logged in when he reads a message containing a CSRF attack, that can target the web mail application and have it perform actions such as deleting messages, sending messages appearing as sent by the user, etc.&lt;br /&gt;
&lt;br /&gt;
'''Countermeasures.'''&lt;br /&gt;
&lt;br /&gt;
The following countermeasures are divided among recommendations to users and to developers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Users&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Since CSRF vulnerabilities are reportedly widespread, it is recommended to follow best practices to mitigate risk. Some mitigating actions are:&lt;br /&gt;
&lt;br /&gt;
* Logoff immediately after using a web application&lt;br /&gt;
* Do not allow your browser to save username/passwords, and do not allow sites to “remember” your login&lt;br /&gt;
* Do not use the same browser to access sensitive applications and to surf freely the Internet; if you have to do both things at the same machine, do them with separate browsers.&lt;br /&gt;
&lt;br /&gt;
Integrated HTML-enabled mail/browser, newsreader/browser environments pose additional risks since simply viewing a mail message or a news message might lead to the execution of an attack.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Developers&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Add session-related information to the URL. What makes the attack possible is the fact that the session is uniquely identified by the cookie, which is automatically sent by the browser. Having other session-specific information being generated at the URL level makes it difficult to the attacker to know the structure of URLs to attack.&lt;br /&gt;
&lt;br /&gt;
Other countermeasures, while they do not resolve the issue, contribute to make it harder to exploit.&lt;br /&gt;
&lt;br /&gt;
Use POST instead of GET. While POST requests may be simulated by means of JavaScript, they make it more complex to mount an attack. The same is true with intermediate confirmation pages (such as: “Are you sure you really want to do this?” type of pages). They can be bypassed by an attacker, although they will make their work a bit more complex. Therefore, do not rely solely on these measures to protect your application. Automatic logout mechanisms somewhat mitigate the exposure to these vulnerabilities, though it ultimately depends on the context (a user who works all day long on a vulnerable web banking application is obviously more at risk than a user who uses the same application occasionally).&lt;br /&gt;
&lt;br /&gt;
==Black Box testing and example==&lt;br /&gt;
&lt;br /&gt;
To test black box, you need to know URLs in the restricted (authenticated) area. If you possess valid credentials, you can assume both roles – the attacker and the victim. In this case, you know the URLs to be tested just by browsing around the application.&lt;br /&gt;
&lt;br /&gt;
Otherwise, if you don’t have valid credentials available, you have to organize a real attack, and so induce a legitimate, logged in user into following an appropriate link. This may involve a substantial level of social engineering.&lt;br /&gt;
&lt;br /&gt;
Either way, a test case can be constructed as follows:&lt;br /&gt;
&lt;br /&gt;
* let ''u'' the URL being tested; for example, u = http://www.example.com/action&lt;br /&gt;
* build an html page containing the http request referencing url u (specifying all relevant parameters; in case of http GET this is straightforward, while to a POST request you need to resort to some Javascript);&lt;br /&gt;
* make sure that the valid user is logged on the application;&lt;br /&gt;
* induce him into following the link pointing to the to-be-tested URL (social engineering involved if you cannot impersonate the user yourself);&lt;br /&gt;
* observe the result, i.e. check if the web server executed the request.&lt;br /&gt;
&lt;br /&gt;
==Gray Box testing and example==&lt;br /&gt;
&lt;br /&gt;
Audit the application to ascertain if its session management is vulnerable. If session management relies only on client side values (information available to the browser), then the application is vulnerable. By “client side values” we mean cookies and HTTP authentication credentials (Basic Authentication and other forms of HTTP authentication; NOT form-based authentication, which is an application-level authentication). For an application to not be vulnerable, it must include session-related information in the URL, in a form of unidentifiable or unpredictable by the user ([3] uses the term ''secret'' to refer to this piece of information).&lt;br /&gt;
&lt;br /&gt;
Resources accessible via HTTP GET requests are easily vulnerable, though POST requests can be automatized via Javascript and are vulnerable as well; therefore, the use of POST alone is not enough to correct the occurrence of CSRF vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* This issue seems to get rediscovered from time to time, under different names. A history of these vulnerabilities has been reconstructed in: http://www.webappsec.org/lists/websecurity/archive/2005-05/msg00003.html&lt;br /&gt;
* Peter W:&amp;quot;Cross-Site Request Forgeries&amp;quot; - http://www.tux.org/~peterw/csrf.txt&lt;br /&gt;
* Thomas Schreiber:&amp;quot;Session Riding&amp;quot; - http://www.securenet.de/papers/Session_Riding.pdf&lt;br /&gt;
* Oldest known post - http://www.zope.org/Members/jim/ZopeSecurity/ClientSideTrojan&lt;br /&gt;
* Cross-site Request Forgery FAQ - http://www.cgisecurity.com/articles/csrf-faq.shtml &lt;br /&gt;
&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Currently there are no automated tools that can be used to test for the presence of CSRF vulnerabilities. However, you may use your favorite spider/crawler tools to acquire knowledge about the application structure and to identify the URLs to test.&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40193</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40193"/>
				<updated>2008-09-16T22:00:28Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
4.4 Business Logic Testing &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* The section read out a little longer then the other sections.  All the content was interesting and relevant.  I would suggest taking Example 2 and breaking it out into another example (Example 2.1 or 3?)in order to break up the flow. I found my self losing my train of thought the further I read into it&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.5 Authentication Testing&amp;lt;br&amp;gt; &lt;br /&gt;
*What is &amp;quot;provenance&amp;quot;? It might be better to use adifferent, more common word with the same meaning.  An average user might get confused if they do not know what it means. &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.1 Credentials transport over an encrypted channel &amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several grammar related changes (commas and is vs are)and one content change.  Please crosscheck to insure the context is the same and check for additional grammar issues.&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.2 Testing for user enumeration &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.3 Testing for Guessable (Dictionary) User Account &lt;br /&gt;
*  made several grammar related changes with regard to commas &lt;br /&gt;
4.5.4 Brute Force Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.5 Testing for bypassing authentication schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.6 Testing for vulnerable remember password and pwd reset &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.7 Testing for Logout and Browser Cache Management Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.8 Testing for CAPTCHA &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.9 Testing Multiple Factors Authentication &amp;lt;br&amp;gt;&lt;br /&gt;
*  Changed some grammar (commas, capitalization)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Date 16 Sept, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.6 Authorization testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.1 Testing for path traversal &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.2 Testing for bypassing authorization schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.6.3 Testing for Privilege Escalation &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
4.7 Session Management Testing &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.1 Testing for Session Management Schema&amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several corrections to capitalization so as to maintain consistency accross the document.&amp;lt;br&amp;gt;&lt;br /&gt;
 4.7.1 Testing for Session Management Schema &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.2 Testing for Cookies attributes &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.3 Testing for Session Fixation &amp;lt;br&amp;gt;&lt;br /&gt;
4.7.4 Testing for Exposed Session Variables &amp;lt;br&amp;gt;&lt;br /&gt;
*  Changed A first person reference to third person reference ( &amp;quot;My... I would expect&amp;quot; to &amp;quot;When the authenticaion... The user..&amp;quot;)&amp;lt;br&amp;gt;&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40191</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40191"/>
				<updated>2008-09-16T21:55:14Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
4.4 Business Logic Testing &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* The section read out a little longer then the other sections.  All the content was interestinga nd relevant.  I would suggest taking Example 2 and breaking it out into another example (Example 2.1 or 3?)in order to break up the flow. I found my self losing my train of thought the further I read into it&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.5 Authentication Testing&amp;lt;br&amp;gt; &lt;br /&gt;
*What is &amp;quot;provenance&amp;quot;? It might be better to use adifferent, more common word with the same meaning.  An average user might get confused if they do not know what it means. &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.1 Credentials transport over an encrypted channel &amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several grammar related changes (commas and is vs are)and one content change.  Please crosscheck to insure the context is the same and check for additional grammar issues.&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.2 Testing for user enumeration &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.3 Testing for Guessable (Dictionary) User Account &lt;br /&gt;
*  made several grammar related changes with regard to commas &lt;br /&gt;
4.5.4 Brute Force Testing &lt;br /&gt;
4.5.5 Testing for bypassing authentication schema &lt;br /&gt;
4.5.6 Testing for vulnerable remember password and pwd reset &lt;br /&gt;
4.5.7 Testing for Logout and Browser Cache Management Testing &lt;br /&gt;
4.5.8 Testing for CAPTCHA &lt;br /&gt;
4.5.9 Testing Multiple Factors Authentication &lt;br /&gt;
*  Changed some grammar (commas, capitalization)&lt;br /&gt;
&lt;br /&gt;
Date 16 Sept, 2008&lt;br /&gt;
4.6 Authorization testing &lt;br /&gt;
4.6.1 Testing for path traversal &lt;br /&gt;
4.6.2 Testing for bypassing authorization schema &lt;br /&gt;
4.6.3 Testing for Privilege Escalation &lt;br /&gt;
&lt;br /&gt;
4.7 Session Management Testing &lt;br /&gt;
4.7.1 Testing for Session Management Schema&lt;br /&gt;
*  I made several corrections to capitalization so as to maintain consistency accross the document.&lt;br /&gt;
 4.7.1 Testing for Session Management Schema &lt;br /&gt;
4.7.2 Testing for Cookies attributes &lt;br /&gt;
4.7.3 Testing for Session Fixation &lt;br /&gt;
4.7.4 Testing for Exposed Session Variables &lt;br /&gt;
*  Changed some grammar (commas, capitalization)&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Exposed_Session_Variables_(OTG-SESS-004)&amp;diff=40190</id>
		<title>Testing for Exposed Session Variables (OTG-SESS-004)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Exposed_Session_Variables_(OTG-SESS-004)&amp;diff=40190"/>
				<updated>2008-09-16T21:50:51Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
&lt;br /&gt;
The Session Tokens (Cookie, SessionID, Hidden Field), if exposed, will usually enable an attacker to impersonate a victim and access the application illegitimately.  As such, it is important that it is protected from eavesdropping at all times – particularly whilst in transit between the Client browser and the application servers. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Short Description of the Issue== &lt;br /&gt;
 &lt;br /&gt;
The information here relates to how transport security applies to the transfer of sensitive Session ID data rather than data in general, and may be stricter than the caching and transport policies applied to the data served by the site.&lt;br /&gt;
Using a personal proxy, it is possible to ascertain the following about each request and response:&lt;br /&gt;
* Protocol used (e.g., HTTP vs. HTTPS)&lt;br /&gt;
* HTTP Headers&lt;br /&gt;
* Message Body (e.g., POST or page content)&lt;br /&gt;
Each time Session ID data is passed between the client and the server, the protocol, cache and privacy directives and body should be examined.&lt;br /&gt;
Transport security here refers to Session IDs passed in GET or POST requests, message bodies or other means over valid HTTP requests.&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
&lt;br /&gt;
'''Testing for Encryption &amp;amp; Reuse of Session Tokens vulnerabilities:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Protection from eavesdropping is often provided by SSL encryption, but may incorporate other tunnelling or encryption.&lt;br /&gt;
It should be noted that encryption or cryptographic hashing of the Session ID should be considered separately from transport encryption, as it is the Session ID itself being protected, not the data that may be represented by it.&lt;br /&gt;
If the Session ID could be presented by an attacker to the application to gain access, then it must be protected in transit to mitigate that risk.&lt;br /&gt;
It should therefore be ensured that encryption is both the default and enforced for any request or response where the Session ID is passed, regardless of the mechanism used (e.g., a hidden form field).&lt;br /&gt;
Simple checks such as replacing https:// with http:// during interaction with application should be performed, together with modification of form posts to determine if adequate segregation between the secure and non-secure sites is implemented.&amp;lt;br&amp;gt;&lt;br /&gt;
Note: if there is also an element to the site where the user is tracked with Session IDs but security is not present (e.g., noting which public documents a registered user downloads) it is essential that a different Session ID is used.  The Session ID should therefore be monitored as the client switches from the secure to non-secure elements to ensure a different one is used.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Result Expected:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Every time the authentication is successful The user should expect to recieve:&lt;br /&gt;
* A different session token&lt;br /&gt;
* A token sent via encrypted channel every time I make an HTTP Request&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Testing for Proxies &amp;amp; Caching vulnerabilities:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Proxies must also be considered when reviewing application security.  In many cases, clients will access the application through corporate, ISP or other proxies or protocol aware gateways (e.g., Firewalls).&lt;br /&gt;
The HTTP protocol provides directives to control the behaviour of downstream proxies, and the correct implementation of these directives should also be assessed.&lt;br /&gt;
In general, the Session ID should never be sent over unencrypted transport and should never be cached.  The application should therefore be examined to ensure that encrypted communications are both the default and enforced for any transfer of Session IDs.  Furthermore, whenever the Session ID is passed, directives should be in place to prevent its caching by intermediate and even local caches.&amp;lt;br&amp;gt;&lt;br /&gt;
The application should also be configured to secure data in Caches over both HTTP/1.0 and HTTP/1.1 – RFC 2616 discusses the appropriate controls with reference to HTTP.&lt;br /&gt;
HTTP/1.1 provides a number of cache control mechanisms.  Cache-Control: no-cache indicates that a proxy must not re-use any data.  Whilst Cache-Control: Private appears to be a suitable directive, this still allows a non-shared proxy to cache data.  In the case of web-cafes or other shared systems, this presents a clear risk.  Even with single-user workstations the cached Session ID may be exposed through a compromise of the file-system or where network stores are used.  HTTP/1.0 caches do not recognise the Cache-Control: no-cache directive.  &lt;br /&gt;
&lt;br /&gt;
'''Result Expected:'''&amp;lt;br&amp;gt;&lt;br /&gt;
The “Expires: 0” and Cache-Control: max-age=0 directives should be used to further ensure caches do not expose the data.&lt;br /&gt;
Each request/response passing Session ID data should be examined to ensure appropriate cache directives are in use.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Testing for GET &amp;amp; POST vulnerabilities:''' &amp;lt;br&amp;gt;&lt;br /&gt;
In general, GET requests should not be used, as the Session ID may be exposed in Proxy or Firewall logs.  They are also far more easily manipulated than other types of transport, although it should be noted that almost any mechanism can be manipulated by the client with the right tools.&lt;br /&gt;
Furthermore, [[Cross-site scripting]] attacks are most easily exploited by sending a specially constructed link to the victim.  This is far less likely if data is sent from the client as POSTs.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Result Expected:'''&amp;lt;br&amp;gt;&lt;br /&gt;
All server side code receiving data from POST requests should be tested to ensure it doesn’t accept the data if sent as a GET.&lt;br /&gt;
For example, consider the following POST request generated by a login page.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
POST http://owaspapp.com/login.asp HTTP/1.1&lt;br /&gt;
Host: owaspapp.com &lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.0.2) Gecko/20030208 Netscape/7.02 Paros/3.0.2b &lt;br /&gt;
Accept: */*&lt;br /&gt;
Accept-Language: en-us, en&lt;br /&gt;
Accept-Charset: ISO-8859-1, utf-8;q=0.66, *;q=0.66 &lt;br /&gt;
Keep-Alive: 300 &lt;br /&gt;
Cookie: ASPSESSIONIDABCDEFG=ASKLJDLKJRELKHJG &lt;br /&gt;
Cache-Control: max-age=0 &lt;br /&gt;
Content-Type: application/x-www-form-urlencoded &lt;br /&gt;
Content-Length: 34&lt;br /&gt;
&lt;br /&gt;
Login=Username&amp;amp;password=Password&amp;amp;SessionID=12345678&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
If login.asp is badly implemented, it may be possible to log in using the following URL:&lt;br /&gt;
http://owaspapp.com/login.asp?Login=Username&amp;amp;password=Password&amp;amp;SessionID=12345678&lt;br /&gt;
&lt;br /&gt;
Potentially insecure server-side scripts may be identified by checking each POST in this way.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Testing for Transport vulnerabilities:''' &amp;lt;br&amp;gt;&lt;br /&gt;
All interaction between the Client and Application should be tested at least against the following criteria.&lt;br /&gt;
* How are Session IDs transferred? E.g., GET, POST, Form Field (including hidden fields)	&lt;br /&gt;
* Are Session IDs always sent over encrypted transport by default?	&lt;br /&gt;
* Is it possible to manipulate the application to send Session IDs unencrypted? E.g., by changing HTTP to HTTPS?&lt;br /&gt;
* What cache-control directives are applied to requests/responses passing Session IDs?	&lt;br /&gt;
* Are these directives always present?  If not, where are the exceptions?	&lt;br /&gt;
* Are GET requests incorporating the Session ID used?	&lt;br /&gt;
* If POST is used, can it be interchanged with GET?&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* RFCs 2109 &amp;amp; 2965 – HTTP State Management Mechanism [D. Kristol, L. Montulli] - www.ietf.org/rfc/rfc2965.txt, www.ietf.org/rfc/rfc2109.txt&lt;br /&gt;
* RFC 2616 – Hypertext Transfer Protocol -- HTTP/1.1 - www.ietf.org/rfc/rfc2616.txt&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40189</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=40189"/>
				<updated>2008-09-16T21:36:40Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
4.4 Business Logic Testing &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* The section read out a little longer then the other sections.  All the content was interestinga nd relevant.  I would suggest taking Example 2 and breaking it out into another example (Example 2.1 or 3?)in order to break up the flow. I found my self losing my train of thought the further I read into it&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.5 Authentication Testing&amp;lt;br&amp;gt; &lt;br /&gt;
*What is &amp;quot;provenance&amp;quot;? It might be better to use adifferent, more common word with the same meaning.  An average user might get confused if they do not know what it means. &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.1 Credentials transport over an encrypted channel &amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several grammar related changes (commas and is vs are)and one content change.  Please crosscheck to insure the context is the same and check for additional grammar issues.&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.2 Testing for user enumeration &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.3 Testing for Guessable (Dictionary) User Account &lt;br /&gt;
*  made several grammar related changes with regard to commas &lt;br /&gt;
4.5.4 Brute Force Testing &lt;br /&gt;
4.5.5 Testing for bypassing authentication schema &lt;br /&gt;
4.5.6 Testing for vulnerable remember password and pwd reset &lt;br /&gt;
4.5.7 Testing for Logout and Browser Cache Management Testing &lt;br /&gt;
4.5.8 Testing for CAPTCHA &lt;br /&gt;
4.5.9 Testing Multiple Factors Authentication &lt;br /&gt;
&lt;br /&gt;
Date 16 Sept, 2008&lt;br /&gt;
4.6 Authorization testing &lt;br /&gt;
4.6.1 Testing for path traversal &lt;br /&gt;
4.6.2 Testing for bypassing authorization schema &lt;br /&gt;
4.6.3 Testing for Privilege Escalation &lt;br /&gt;
&lt;br /&gt;
4.7 Session Management Testing &lt;br /&gt;
4.7.1 Testing for Session Management Schema&lt;br /&gt;
*  I made several corrections to capitalization so as to maintain consistency accross the document.&lt;br /&gt;
&lt;br /&gt;
*  Changed some grammar (commas, capitolization)&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Session_Management_Schema_(OTG-SESS-001)&amp;diff=40188</id>
		<title>Testing for Session Management Schema (OTG-SESS-001)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Session_Management_Schema_(OTG-SESS-001)&amp;diff=40188"/>
				<updated>2008-09-16T21:31:16Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
In order to avoid continuous authentication for each page of a website or service, web applications implement various mechanisms to store and validate credentials for a pre-determined timespan.&amp;lt;br&amp;gt;&lt;br /&gt;
These mechanisms are known as Session Management and, while they're most important in order to increase the ease of use and user-friendliness of the application, they can be exploited by a penetration tester to gain access to a user account, without the need to provide correct credentials. In this test, we want to check that cookies and other session tokens are created in a secure and unpredictable way. An attacker that is able to predict and forge a weak cookie can easily hijack the sessions of legitimate users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Related Security Activities==&lt;br /&gt;
&lt;br /&gt;
===Description of Session Management Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the OWASP articles on [[:Category:Session Management Vulnerability|Session Management Vulnerabilities]].&lt;br /&gt;
&lt;br /&gt;
===Description of Session Management Countermeasures===&lt;br /&gt;
&lt;br /&gt;
See the OWASP articles on [[:Category:Session Management|Session Management Countermeasures]].&lt;br /&gt;
&lt;br /&gt;
===How to Avoid Session Management Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Guide Project|OWASP Development Guide]] article on how to [[Session Management|Avoid Session Management]] Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===How to Review Code for Session Management| Vulnerabilities===&lt;br /&gt;
&lt;br /&gt;
See the [[:Category:OWASP Code Review Project|OWASP Code Review Guide]] article on how to [[Codereview-Session-Management|Review Code for Session Management]] Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==Description of the Issue==&lt;br /&gt;
&lt;br /&gt;
Cookies are used to implement session management and are described in detail in RFC 2965. In a nutshell, when a user accesses an application which needs to keep track of the actions and identity of that user across multiple requests, a cookie (or more than one) is generated by the server and sent to the client. The client will then send the cookie back to the server in all following connections until the cookie expires or is destroyed.  The data stored in the cookie can provide to the server a large spectrum of information about who the user is, what actions he has performed so far, what his preferences are,  etc. therefore providing a state to a stateless protocol like HTTP.&lt;br /&gt;
&lt;br /&gt;
A typical example is provided by an online shopping cart. Throughout the session of a user, the application must keep track of his identity, his profile, the products that he has chosen to buy, the quantity, the individual prices, the discounts, etc. Cookies are an efficient way to store and pass this information back and forth (other methods are URL parameters and hidden fields).&lt;br /&gt;
&lt;br /&gt;
Due to the importance of the data that they store, cookies are therefore vital in the overall security of the application. Being able to tamper with cookies may result in hijacking the sessions of legitimate users, gaining higher privileges in an active session, and in general influencing the operations of the application in an unauthorized way. In this test we have to check whether the cookies issued to clients can resist a wide range of attacks aimed to interfere with the sessions of legitimate users and with the application itself. The overall goal is to be able to forge a cookie that will be considered valid by the application and that will provide some kind of unauthorized access (session hijacking, privilege escalation, ...). Usually the main steps of the attack pattern are the following:&lt;br /&gt;
* '''cookie collection''': collection of a sufficient number of cookie samples;&lt;br /&gt;
* '''cookie reverse engineering''': analysis of the cookie generation algorithm;&lt;br /&gt;
* '''cookie manipulation''': forging of a valid cookie in order to perform the attack. This last step might require a large number of attempts, depending on how the cookie is created (cookie brute-force attack).&lt;br /&gt;
&lt;br /&gt;
Another pattern of attack consists of overflowing a cookie. Strictly speaking, this attack has a different nature, since here we are not trying to recreate a perfectly valid cookie. Instead, our goal is to overflow a memory area, thereby interfering with the correct behavior of the application and possibly injecting (and remotely executing) malicious code.&lt;br /&gt;
&lt;br /&gt;
==Black Box Testing and Examples==&lt;br /&gt;
&lt;br /&gt;
All interaction between the client and application should be tested at least against the following criteria:&lt;br /&gt;
* Are all Set-Cookie directives tagged as Secure?	&lt;br /&gt;
* Do any Cookie operations take place over unencrypted transport?	&lt;br /&gt;
* Can the Cookie be forced over unencrypted transport?  	&lt;br /&gt;
* If so, how does the application maintain security?	&lt;br /&gt;
* Are any Cookies persistent?	&lt;br /&gt;
* What Expires= times are used on persistent cookies, and are they reasonable?	&lt;br /&gt;
* Are cookies that are expected to be transient configured as such?	&lt;br /&gt;
* What HTTP/1.1 Cache-Control settings are used to protect Cookies?	&lt;br /&gt;
* What HTTP/1.0 Cache-Control settings are used to protect Cookies?&lt;br /&gt;
&lt;br /&gt;
===Cookie collection===&lt;br /&gt;
&lt;br /&gt;
The first step required in order to manipulate the cookie is obviously to understand how the application creates and manages cookies. For this task, we have to try to answer the following questions:&lt;br /&gt;
&lt;br /&gt;
* How many cookies are used by the application ?&lt;br /&gt;
Surf the application. Note when cookies are created. Make a list of received cookies, the page that sets them (with the set-cookie directive), the domain for which they are valid, their value, and their characteristics.&lt;br /&gt;
* Which parts of the the application generate and/or modify the cookie ?&lt;br /&gt;
Surfing the application, find which cookies remain constant and which get modified. What events modify the cookie ?&lt;br /&gt;
* Which parts of the application require this cookie in order to be accessed and utilized?&lt;br /&gt;
Find out which parts of the application need a cookie. Access a page, then try again without the cookie, or with a modified value of it. Try to map which cookies are used where.&lt;br /&gt;
&lt;br /&gt;
A spreadsheet mapping each cookie to the corresponding application parts and the related information can be a valuable output of this phase.&lt;br /&gt;
&lt;br /&gt;
===Session Analysis===&lt;br /&gt;
&lt;br /&gt;
The session tokens (Cookie, SessionID or Hidden Field) themselves should be examined to ensure their quality from a security perspective.  They should be tested against criteria such as their randomness, uniqueness, resistance to statistical and cryptographic analysis and information leakage.&amp;lt;br&amp;gt;&lt;br /&gt;
* Token Structure &amp;amp; Information Leakage&lt;br /&gt;
The first stage is to examine the structure and content of a Session ID provided by the application.  A common mistake is to include specific data in the Token instead of issuing a generic value and referencing real data at the server side.&lt;br /&gt;
If the Session ID is clear-text, the structure and pertinent data may be immediately obvious as the following:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
192.168.100.1:owaspuser:password:15:58&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If part or the entire token appears to be encoded or hashed, it should be compared to various techniques to check for obvious obfuscation.&lt;br /&gt;
For example the string “192.168.100.1:owaspuser:password:15:58” is represented in Hex, Base64 and as an MD5 hash:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Hex	3139322E3136382E3130302E313A6F77617370757365723A70617373776F72643A31353A3538&lt;br /&gt;
Base64	MTkyLjE2OC4xMDAuMTpvd2FzcHVzZXI6cGFzc3dvcmQ6MTU6NTg=&lt;br /&gt;
MD5	01c2fc4f0a817afd8366689bd29dd40a&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having identified the type of obfuscation, it may be possible to decode back to the original data.  In most cases, however, this is unlikely.  Even so, it may be useful to enumerate the encoding in place from the format of the message.  Furthermore, if both the format and obfuscation technique can be deduced, automated brute-force attacks could be devised.&lt;br /&gt;
Hybrid tokens may include information such as IP address or User ID together with an encoded portion, as the following:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
owaspuser:192.168.100.1: a7656fafe94dae72b1e1487670148412&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Having analyzed a single session token, the representative sample should be examined.&lt;br /&gt;
A simple analysis of the tokens should immediately reveal any obvious patterns.  For example, a 32 bit token may include 16 bits of static data and 16 bits of variable data.  This may indicate that the first 16 bits represent a fixed attribute of the user – e.g. the username or IP address.&lt;br /&gt;
If the second 16 bit chunk is incrementing at a regular rate, it may indicate a sequential or even time-based element to the token generation.  See examples.&lt;br /&gt;
If static elements to the Tokens are identified, further samples should be gathered, varying one potential input element at a time.  For example, login attempts through a different user account or from a different IP address may yield a variance in the previously static portion of the session token.&lt;br /&gt;
The following areas should be addressed during the single and multiple Session ID structure testing:&lt;br /&gt;
* What parts of the Session ID are static?	&lt;br /&gt;
* What clear-text confidential information is stored in the Session ID? E.g. usernames/UID, IP addresses	&lt;br /&gt;
* What easily decoded confidential information is stored?	&lt;br /&gt;
* What information can be deduced from the structure of the Session ID?	&lt;br /&gt;
* What portions of the Session ID are static for the same login conditions?	&lt;br /&gt;
* What obvious patterns are present in the Session ID as a whole, or individual portions?&lt;br /&gt;
&lt;br /&gt;
===Session ID Predictability and Randomness===&lt;br /&gt;
&lt;br /&gt;
Analysis of the variable areas (if any) of the Session ID should be undertaken to establish the existence of any recognizable or predictable patterns.&lt;br /&gt;
These analyses may be performed manually and with bespoke or OTS statistical or cryptanalytic tools in order to deduce any patterns in the Session ID content.&lt;br /&gt;
Manual checks should include comparisons of Session IDs issued for the same login conditions – e.g., the same username, password, and IP address.  Time is an important factor which must also be controlled.  High numbers of simultaneous connections should be made in order to gather samples in the same time window and keep that variable constant.  Even a quantization of 50ms or less may be too coarse and a sample taken in this way may reveal time-based components that would otherwise be missed.&lt;br /&gt;
Variable elements should be analyzed over time to determine whether they are incremental in nature.  Where they are incremental, patterns relating to absolute or elapsed time should be investigated.  Many systems use time as a seed for their pseudo-random elements.&lt;br /&gt;
Where the patterns are seemingly random, one-way hashes of time or other environmental variations should be considered as a possibility.  Typically, the result of a cryptographic hash is a decimal or hexadecimal number so should be identifiable.&lt;br /&gt;
In analyszing Session IDs sequences, patterns or cycles, static elements and client dependencies should all be considered as possible contributing elements to the structure and function of the application.&lt;br /&gt;
* Are the Session IDs provably random in nature?  I.e., can the resulting values be reproduced?  &lt;br /&gt;
* Do the same input conditions produce the same ID on a subsequent run?	&lt;br /&gt;
* Are the Session IDs provably resistant to statistical or cryptanalysis?	&lt;br /&gt;
* What elements of the Session IDs are time-linked?	&lt;br /&gt;
* What portions of the Session IDs are predictable?  	&lt;br /&gt;
* Can the next ID be deduced even given full knowledge of the generation algorithm and previous IDs?&lt;br /&gt;
&lt;br /&gt;
===Cookie reverse engineering===&lt;br /&gt;
&lt;br /&gt;
Now that we have enumerated the cookies and have a general idea of their use, it is time to have a deeper look at cookies that seem interesting. Which cookies are we interested in? A cookie, in order to provide a secure method of session management, must combine several characteristics, each of which is aimed at protecting the cookie from a different class of attacks. These characteristics are summarized below:&lt;br /&gt;
#Unpredictability: a cookie must contain some amount of hard-to-guess data. The harder it is to forge a valid cookie, the harder is to break into legitimate user's session. If an attacker can guess the cookie used in an active session of a legitimate user, he/she will be able to fully impersonate that user (session hijacking). In order to make a cookie unpredictable, random values and/or cryptography can be used.&lt;br /&gt;
#Tamper resistance: a cookie must resist malicious attempts of modification. If we receive a cookie like  IsAdmin=No, it is trivial to modify it to get administrative rights, unless the application performs a double check (for instance, appending to the cookie an encrypted hash of its value)&lt;br /&gt;
#Expiration: a critical cookie must be valid only for an appropriate period of time and must be deleted from disk/memory afterwards, in order to avoid the risk of being replayed. This does not apply to cookies that store non-critical data that needs to be remembered across sessions (e.g., site look-and-feel)&lt;br /&gt;
#“Secure” flag: a cookie whose value is critical for the integrity of the session should have this flag enabled in order to allow its transmission only in an encrypted channel to deter eavesdropping.&lt;br /&gt;
&lt;br /&gt;
The approach here is to collect a sufficient number of instances of a cookie and start looking for patterns in their value. The exact meaning of “sufficient” can vary from a handful of samples, if the cookie generation method is very easy to break, to several thousands, if we need to proceed with some mathematical analysis (e.g., chi-squares, attractors. See later for more information).&lt;br /&gt;
&lt;br /&gt;
It is important to pay particular attention to the workflow of the application, as the state of a session can have a heavy impact on collected cookies: a cookie collected before being authenticated can be very different from a cookie obtained after the authentication.&lt;br /&gt;
&lt;br /&gt;
Another aspect to keep into consideration is time: always record the exact time when a cookie has been obtained, when there is the possibility that time plays a role in the value of the cookie (the server could use a timestamp as part of the cookie value). The time recorded could be the local time or the server's timestamp included in the HTTP response (or both).&lt;br /&gt;
&lt;br /&gt;
Analyzing the collected values, try to figure out all variables that could have influenced the cookie value and try to vary them one at the time. Passing to the server modified versions of the same cookie can be very helpful in understanding how the application reads and processes the cookie.&lt;br /&gt;
&lt;br /&gt;
Examples of checks to be performed at this stage include:&lt;br /&gt;
* What character set is used in the cookie ? Has the cookie a numeric value ? alphanumeric ? hexadecimal ? What happens if we insert in a cookie characters that do not belong to the expected charset ?&lt;br /&gt;
* Is the cookie composed of different sub-parts carrying different pieces of information ? How are the different parts separated ? With which delimiters ? Some parts of the cookie could have a higher variance, others might be constant, others could assume only a limited set of values. Breaking down the cookie to its base components is the first and fundamental step. An example of an easy-to-spot structured cookie is the following:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ID=5a0acfc7ffeb919:CR=1:TM=1120514521:LM=1120514521:S=j3am5KzC4v01ba3q&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this example we see 5 different fields, carrying different types of data:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ID – hexadecimal&lt;br /&gt;
CR – small integer&lt;br /&gt;
TM and LM – large integer. (And curiously they hold the same value. Worth to see what happens modifying one of them)&lt;br /&gt;
S – alphanumeric&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Even when no delimiters are used, having enough samples can help. As an example, let's look at the following series:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
0123456789abcdef&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Brute Force Attacks===&lt;br /&gt;
Brute force attacks inevitably lead on from questions relating to predictability and randomness.&lt;br /&gt;
The variance within the Session IDs must be considered together with application session durations and timeouts.  If the variation within the Session IDs is relatively small, and Session ID validity is long, the likelihood of a successful brute-force attack is much higher.&lt;br /&gt;
A long Session ID (or rather one with a great deal of variance) and a shorter validity period would make it far harder to succeed in a brute force attack.&lt;br /&gt;
* How long would a brute-force attack on all possible Session IDs take?	&lt;br /&gt;
* Is the Session ID space large enough to prevent brute forcing? For example, is the length of the key sufficient when compared to the valid life-span?&lt;br /&gt;
* Do delays between connection attempts with different Session IDs mitigate the risk of this attack?&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example == &lt;br /&gt;
If you have access to the session management schema implementation, you can check for the following:&lt;br /&gt;
* Random Session Token&lt;br /&gt;
The Session ID or Cookie issued to the client should not be easily predictable (don't use linear algorithms based on predictable variables such as the  client IP address). The use of cryptographic algorithms with key length of 256 bits is encouraged (like AES).&lt;br /&gt;
* Token length&lt;br /&gt;
Session ID will be at least 50 characters length.&lt;br /&gt;
* Session Time-out&lt;br /&gt;
Session token should have a defined time-out (it depends on the criticality of the application managed data)&lt;br /&gt;
* Cookie configuration:&lt;br /&gt;
** non-persistent: only RAM memory&lt;br /&gt;
** secure (set only on HTTPS channel):  Set Cookie: cookie=data; path=/; domain=.aaa.it; secure&lt;br /&gt;
** [[HTTPOnly]] (not readable by a script):  Set Cookie: cookie=data; path=/; domain=.aaa.it; [[HTTPOnly]]&lt;br /&gt;
More information here: [[Testing_for_cookies_attributes]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* RFC 2965 “HTTP State Management Mechanism”&lt;br /&gt;
* RFC 1750 “Randomness Recommendations for Security”&lt;br /&gt;
* “Strange Attractors and TCP/IP Sequence Number Analysis”: http://www.bindview.com/Services/Razor/Papers/2001/tcpseq.cfm&lt;br /&gt;
* Correlation Coefficient: http://mathworld.wolfram.com/CorrelationCoefficient.html&lt;br /&gt;
* ENT: http://fourmilab.ch/random/&lt;br /&gt;
* http://seclists.org/lists/fulldisclosure/2005/Jun/0188.html&lt;br /&gt;
* Darrin Barrall: &amp;quot;Automated Cookie Analisys&amp;quot; –  http://www.spidynamics.com/assets/documents/SPIcookies.pdf&lt;br /&gt;
* Gunter Ollmann: &amp;quot;Web Based Session Management&amp;quot; - http://www.technicalinfo.net&lt;br /&gt;
* Matteo Meucci:&amp;quot;MMS Spoofing&amp;quot; - www.owasp.org/images/7/72/MMS_Spoofing.ppt &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
* [[:Category:OWASP WebScarab Project|OWASP's WebScarab]] features a session token analysis mechanism. You can read [[How to test session identifier strength with WebScarab]].&lt;br /&gt;
* Foundstone CookieDigger - http://www.foundstone.com/resources/proddesc/cookiedigger.htm&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Privilege_escalation_(OTG-AUTHZ-003)&amp;diff=40187</id>
		<title>Testing for Privilege escalation (OTG-AUTHZ-003)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Privilege_escalation_(OTG-AUTHZ-003)&amp;diff=40187"/>
				<updated>2008-09-16T21:04:25Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This section describes the issue of escalating privileges from one stage to another. During this phase, the tester should verify that it is not possible for a user to modify his or her privileges/roles inside the application in ways that could allow privilege escalation attacks.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Privilege escalation occurs when a user gets access to more resources or functionality than they are normally allowed and such elevation/changes should have been prevented by the application. This is usually caused by a flaw in the application. The result is that the application performs actions with more privileges than those intended by the developer or system administrator.&lt;br /&gt;
&lt;br /&gt;
The degree of escalation depends on which privileges the attacker is authorized to possess and which privileges can be obtained in a successful exploit. For example, a programming error that allows a user to gain extra privilege after successful authentication limits the degree of escalation because the user is already authorized to hold some privilege. Likewise, a remote attacker gaining superuser privilege without any authentication presents a greater degree of escalation.&lt;br /&gt;
&lt;br /&gt;
Usually, we refer to ''vertical escalation'' when it is possible to access resources granted to more privileged accounts (e.g., acquiring administrative privileges for the application), and to ''horizontal escalation'' when it is possible to access resources granted to a similarly configured account (e.g., in an online banking application, accessing information related to a different user).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
'''Testing for role/privilege manipulation''' &amp;lt;br&amp;gt;&lt;br /&gt;
In every portion of the application where a user can create information in the database (e.g., making a payment, adding a contact, or sending a message), to receive information (statement of account, order details, etc.), or delete information (drop users, messages, etc.), it is necessary to record that functionality. The tester should try to access such function as another user in order to verify, for example, if it is possible to access a function that should not be permitted by the user's role/privilege (but might be permitted as another user).&lt;br /&gt;
&lt;br /&gt;
For example:&amp;lt;br&amp;gt;&lt;br /&gt;
The following HTTP POST allows the user that belongs to grp001 to access order #0001:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 POST /user/viewOrder.jsp HTTP/1.1&lt;br /&gt;
 Host: www.example.com&lt;br /&gt;
 ...&lt;br /&gt;
&lt;br /&gt;
 gruppoID=grp001&amp;amp;ordineID=0001&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Verify if a user that does not belong to grp001 can modify the value of the parameters ‘gruppoID’ and ‘ordineID’ to gain access to that privileged data.&lt;br /&gt;
&lt;br /&gt;
For example:&amp;lt;br&amp;gt;&lt;br /&gt;
The following server's answer shows a hidden field in the HTML returned to the user after a successful authentication.&lt;br /&gt;
&lt;br /&gt;
 HTTP/1.1 200 OK&lt;br /&gt;
 Server: Netscape-Enterprise/6.0&lt;br /&gt;
 Date: Wed, 1 Apr 2006 13:51:20 GMT&lt;br /&gt;
 Set-Cookie: USER=aW78ryrGrTWs4MnOd32Fs51yDqp; path=/; domain=www.example.com &lt;br /&gt;
 Set-Cookie: SESSION=k+KmKeHXTgDi1J5fT7Zz; path=/; domain= www.example.com&lt;br /&gt;
 Cache-Control: no-cache&lt;br /&gt;
 Pragma: No-cache &lt;br /&gt;
 Content-length: 247&lt;br /&gt;
 Content-Type: text/html&lt;br /&gt;
 Expires: Thu, 01 Jan 1970 00:00:00 GMT&lt;br /&gt;
 Connection: close&lt;br /&gt;
 &lt;br /&gt;
 &amp;lt;form  name=“autoriz&amp;quot; method=&amp;quot;POST&amp;quot; action = “visual.jsp&amp;quot;&amp;gt; &lt;br /&gt;
 &amp;lt;input type=&amp;quot;hidden&amp;quot; name=&amp;quot;profilo&amp;quot; value=&amp;quot;SistemiInf1&amp;quot;&amp;gt;                                         &lt;br /&gt;
 &amp;lt;body onload=&amp;quot;document.forms.autoriz.submit()&amp;quot;&amp;gt;&lt;br /&gt;
 &amp;lt;/td&amp;gt;&lt;br /&gt;
 &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
What if the tester modifies the value of the variable &amp;quot;profilo&amp;quot; to “SistemiInf9”? Is it possible to become administrator?&lt;br /&gt;
&lt;br /&gt;
For example:&amp;lt;br&amp;gt;&lt;br /&gt;
In an environment in which the server sends an error message contained as value in a specific parameter in a set of answer's codes, as the following:&lt;br /&gt;
&lt;br /&gt;
 @0`1`3`3``0`UC`1`Status`OK`SEC`5`1`0`ResultSet`0`PVValido`-1`0`0` Notifications`0`0`3`Command  Manager`0`0`0` StateToolsBar`0`0`0`    &lt;br /&gt;
 StateExecToolBar`0`0`0`FlagsToolBar`0&lt;br /&gt;
&lt;br /&gt;
The server gives an implicit trust to the user. It believes that the user will answer with the above message closing the session.&lt;br /&gt;
In this condition, verify that it is not possible to escalate privileges by modifying the parameter values.&lt;br /&gt;
In this particular example, by modifying the `PVValido` value from '-1' to '0' (no error conditions), it may be possible to authenticate as administrator to the server.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Result Expected:'''&amp;lt;br&amp;gt;&lt;br /&gt;
The tester should verify the execution of successful privilege escalation attempts.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Wikipedia: http://en.wikipedia.org/wiki/Privilege_escalation&amp;lt;br&amp;gt;&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
* OWASP WebScarab: [[OWASP_WebScarab_Project]]&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39195</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39195"/>
				<updated>2008-09-10T23:17:33Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
4.4 Business Logic Testing &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* The section read out a little longer then the other sections.  All the content was interestinga nd relevant.  I would suggest taking Example 2 and breaking it out into another example (Example 2.1 or 3?)in order to break up the flow. I found my self losing my train of thought the further I read into it&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.5 Authentication Testing&amp;lt;br&amp;gt; &lt;br /&gt;
*What is &amp;quot;provenance&amp;quot;? It might be better to use adifferent, more common word with the same meaning.  An average user might get confused if they do not know what it means. &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.1 Credentials transport over an encrypted channel &amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several grammar related changes (commas and is vs are)and one content change.  Please crosscheck to insure the context is the same and check for additional grammar issues.&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.2 Testing for user enumeration &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.3 Testing for Guessable (Dictionary) User Account &lt;br /&gt;
*  made several grammar related changes with regard to commas &lt;br /&gt;
4.5.4 Brute Force Testing &lt;br /&gt;
4.5.5 Testing for bypassing authentication schema &lt;br /&gt;
4.5.6 Testing for vulnerable remember password and pwd reset &lt;br /&gt;
4.5.7 Testing for Logout and Browser Cache Management Testing &lt;br /&gt;
4.5.8 Testing for CAPTCHA &lt;br /&gt;
4.5.9 Testing Multiple Factors Authentication &lt;br /&gt;
*  Changed some grammar (commas, capitolization)&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_Multiple_Factors_Authentication_(OWASP-AT-009)&amp;diff=39194</id>
		<title>Testing Multiple Factors Authentication (OWASP-AT-009)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_Multiple_Factors_Authentication_(OWASP-AT-009)&amp;diff=39194"/>
				<updated>2008-09-10T22:53:01Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Evaluating the strength of a “Multiple Factors Authentication system” (MFAS) is a critical task for the Penetration tester.  Banks and other Financial institutions are going to spend considerable amounts of money on expensive MFAS; therefore performing accurate tests before the adoption of a particular solution is absolutely suggested. In addition a further responsibility of the Penetration Testers is to acknowledge if the currently adopted MFAS is effectively able to defend the organization assets from the threats that generally drive the adoption of a MFAS.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Generally the aim of a two factor authentication system is to enhance the strength of the authentication process [1]. This goal is achieved by checking an additional factor, or “something you have” as well as “something you know”, making sure that the user holds a hardware device of some kind in addition to the password. The hardware device provided  to the user may be able to communicate directly and independently  with the authentication infrastructure using an additional communication channel; this particular feature is something known as “separation of channels”.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bruce Schneier in 2005 observed that some years ago “the threats were all passive: eavesdropping and offline password guessing. Today, the threats are more active: phishing and Trojan horses” [2]. Actually the common threats that a MFAS in a Web environment should correctly address include:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
# Credential Theft (Phishing, Eavesdropping, MITM e.g. Banking from compromised network)&lt;br /&gt;
# Weak Credentials (Credentials Password guessing and Password Bruteforcing attacks)&lt;br /&gt;
# Session based attacks (Session Riding, Session Fixation)&lt;br /&gt;
# Trojan and Malware attacks (Banking from compromised clients)&lt;br /&gt;
# Password Reuse (Using the same password for different purposes or operations, e.g. different transactions)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The optimal solution should be able to address all the possible attacks related to the 5 categories above. &lt;br /&gt;
Since the strength of an authentication solution is generally classified depending on how many “authentication factors” are checked when the user gets in touch with the computing system, the typical IT professional’s advise is: “If you are not happy with your current authentication solution, just add another authentication factor and it will be all right”. [3] Unfortunately, as we will see in the next paragraphs, the risk associated to attacks performed by motivated attackers cannot be totally eliminated; in addition some MFAS solutions are more flexible and secure compared to the others.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Considering the ''5-Threats (5T)'' above we could analyze the strength of a particular MFAS solution, since the solution may be able to ''Address'', ''Mitigate''  or ''Not Remediate'' that particular Web Attack.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example == &lt;br /&gt;
A minimum amount of information about the authentication schema in use is necessary for testing the security of the MFAS solution in place. This is the main reason why the “Black Box Testing” section has been omitted. In particular, a general knowledge about the whole authentication infrastructure is important because:&lt;br /&gt;
* MFAS solutions are principally implemented to authenticate disposal operations.  Disposal actions are supposed to be performed in the inner parts of the secure website. &lt;br /&gt;
* Attacks carried out successfully against MFAS are performed with a high degree of control over what is happening. This statement is usually true because attackers can “grab” detailed information on a particular authentication infrastructure by harvesting any data they can intercept through Malware attacks. Assuming that an attacker must be a customer to know how the authentication of a banking website works is not always correct; the attackers just need to get control of a single customer to study the entire security infrastructure of a particular website (Authors of SilentBanker Trojan [4] are known for continuously collecting information of visited websites while infected users  browse the internet. Another example is the attack performed against the Swedish Nordea bank in 2005 [5]).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The following examples are about a security evaluation of different MFAS, based upon the ''5T'' model presented above.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The most common authentication solutions for Web applications is User ID and password authentication. In this case,  an additional password for authorizing wire transfers is often required.&lt;br /&gt;
MFAS solution add “something you have” to the authentication process. This component is usually a:&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* One-time password (OTP) generator token.&lt;br /&gt;
* Grid Card, Scratch Card and any information that only the legitimate user is supposed to have in his wallet &lt;br /&gt;
* Crypto devices like USB tokens or smart cards, equipped with X.509 certificates.&lt;br /&gt;
* Randomly generated OTPs transmitted through a GSM SMS messages [SMSOTP] [6]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The following examples are about the testing and evaluation of different implementations of MFAS similar to the ones above. Penetration Testers should consider all possible weaknesses of the current solution to propose the correct mitigating factors, in case the infrastructure is already in place. A correct evaluation may also permit to choose the right MFAS for the infrastructure during a preliminary solution selection.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
A mitigating factor is any additional component or countermeasure that might result in reduced likelihood of exploitation of a particular vulnerability. Credit cards are a perfect example. Notice how little attention is paid to cardholder authentication. Clerks barely check signatures. People use their cards over the phone and on the Internet, where the card's existence isn't even verified . The credit card companies spend their security dollar “controlling” the transaction, not the cardholder [7].  The transactions could be effectively controlled by behavioral algorithms that automatically fill up a risk score chart while the user uses his own credit card. Anything that is marked as suspected could be temporarily blocked by the circuit.&amp;lt;br&amp;gt;&lt;br /&gt;
Another mitigating factor is also informing the customer about what is happening through a separate and secure channel. Credit Card industry uses this method for informing the user about credit card transactions via SMS messages. If a fraudulent action is taken, the user knows immediately that something gone wrong with his credit card. Real time information through separate channels can also have an higher accuracy by informing the user about transactions, before those transactions are successfully.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Common '''&amp;quot;User ID, password and Disposal password&amp;quot;''' usually protect from (3), partially from (2). Usually do not protect from (1), (4) and (5). From a Penetration tester's point of view, for correctly testing this kind of authentication system, we should concentrate on what the solution should protect from.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In other words the adopters of a “User ID, Password and Disposal password” authentication solution should be protected from (2) and from (3). A penetration tester should check if the current implementation effectively enforce the adoption of strong passwords and if is resilient to Session Based attacks (e.g. Cross Site Request Forgeries attacks in order to force the user to submitting unwanted disposal operations).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Vulnerability Chart for “UserID + Password + Disposal Password” based authentication:&amp;lt;br&amp;gt;&lt;br /&gt;
**''Known Weaknesses:''  1, 4 ,5&amp;lt;br&amp;gt;&lt;br /&gt;
**''Known Weaknesses (Details):''  This technology doesn’t protect from (1)  because the password is static and can be stolen through blended threat attacks [8] (e.g.  MITM attack against a SSLv2 connection). It doesn’t protect from (4) and (5) because it’s possible to submit multiple transactions with the same disposal password.&amp;lt;br&amp;gt;&lt;br /&gt;
**''Strengths (if well implemented):'' 2, 3&lt;br /&gt;
**''Strengths (Details):''  This technology protects from (2) only if password enforcement rules are in place. It protects from (3) because the need for a disposal password does not permit an attacker to abuse the current user session to submit disposal operations [9].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Now let’s analyze some different implementations of MFASs:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''&amp;quot;One Time Password Tokens&amp;quot;''' protects from (1), (2) and (3) if well implemented. Do not always protect from (5). Almost never protect from (4).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Vulnerability Chart for &amp;quot;One Time Password Tokens&amp;quot; based authentication:&amp;lt;br&amp;gt;&lt;br /&gt;
**''Known Weaknesses:''   4, sometimes 5&amp;lt;br&amp;gt;&lt;br /&gt;
**''Known Weaknesses (Details):''  OTP tokens do not protect from (4), because Banking Malware is able to modify the Web Traffic in real-time upon pre-configured rules; examples of this kind include malicious codes SilentBanker, Mebroot, and Trojan Anserin . Banking Malware works like a web proxy interacting  with HTTPS pages. Since Malware takes total control over a compromised client, any action that a user performs is registered and controlled: Malware may stop a legitimate transaction and redirecting  the wire transfer to a different location. Password Reuse (5) is a vulnerability that may affect OTP tokens. Tokens are valid for a certain amount of time e.g. 30 seconds; if the authentication does not discard tokens that have been already used, it could be possible that a single token may authenticate multiple transactions during its 30 seconds lifetime.&amp;lt;br&amp;gt;&lt;br /&gt;
**''Strengths (if well implemented):'' 1,2,3&amp;lt;br&amp;gt;&lt;br /&gt;
**''Strengths (Details):''  OTP tokens mitigate effectively (1), because token lifetime is usually very short. In 30 seconds the attacker should be able to steal the token, entering the banking website and performing a transaction. It could be feasible, but it’s not usually going to happen in large scale attacks. Usually protect from (2) because OTP HMAC are at least 6 digits long. Penetration Testers should check that the algorithm implemented by the OTP tokens under the test is safe enough and not predictable.  Finally usually protect from (3) because the disposal token is always required. Penetration testers should verify that the procedure of requesting the validation token would not be bypassed.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''&amp;quot;Grid Cards, Scratch Cards and any information that only the legitimate user is supposed to have in his Wallet&amp;quot;'''&lt;br /&gt;
should protect from (1), (2), (3). Like OTP tokens cannot protect from (4). During testing activities grid cards in particular have been found vulnerable to (5). Scratch card are not vulnerable to password reuse, because any code can be used just one time.&amp;lt;br&amp;gt;&lt;br /&gt;
The penetration tester during the assessment of technologies of this kind should pay particular attention to Password Reuse attacks (5) for grid cards. A grid card based system commonly would request the same code multiple times. An attacker would just need to know a single valid disposal code (e.g one of those inside the grid card), and to wait until the system requests the code that he knows. Tested grid cards that contain a limited number of combinations are usually prone to this vulnerability. (e.g., if a grid card contains 50 combinations the attacker just needs to ask for a disposal, filling up the fields, checking the challenge, and so on. This attack is not about bruteforcing the disposal code, it’s about bruteforcing the challenge).  Other common mistakes include a weak password policy. Any disposal password contained  inside the gridcard should have a length of at least 6 numbers .  Attacks could be very effective in combination with blended threats or Cross Site Request forgeries.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''&amp;quot;Crypto Devices with certificates (Token USB, Smart Cards)&amp;quot;''' offer a good layer of defense from (1), (2). It’s a common mistake to believe that they would always protect from (3), (4) and (5).&lt;br /&gt;
Unfortunately technologies offer the best security promises and at the same time some of the worst implementations around.  USB tokens vary from vendor to vendor. Some of them authorize a user when they are plugged in, and do not authorize operations when they are unplugged. It seems to be a good behavior, but what it looks like is that some of them add further layers of implicit authentication. Those devices, do not protect users from (3) (e.g. Session Riding and Cross Site Scripting code for automating transfers).&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Custom “Randomly generated OTPs transmitted through a GSM SMS messages [SMSOTP]”''' could protect effectively from  (1), (2), (3) and (5). Could also mitigate effectively (4) if well implemented. This solution, compared to the previous one is the only one that uses an independent channel to communicate with the banking infrastructure.&lt;br /&gt;
This solution is usually very effective if well implemented. By separating the communication channels, it’s possible to inform the user about what is going on.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Ex. of a disposal token sent via SMS:&amp;lt;br&amp;gt;&lt;br /&gt;
 &amp;quot;This token: 32982747 authorizes a wire transfer of $ 1250.4 to bank account 2345623 Bank of NY&amp;quot;.&lt;br /&gt;
The previous token authorizes a unique transaction, that is reported inside the text of the SMS message. In this way the user can control that the intended transfer is effectively going to be directed to the right bank account.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
The approach described in this section is intended to provide a simple methodology to evaluate Multiple factor authentication systems. The examples shows are taken from real-case scenarios and can be used as a starting point for analyzing the efficacy of a custom MFAS.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
[1] [Definition] Wikipedia, Definition of Two Factor Authentication&amp;lt;br&amp;gt;&lt;br /&gt;
http://en.wikipedia.org/wiki/Two-factor_authentication&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[2] [SCHNEIER] Bruce Schneier, Blog Posts about two factor authentication 2005,&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.schneier.com/blog/archives/2005/03/the_failure_of.html&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.schneier.com/blog/archives/2005/04/more_on_twofact.html&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[3] [Finetti] Guido Mario Finetti, &amp;quot;Web application security in un-trusted client scenarios&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.scmagazineuk.com/Web-application-security-in-un-trusted-client-scenarios/article/110448&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[4] [SilentBanker Trojan] Symantec, Banking in Silence&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.symantec.com/enterprise/security_response/weblog/2008/01/banking_in_silence.html&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[5] [Nordea] Finextra, Phishing attacks against two factor authentication, 2005&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.finextra.com/fullstory.asp?id=14384&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[6] [SMSOTP] Bruce Schneier, “Two-Factor Authentication with Cell Phones”, November 2004,&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.schneier.com/blog/archives/2004/11/twofactor_authe.html&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[7] [Transaction Authentication Mindset] Bruce Schneier, &amp;quot;Fighting Fraudolent Transaction&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.schneier.com/blog/archives/2006/11/fighting_fraudu.html&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[8] [Blended Threat] http://en.wikipedia.org/wiki/Blended_threat&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[9] [GUNTEROLLMANN] Gunter Ollmann, “Web Based Session Management. Best practices in managing HTTP-based client sessions”,&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.technicalinfo.net/papers/WebBasedSessionManagement.htm&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39193</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39193"/>
				<updated>2008-09-10T22:17:08Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
4.4 Business Logic Testing &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* The section read out a little longer then the other sections.  All the content was interestinga nd relevant.  I would suggest taking Example 2 and breaking it out into another example (Example 2.1 or 3?)in order to break up the flow. I found my self losing my train of thought the further I read into it&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.5 Authentication Testing&amp;lt;br&amp;gt; &lt;br /&gt;
*What is &amp;quot;provenance&amp;quot;? It might be better to use adifferent, more common word with the same meaning.  An average user might get confused if they do not know what it means. &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.1 Credentials transport over an encrypted channel &amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several grammar related changes (commas and is vs are)and one content change.  Please crosscheck to insure the context is the same and check for additional grammar issues.&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.2 Testing for user enumeration &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.3 Testing for Guessable (Dictionary) User Account &lt;br /&gt;
*  made several grammar related changes with regard to commas &lt;br /&gt;
4.5.4 Brute Force Testing &lt;br /&gt;
4.5.5 Testing for bypassing authentication schema &lt;br /&gt;
4.5.6 Testing for vulnerable remember password and pwd reset &lt;br /&gt;
4.5.7 Testing for Logout and Browser Cache Management Testing &lt;br /&gt;
&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39190</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39190"/>
				<updated>2008-09-10T21:45:32Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
4.4 Business Logic Testing &amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* The section read out a little longer then the other sections.  All the content was interestinga nd relevant.  I would suggest taking Example 2 and breaking it out into another example (Example 2.1 or 3?)in order to break up the flow. I found my self losing my train of thought the further I read into it&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.5 Authentication Testing&amp;lt;br&amp;gt; &lt;br /&gt;
*What is &amp;quot;provenance&amp;quot;? It might be better to use adifferent, more common word with the same meaning.  An average user might get confused if they do not know what it means. &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.1 Credentials transport over an encrypted channel &amp;lt;br&amp;gt;&lt;br /&gt;
*  I made several grammar related changes (commas and is vs are)and one content change.  Please crosscheck to insure the context is the same and check for additional grammar issues.&amp;lt;br&amp;gt;&lt;br /&gt;
4.5.2 Testing for user enumeration &amp;lt;br&amp;gt;&lt;br /&gt;
4.5.3 Testing for Guessable (Dictionary) User Account &lt;br /&gt;
*  made several grammar related changes with regard to commas &lt;br /&gt;
4.5.4 Brute Force Testing &lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Default_or_Guessable_User_Account_(OWASP-AT-003)&amp;diff=39189</id>
		<title>Testing for Default or Guessable User Account (OWASP-AT-003)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Default_or_Guessable_User_Account_(OWASP-AT-003)&amp;diff=39189"/>
				<updated>2008-09-10T21:28:29Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
Today's web applications typically run on popular open source or commercial software that is installed on servers and requires configuration or customization by the server administrator. In addition, most of today's hardware appliances, i.e., network routers and database servers, offer web-based configuration or administrative interfaces.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Often these applications are not properly configured and the default credentials provided for initial authentication and configuration are never updated.  In addition, it is typical to find generic accounts, left over from testing or administration, that use common usernames and passwords and are left enabled in the application and its infrastructure.&amp;lt;br&amp;gt;&lt;br /&gt;
These default username and password combinations are widely known by penetration testers and malicious attackers, who can use them to gain access to various types of custom, open source, or commercial applications.&amp;lt;br&amp;gt;&lt;br /&gt;
In addition, weak password policy enforcements seen in many applications allow users to sign up using easy to guess usernames and passwords, and may also not allow password changes to be undertaken. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
The root cause of this problem can be identified as:&lt;br /&gt;
* Inexperienced IT personnel, who are unaware of the importance of changing default passwords on installed infrastructure components.&lt;br /&gt;
* Programmers who leave backdoors to easily access and test their application and later forget to remove them.&lt;br /&gt;
* Application administrators and users that choose an easy username and password for themselves &lt;br /&gt;
* Applications with built-in, non-removable default accounts with a pre-set username and password.&lt;br /&gt;
* Applications which leak information as to the validity of usernames during either authentication attempts, password resets, or account signup.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
An additional problem stems from the use of blank passwords, which are simply the result of a lack of security awareness or a desire to simplify administration.&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
In Blackbox testing the tester knows nothing about the application, its underlying infrastructure, and any username or password policies. In reality this is often this is not the case and some information about the application is known. If this is the case, simply skip the steps that refer to obtaining information you already have.&lt;br /&gt;
&lt;br /&gt;
When testing a known application interface, for example a Cisco router web interface or a Weblogic administrator portal, check that the known usernames and passwords for these devices do not result in successful authentication. Common credentials for many systems can be found using a search engine or by using one of the sites listed in the Further Reading section.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
When facing applications to which we do not have a list of default and common user accounts, or when common accounts do not work, we can perform manual testing:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Note that the application being tested may have an account lockout, and multiple password guess attempts with a known username may cause the account to be locked. If it is possible to lock the administrator account, it may be troublesome for the system administrator to reset it&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Many applications have verbose error messages that inform the site users as to the validity of entered usernames. This information will be helpful when testing for default or guessable user accounts. Such functionality can be found, for example, on the login page, password reset and forgotten password page, and sign up page. More information on this can be seen in the section [[Testing for user enumeration]].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
* Try the following usernames - &amp;quot;admin&amp;quot;, &amp;quot;administrator&amp;quot;, &amp;quot;root&amp;quot;, &amp;quot;system&amp;quot;, &amp;quot;guest&amp;quot;, &amp;quot;operator&amp;quot;, or &amp;quot;super&amp;quot;. These are popular among system administrators and are often used. Additionally you could try &amp;quot;qa&amp;quot;, &amp;quot;test&amp;quot;, &amp;quot;test1&amp;quot;, &amp;quot;testing&amp;quot;, &amp;quot;guest&amp;quot; and similar names. Attempt any combination of the above in both the username and the password fields. If the application is vulnerable to username enumeration, and you successfully manage to identify any of the above usernames, attempt passwords in a similar manner.  In addition try an empty password or one of the following &amp;quot;password&amp;quot;, &amp;quot;pass123&amp;quot;, &amp;quot;password123&amp;quot;, &amp;quot;admin&amp;quot;, or &amp;quot;guest&amp;quot; with the above accounts or any other enumerated accounts. Further permutations of the above can also be attempted. If these passwords fail, it may be worth using a common username and password list and attempting multiple requests against the application. This can, of course, be scripted to save time.&lt;br /&gt;
* Application administrative users are often named after the application or organization. This means if you are testing an application named &amp;quot;Obscurity&amp;quot;, try using obscurity/obscurity or any other similar combination as the username and password.&lt;br /&gt;
* When performing a test for a customer, attempt using names of contacts you have received as usernames with any common passwords.&lt;br /&gt;
* Viewing the User Registration page may help determine the expected format and length of the application usernames and passwords. If a user registration page does not exist, determine if the organization uses a standard naming convention for user names such as their email address or the name before the &amp;quot;@&amp;quot; in the email.   &lt;br /&gt;
* Attempt using all the above usernames with blank passwords.&lt;br /&gt;
* Review the page source and javascript either through a proxy or by viewing the source. Look for any references to users and passwords in the source. For example &amp;quot;If username='admin' then starturl=/admin.asp else /index.asp&amp;quot; (for a successful login vs a failed login).  Also, if you have a valid account, then login and view every request and response for a valid login vs an invalid login, such as additional hidden parameters, interesting GET request (login=yes), etc.&lt;br /&gt;
* Look for account names and passwords written in comments in the source code. Also look in backup directories, etc for source code that may contain comments of interest.&lt;br /&gt;
* Try to extrapolate from the application how usernames are generated. For example, can a user create their own username or does the system create an account for the user based on some personal information or a predictable sequence? If the application does create its own accounts in a predictable sequence, such as user7811, try fuzzing all possible accounts recursively.  If you can identify a different response from the application when using a valid username and a wrong password, then you can try a brute force attack on the valid username (or quickly try any of the identified common passwords above or in the reference section).  &lt;br /&gt;
* If the application creates its own passwords for new users, whether or not the username is created by the application or by the user, then try to determine if the password is predictable. Try to create many new accounts in quick succession to compare and determine if the passwords are predictable.  If predictable, then try to correlate these with the usernames, or any enumerated accounts, and use them as a basis for a brute force attack.&lt;br /&gt;
&lt;br /&gt;
'''Result Expected:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Successful authentication to the application or system being tested.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example == &lt;br /&gt;
The following steps rely on an entirely Gray Box approach. If only some of the information is available to you, refer to black box testing to fill the gaps.&lt;br /&gt;
&lt;br /&gt;
* Talk to the IT personnel to determine passwords they use for administrative access and how administration of the application is undertaken. &lt;br /&gt;
* Examine the password policy for the application, checking whether username and passwords are complex, difficult to guess, and not related to the application name, person name, or administrative names (&amp;quot;system&amp;quot;). &lt;br /&gt;
* Examine the user database for default names, application names, and easily guessed names as described in the Black Box testing section. Check for empty password fields.&lt;br /&gt;
* Examine the code for hard coded usernames and passwords.&lt;br /&gt;
* Check for configuration files that contain usernames and passwords.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Result Expected:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Successful authentication to the application or system being tested.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* CIRT http://www.cirt.net/passwords&lt;br /&gt;
* Government Security - Default Logins and Passwords for Networked Devices http://www.governmentsecurity.org/articles/DefaultLoginsandPasswordsforNetworkedDevices.php&lt;br /&gt;
* Virus.org http://www.virus.org/default-password/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Burp Intruder: http://portswigger.net/intruder/&lt;br /&gt;
* THC Hydra: http://www.thc.org/thc-hydra/&lt;br /&gt;
* Brutus http://www.hoobie.net/brutus/&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39188</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39188"/>
				<updated>2008-09-10T21:15:33Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
4.4 Business Logic Testing &lt;br /&gt;
* The section read out a little longer then the other sections.  All the content was interestinga nd relevant.  I would suggest taking Example 2 and breaking it out into another example (Example 2.1 or 3?)in order to break up the flow. I found my self losing my train of thought the further I read into it&lt;br /&gt;
&lt;br /&gt;
4.5 Authentication Testing&lt;br /&gt;
*What is &amp;quot;provenance&amp;quot;? It might be better to use adifferent, more common word with the same meaning.  An average user might get confused if they do not know what it means. &lt;br /&gt;
4.5.1 Credentials transport over an encrypted channel &lt;br /&gt;
*  I made several grammar related changes (commas and is vs are)and one content change.  Please crosscheck to insure the context is the same and check for additional grammar issues.&lt;br /&gt;
4.5.2 Testing for user enumeration &lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39183</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39183"/>
				<updated>2008-09-10T20:34:18Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
4.4 Business Logic Testing &lt;br /&gt;
* The section read out a little longer then the other sections.  All the content was interestinga nd relevant.  I would suggest taking Example 2 and breaking it out into another example (Example 2.1 or 3?)in order to break up the flow. I found my self losing my train of thought the further I read into it&lt;br /&gt;
&lt;br /&gt;
4.5 Authentication Testing&lt;br /&gt;
*What is &amp;quot;provenance&amp;quot;? It might be better to use adifferent, more common word with the same meaning.  An average user might get confused if they do not know what it means. &lt;br /&gt;
4.5.1 Credentials transport over an encrypted channel &lt;br /&gt;
*   Imade several grammar related changes (commas and is vs are)and one content change.  Please crosscheck to insure the context is the same and check for additional grammar issues.&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)&amp;diff=39182</id>
		<title>Testing for Credentials Transported over an Encrypted Channel (OTG-AUTHN-001)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)&amp;diff=39182"/>
				<updated>2008-09-10T20:30:28Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Testing for credentials transport means to verify that the user's authentication data are transferred via an encrypted channel to avoid being intercepted by malicious users. The analysis focuses simply on trying to understand if the data travels unencrypted from the web browser to the server, or if the web application takes the appropriate security measures using a protocol like HTTPS. The HTTPS protocol is built on TLS/SSL to encrypt the data that is transmitted and to ensure that user is beinging sent towards the desired site. Clearly, the fact that traffic is encrypted does not necessarily mean that it's completely safe. The security also depends on the encryption algorithm used and the robustness of the keys that the application is using, but this particular topic will not be addressed in this section. For a more detailed discussion on testing the safety of TLS/SSL channels you can refer to the chapter [[Testing for SSL-TLS]]. Here, the tester will just try to understand if the data that users put into web forms, for example, in order to log into a web site, are transmitted using secure protocols that protect them from an attacker or not. To do this we will consider various examples.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Nowadays, the most common example of this issue is the login page of a web application. The tester should verify that user's credentials are transmitted via an encrypted channel. In order to log into a web site, usually, the user has to fill a simple form that transmits the inserted data with the POST method. What is less obvious is that this data can be passed using the HTTP protocol, that means in a non-secure way, or using HTTPS, which encrypts the data. To further complicate things, there is the possibility that the site has the login page accessible via HTTP (making us believe that the transmission is insecure), but then it actually sends data via HTTPS. This test is done to be sure that an attacker cannot retrieve sensitive information by simply sniffing the net with a sniffer tool. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
In the following examples we will use WebScarab in order to capture packet headers and to inspect them. You can use any web proxy that you prefer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Case study: Sending data with POST method through HTTP''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Suppose that the login page presents a form with fields User, Pass, and the Submit button to authenticate and give access to the application. If we look at the header of our request with WebScarab, we get something like this:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
POST http://www.example.com/AuthenticationServlet HTTP/1.1&lt;br /&gt;
Host: www.example.com&lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; it; rv:1.8.1.14) Gecko/20080404&lt;br /&gt;
Accept: text/xml,application/xml,application/xhtml+xml&lt;br /&gt;
Accept-Language: it-it,it;q=0.8,en-us;q=0.5,en;q=0.3&lt;br /&gt;
Accept-Encoding: gzip,deflate&lt;br /&gt;
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7&lt;br /&gt;
Keep-Alive: 300&lt;br /&gt;
Connection: keep-alive&lt;br /&gt;
Referer: http://www.example.com/index.jsp&lt;br /&gt;
Cookie: JSESSIONID=LVrRRQQXgwyWpW7QMnS49vtW1yBdqn98CGlkP4jTvVCGdyPkmn3S!&lt;br /&gt;
Content-Type: application/x-www-form-urlencoded&lt;br /&gt;
Content-length: 64&lt;br /&gt;
&lt;br /&gt;
delegated_service=218&amp;amp;User=test&amp;amp;Pass=test&amp;amp;Submit=SUBMIT&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
From this example the tester can understand that the POST sends the data to the page ''www.example.com/AuthenticationServlet'' simply using HTTP. So, in this case, data are transmitted without encryption and a malicious user could read our username and password by simply sniffing the net with a tool like Wireshark.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Case study: Sending data with POST method through HTTPS'''&lt;br /&gt;
&lt;br /&gt;
Suppose that our web application uses the HTTPS protocol to encrypt data we are sending (or at least for those relating to the authentication). In this case, trying to access the login page and to authenticate, the header of our POST request would be similar to the following:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
POST https://www.example.com:443/cgi-bin/login.cgi HTTP/1.1&lt;br /&gt;
Host: www.example.com&lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; it; rv:1.8.1.14) Gecko/20080404&lt;br /&gt;
Accept: text/xml,application/xml,application/xhtml+xml,text/html&lt;br /&gt;
Accept-Language: it-it,it;q=0.8,en-us;q=0.5,en;q=0.3&lt;br /&gt;
Accept-Encoding: gzip,deflate&lt;br /&gt;
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7&lt;br /&gt;
Keep-Alive: 300&lt;br /&gt;
Connection: keep-alive&lt;br /&gt;
Referer: https://www.example.com/cgi-bin/login.cgi&lt;br /&gt;
Cookie: language=English; &lt;br /&gt;
Content-Type: application/x-www-form-urlencoded&lt;br /&gt;
Content-length: 50&lt;br /&gt;
&lt;br /&gt;
Command=Login&amp;amp;User=test&amp;amp;Pass=test&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We can see that the request is addressed to&lt;br /&gt;
''www.example.com:443/cgi-bin/login.cgi'' using the HTTPS protocol.&lt;br /&gt;
This ensures that our data are sent through en encrypted channel and that they are not readable by other people. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Case study: sending data with POST method via HTTPS on a page reachable via HTTP'''&lt;br /&gt;
&lt;br /&gt;
Now, suppose to have a web page reachable via HTTP and that then only data sent from the authentication form are shipped via HTTPS. This means that our data is transmitted in a secure way through encryption. This situation occurs, for example, when we are on a portal of a big company that offers various information and services publicly available, without identification, but which has also a private section accessible from the home page through a login. So when we try to login, the header of our request will look like the following example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
POST https://www.example.com:443/login.do HTTP/1.1&lt;br /&gt;
Host: www.example.com&lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; it; rv:1.8.1.14) Gecko/20080404&lt;br /&gt;
Accept: text/xml,application/xml,application/xhtml+xml,text/html&lt;br /&gt;
Accept-Language: it-it,it;q=0.8,en-us;q=0.5,en;q=0.3&lt;br /&gt;
Accept-Encoding: gzip,deflate&lt;br /&gt;
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7&lt;br /&gt;
Keep-Alive: 300&lt;br /&gt;
Connection: keep-alive&lt;br /&gt;
Referer: http://www.example.com/homepage.do&lt;br /&gt;
Cookie: SERVTIMSESSIONID=s2JyLkvDJ9ZhX3yr5BJ3DFLkdphH0QNSJ3VQB6pLhjkW6F&lt;br /&gt;
Content-Type: application/x-www-form-urlencoded&lt;br /&gt;
Content-length: 45&lt;br /&gt;
&lt;br /&gt;
User=test&amp;amp;Pass=test&amp;amp;portal=ExamplePortal&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We can see that our request is addressed to ''www.example.com:443/login.do'' using HTTPS. But if we have a look at the referer field in the header (the page from which we came), it is ''www.example.com/homepage.do'' and is accessible via simple HTTP. So, in this case, we have no lock inside our browser window that tells us that we are using a secure connection, but, in reality, we are sending data via HTTPS. This ensures us that no other people can read the data that we are sending.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Case study: Sending data with GET method through HTTPS'''&lt;br /&gt;
&lt;br /&gt;
In this last example, suppose that the application transfers data using the GET method. This method should never be used in a form that transmits sensitive data such as username and password, because they are displayed in clear in the URL and this entails a whole set of security issues. So this example is purely demonstrative, but, in reality, it is strongly suggested to use the POST method instead. This is because when the GET method is used, the url that it requests is easily available from, for example, the server logs exposing your sensitive data to information leakage. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
GET https://www.example.com/success.html?user=test&amp;amp;pass=test HTTP/1.1&lt;br /&gt;
Host: www.example.com&lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; it; rv:1.8.1.14) Gecko/20080404&lt;br /&gt;
Accept: text/xml,application/xml,application/xhtml+xml,text/html&lt;br /&gt;
Accept-Language: it-it,it;q=0.8,en-us;q=0.5,en;q=0.3&lt;br /&gt;
Accept-Encoding: gzip,deflate&lt;br /&gt;
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7&lt;br /&gt;
Keep-Alive: 300&lt;br /&gt;
Connection: keep-alive&lt;br /&gt;
Referer: https://www.example.com/form.html&lt;br /&gt;
If-Modified-Since: Mon, 30 Jun 2008 07:55:11 GMT&lt;br /&gt;
If-None-Match: &amp;quot;43a01-5b-4868915f&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can see that the data is transferred in clear text in the URL and not in the body of the message as before. But we must consider that TLS/SSL is a level 5 protocol, a lower level than HTTP, then the whole HTTP package  is still encrypted and the URL is unreadable to an attacker. It is not a good practice to use the GET method in these cases, because the information contained in the URL can be stored in many servers such as proxy and web servers, leaking the privacy of the user's credentials.&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example == &lt;br /&gt;
Talk with the developers of the application and try to understand if they are aware of differences between HTTP and HTTPS protocols and why they should use the HTTPS for sensitive information transmissions.&amp;lt;br&amp;gt;&lt;br /&gt;
Then, check with them if HTTPS is used in every sensitive transmission, like those in login pages, to prevent unauthorized users to read the data.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* HTTP/1.1: Security Considerations - http://www.w3.org/Protocols/rfc2616/rfc2616-sec15.html&amp;lt;br&amp;gt;&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
* [[OWASP WebScarab Project|WebScarab]]&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39181</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39181"/>
				<updated>2008-09-10T20:19:18Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
4.4 Business Logic Testing &lt;br /&gt;
* The section read out a little longer then the other sections.  All the content was interestinga nd relevant.  I would suggest taking Example 2 and breaking it out into another example (Example 2.1 or 3?)in order to break up the flow. I found my self losing my train of thought the further I read into it&lt;br /&gt;
4.5 Authentication Testing&lt;br /&gt;
*What is &amp;quot;provenance&amp;quot;? It might be better to use adifferent, more common word with the same meaning.  An average user might get confused if they do not know what it means. &lt;br /&gt;
&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39178</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39178"/>
				<updated>2008-09-10T20:17:20Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
4.4 Business Logic Testing &lt;br /&gt;
* The section read out a little longer then the other sections.  All the content was interestinga nd relevant.  I would suggest taking Example 2 and breaking it out into another example (Example 2.1 or 3?)in order to break up the flow. I found my self losing my train of thought the further I read into it&lt;br /&gt;
4.5 Authentication Testing &lt;br /&gt;
&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39105</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39105"/>
				<updated>2008-09-10T16:10:22Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
* I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
* Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
* Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
* Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39104</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39104"/>
				<updated>2008-09-10T16:09:12Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
1. Frontispiece&amp;lt;br&amp;gt;&lt;br /&gt;
1.1 About the OWASP Testing Guide Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
1.2 About The Open Web Application Security Project&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
2. Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.1 The OWASP Testing Project&amp;lt;br&amp;gt; &lt;br /&gt;
2.2 Principles of Testing&amp;lt;br&amp;gt; &lt;br /&gt;
2.3 Testing Techniques Explained &amp;lt;br&amp;gt;&lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements,&amp;lt;br&amp;gt; &lt;br /&gt;
and test cases through use and misuse cases&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests&amp;lt;br&amp;gt; &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment&amp;lt;br&amp;gt; &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
3. The OWASP Testing Framework&amp;lt;br&amp;gt;&lt;br /&gt;
3.1. Overview&amp;lt;br&amp;gt; &lt;br /&gt;
3.2. Phase 1: Before Development Begins&amp;lt;br&amp;gt; &lt;br /&gt;
3.3. Phase 2: During Definition and Design&amp;lt;br&amp;gt; &lt;br /&gt;
3.4. Phase 3: During Development&amp;lt;br&amp;gt; &lt;br /&gt;
3.5. Phase 4: During Deployment&amp;lt;br&amp;gt; &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations&amp;lt;br&amp;gt; &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
4.Web Application Penetration Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.6 Analysis of Error Codes&amp;lt;br&amp;gt; &lt;br /&gt;
4.3 Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.2 DB Listener Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.4 Application Configuration Management Testing&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
** I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.5 Testing for File Extensions Handling&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives&amp;lt;br&amp;gt; &lt;br /&gt;
4.1.1 Testing Checklist&amp;lt;br&amp;gt; &lt;br /&gt;
4.2 Information Gathering&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance&amp;lt;br&amp;gt; &lt;br /&gt;
   ** Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
4.2.3 Identify application entry points&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint&amp;lt;br&amp;gt; &lt;br /&gt;
4.2.5 Application Discovery&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
10 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces&amp;lt;br&amp;gt; &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST&amp;lt;br&amp;gt; &lt;br /&gt;
** Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
** Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39103</id>
		<title>OWASP Testing Project v3 Review Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Project_v3_Review_Roadmap&amp;diff=39103"/>
				<updated>2008-09-10T16:03:13Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page track all the update to the Testing Guide v3 during the Reviewing phase.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In particular the focus is:&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the content of each article&amp;lt;br&amp;gt;&lt;br /&gt;
- Review the english sintax&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;attacker&amp;quot;, better &amp;quot;tester&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
- no &amp;quot;we describe&amp;quot;, but &amp;quot;it is described&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Official Testing Guide Reviewers are:&lt;br /&gt;
* Nam Nguyen&lt;br /&gt;
* Kevin R.Fuller&lt;br /&gt;
* if you want to review it add your name please and keep track of updating&lt;br /&gt;
&lt;br /&gt;
'''Nam Review:'''&lt;br /&gt;
----&lt;br /&gt;
Aug 31, 2008&lt;br /&gt;
* Appendix D&lt;br /&gt;
* Appendix C&lt;br /&gt;
* Appendix B&lt;br /&gt;
* Appendix A&lt;br /&gt;
* Chapter 5&lt;br /&gt;
** [[How to write the report of the testing]]&lt;br /&gt;
*** ``TO UPDATE WITH V3 controls`` is still in the article. Has it been updated to v3? '''(Mat: I'm updating it, thanks)'''&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.11 [[Testing for AJAX Vulnerabilities]]&lt;br /&gt;
*** There are mentioning of &amp;quot;attackers&amp;quot; but I think they are fine.&lt;br /&gt;
*** The subsection on Memory leaks is not complete.&lt;br /&gt;
** Section 4.11 [[Testing for AJAX]]&lt;br /&gt;
*** The subsection &amp;quot;Intercepting and Debugging JS code with Browsers&amp;quot; is very difficult to understand. I tried to fix it, but I'm afraid what I have might not reflect what the original author wanted to express.&lt;br /&gt;
&lt;br /&gt;
Sep 02, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.10&lt;br /&gt;
*** Subsection [[Testing for WS Replay]] Gray box testing and examples gives incomplete sample code. I believe the call to GetSessionIDMac() missed four parameters. In this same part, using SSL helps in preventing replay attack but it doesnt prevent replay attack by itself. In this same subection, the images show identifiable real Internet address in Hungary, should them be masked off?&lt;br /&gt;
&lt;br /&gt;
Sep 04, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.9&lt;br /&gt;
** Section 4.8&lt;br /&gt;
*** I'm not sure if format string could be classified under subsection 4.8.14 &amp;quot;Buffer overflow testing&amp;quot;.&lt;br /&gt;
*** Subsecion 4.8.3: Incomplete&lt;br /&gt;
*** Subsection 4.8.4: Incomplete&lt;br /&gt;
*** Subsection 4.8.5: What is &amp;quot;data-plane input&amp;quot;?&lt;br /&gt;
&lt;br /&gt;
Sep 06, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.8&lt;br /&gt;
&lt;br /&gt;
Sep 07, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.7&lt;br /&gt;
** Section 4.6&lt;br /&gt;
*** Subsection 4.6.1: &amp;quot;Review code for path traversal&amp;quot; does not exist in the Code Review Guide, or the link the broken.&lt;br /&gt;
** Section 4.5&lt;br /&gt;
&lt;br /&gt;
Sep 10, 2008&lt;br /&gt;
* Chapter 4&lt;br /&gt;
** Section 4.4&lt;br /&gt;
** Section 4.3&lt;br /&gt;
** Section 4.2&lt;br /&gt;
** Section 4.1&lt;br /&gt;
* Chapter 3&lt;br /&gt;
* Chapter 2&lt;br /&gt;
* Chapter 1&lt;br /&gt;
** [[Testing Guide Frontispiece]] still shows v2 editors and reviewers&lt;br /&gt;
** [[About The Open Web Application Security Project]] The link to the printed edition of the book is invalid. This page is a generally shared wiki page among all projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Kevin Review:'''&lt;br /&gt;
----&lt;br /&gt;
August 27/28th&lt;br /&gt;
articles reviewed&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
toimp: M.Meucci)1. Frontispiece&lt;br /&gt;
(toimp: M.Meucci)1.1 About the OWASP Testing Guide Project &lt;br /&gt;
&lt;br /&gt;
1.2 About The Open Web Application Security Project &lt;br /&gt;
&lt;br /&gt;
2. Introduction&lt;br /&gt;
2.1 The OWASP Testing Project &lt;br /&gt;
2.2 Principles of Testing &lt;br /&gt;
2.3 Testing Techniques Explained &lt;br /&gt;
2.4 Security requirements test derivation,functional and non functional test requirements, and test cases through use and misuse cases &lt;br /&gt;
2.4.1 Security tests integrated in developers and testers workflows &lt;br /&gt;
2.4.2 Developers' security tests: unit tests and component level tests &lt;br /&gt;
2.4.3 Functional testers' security tests: integrated system tests, tests in UAT, and production environment &lt;br /&gt;
2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting &lt;br /&gt;
&lt;br /&gt;
3. The OWASP Testing Framework&lt;br /&gt;
3.1. Overview &lt;br /&gt;
3.2. Phase 1: Before Development Begins &lt;br /&gt;
3.3. Phase 2: During Definition and Design &lt;br /&gt;
3.4. Phase 3: During Development &lt;br /&gt;
3.5. Phase 4: During Deployment &lt;br /&gt;
3.6. Phase 5: Maintenance and Operations &lt;br /&gt;
3.7. A Typical SDLC Testing Workflow&lt;br /&gt;
 &lt;br /&gt;
4.Web Application Penetration Testing &lt;br /&gt;
4.1 Introduction and Objectives &lt;br /&gt;
4.1.1 Testing Checklist &lt;br /&gt;
4.2 Information Gathering &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance &lt;br /&gt;
4.2.3 Identify application entry points &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint &lt;br /&gt;
4.2.5 Application Discovery &lt;br /&gt;
4.2.6 Analysis of Error Codes &lt;br /&gt;
4.3 Configuration Management Testing &lt;br /&gt;
4.3.1 SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity)&lt;br /&gt;
4.3.2 DB Listener Testing &lt;br /&gt;
4.3.3 Infrastructure Configuration Management Testing &lt;br /&gt;
4.3.4 Application Configuration Management Testing &lt;br /&gt;
  ** I was concerned about the structure and flow of this section.  It did not read cleanly for me and appeared more &amp;quot;wordy&amp;quot; then the other sections. The format also did not appear to be consistent with the other sections resulting in a disjointed feeling when reading it.&lt;br /&gt;
4.3.5 Testing for File Extensions Handling &lt;br /&gt;
4.3.6 Old, Backup and Unreferenced Files &lt;br /&gt;
&lt;br /&gt;
03 September, 2008&amp;lt;br&amp;gt;&lt;br /&gt;
4.1 Introduction and Objectives &lt;br /&gt;
4.1.1 Testing Checklist &lt;br /&gt;
4.2 Information Gathering &lt;br /&gt;
4.2.1 Spiders, Robots and Crawlers &lt;br /&gt;
4.2.2 Search Engine Discovery/Reconnaissance &lt;br /&gt;
   ** Changed &amp;quot;GoogleBot&amp;quot; to the &amp;quot;GoogleBot&amp;quot;&lt;br /&gt;
4.2.3 Identify application entry points &lt;br /&gt;
4.2.4 Testing for Web Application Fingerprint &lt;br /&gt;
4.2.5 Application Discovery &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
10 September, 2008&lt;br /&gt;
4.3.7 Infrastructure and Application Admin Interfaces &lt;br /&gt;
4.3.8 Testing for HTTP Methods and XST &lt;br /&gt;
   ** Grammer change in the section &amp;quot;Arbitrary HTTP Methods&amp;quot;. Changed &amp;quot;and / or&amp;quot; to &amp;quot;and/or&amp;quot;&lt;br /&gt;
   ** Grammer change in section &amp;quot;Test XST Potential&amp;quot;  andded a space between bullet number 1 and 2 and the text.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Questions: (Mat will answer it)&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Test_HTTP_Methods_(OTG-CONFIG-006)&amp;diff=39098</id>
		<title>Test HTTP Methods (OTG-CONFIG-006)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Test_HTTP_Methods_(OTG-CONFIG-006)&amp;diff=39098"/>
				<updated>2008-09-10T14:56:42Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
HTTP offers a number of methods that can be used to performs actions on the web server. Many of theses methods are designed to aid developers deploy and test HTTP applications. These HTTP methods can be used for nefarious purposes if the web server is misconfigured. Additionally, Cross Site Tracing (XST), a form of cross site scripting using the servers HTTP TRACE method, is examined.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Short Description of the Issue (Topic and Explanation) == &lt;br /&gt;
While GET and POST are by far the most common methods that are used to access information provided by a web server, the Hypertext Transfer Protocol (HTTP) allows several other (and somewhat less known) methods. RFC  2616 (which describes HTTP version 1.1 which is the today standard) defines the following eight methods:&lt;br /&gt;
&lt;br /&gt;
* HEAD&lt;br /&gt;
* GET&lt;br /&gt;
* POST&lt;br /&gt;
* PUT&lt;br /&gt;
* DELETE&lt;br /&gt;
* TRACE&lt;br /&gt;
* OPTIONS&lt;br /&gt;
* CONNECT&lt;br /&gt;
&lt;br /&gt;
Some of these methods can potentially pose a security risk for a web application, as they allow an attacker to modify the files stored on the web server and, in some scenarios, steal the credentials of legitimate users. More specifically, the methods that should be disabled are the following:&lt;br /&gt;
&lt;br /&gt;
* PUT: This method allows a client to upload new files on the web server. An attacker can exploit it by uploading malicious files (e.g.: an asp file that executes commands by invoking cmd.exe), or by simply using the victim server as a file repository&lt;br /&gt;
* DELETE: This method allows a client to delete a file on the web server. An attacker can exploit it as a very simple and direct way to deface a web site or to mount a DoS attack&lt;br /&gt;
* CONNECT:  This method could allow a client to use the web server as a proxy&lt;br /&gt;
* TRACE: This method simply echoes back to the client whatever string has been sent to the server, and it is used mainly for debugging purposes. This method, originally assumed harmless, can be used to mount an attack known as Cross Site Tracing, which has been discovered by Jeremiah Grossman (see links at the bottom of the page)&lt;br /&gt;
&lt;br /&gt;
If an application needs one or more of these methods, such as REST Web Services (which may require PUT or DELETE), it is important to check that their usage is properly limited to trusted users and safe conditions.&lt;br /&gt;
&lt;br /&gt;
== Arbitrary HTTP Methods ==&lt;br /&gt;
&lt;br /&gt;
Arshan Dabirsiaghi (see links) discovered that many web application frameworks allowed well chosen and/or arbitrary HTTP methods to bypass an environment level access control check:&lt;br /&gt;
&lt;br /&gt;
* Many frameworks and languages treat &amp;quot;HEAD&amp;quot; as a &amp;quot;GET&amp;quot; request, albeit one without any body in the response. If a security constraint was set on &amp;quot;GET&amp;quot; requests such that only &amp;quot;authenticatedUsers&amp;quot; could access GET requests for a particular servlet or resource, it would be bypassed for the &amp;quot;HEAD&amp;quot; version. This allowed unauthorized blind submission of any privileged GET request&lt;br /&gt;
&lt;br /&gt;
* Some frameworks allowed arbitrary HTTP methods such as &amp;quot;JEFF&amp;quot; or &amp;quot;CATS&amp;quot; to be used without limitation. These were treated as if a &amp;quot;GET&amp;quot; method was issued, and again were found not to be subject to method role based access control checks on a number of languages and frameworks, again allowing unauthorized blind submission of privileged GET requests.&lt;br /&gt;
&lt;br /&gt;
In many cases, code which explicitly checked for a &amp;quot;GET&amp;quot; or &amp;quot;POST&amp;quot; method would be safe. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
'''Discover the Supported Methods''' &amp;lt;br&amp;gt;&lt;br /&gt;
To perform this test, we need some way to figure out which HTTP methods are supported by the web server we are examining. The OPTIONS HTTP method provides us with the most direct and effective way to do that. RFC 2616 states that “The OPTIONS method represents a request for information about the  communication options available on the request/response chain identified by the Request-URI”. &lt;br /&gt;
&lt;br /&gt;
The testing method is extremely straightforward and we only need to fire up netcat (or telnet):&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
icesurfer@nightblade ~ $ nc www.victim.com 80 &lt;br /&gt;
OPTIONS / HTTP/1.1&lt;br /&gt;
Host: www.victim.com&lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK&lt;br /&gt;
Server: Microsoft-IIS/5.0&lt;br /&gt;
Date: Tue, 31 Oct 2006 08:00:29 GMT&lt;br /&gt;
Connection: close&lt;br /&gt;
Allow: GET, HEAD, POST, TRACE, OPTIONS&lt;br /&gt;
Content-Length: 0&lt;br /&gt;
&lt;br /&gt;
icesurfer@nightblade ~ $ &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
As we can see in the example, OPTIONS provides a list of the methods that are supported by the web server, and in this case we can see, for instance, that TRACE method is enabled. The danger that is posed by this method is illustrated in the following section&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Test XST Potential'''&amp;lt;br&amp;gt;&lt;br /&gt;
Note: in order to understand the logic and the goals of this attack you need to be familiar with [[Cross_site_scripting_AoC | Cross Site Scripting attacks]].&lt;br /&gt;
&lt;br /&gt;
The TRACE method, while apparently harmless, can be successfully leveraged in some scenarios to steal legitimate users' credentials. This attack technique was discovered by Jeremiah Grossman in 2003, in an attempt to bypass the [[HTTPOnly]] tag that Microsoft introduced in Internet Explorer 6 sp1 to protect cookies from being accessed by JavaScript. As a matter of fact, one of the most recurring attack patterns in Cross Site Scripting is to access the document.cookie object and send it to a web server controlled by the attacker so that he/she can hijack the victim's session. Tagging a cookie as httpOnly forbids JavaScript to access it, protecting it from being sent to a third party. However, the TRACE method can be used to bypass this protection and access the cookie even in this scenario.&lt;br /&gt;
&lt;br /&gt;
As mentioned before, TRACE simply returns any string that is sent to the web server. In order to verify its presence (or to double-check the results of the OPTIONS request shown above), we can proceed as shown in the following example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
icesurfer@nightblade ~ $ nc www.victim.com 80&lt;br /&gt;
TRACE / HTTP/1.1&lt;br /&gt;
Host: www.victim.com&lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK&lt;br /&gt;
Server: Microsoft-IIS/5.0&lt;br /&gt;
Date: Tue, 31 Oct 2006 08:01:48 GMT&lt;br /&gt;
Connection: close&lt;br /&gt;
Content-Type: message/http&lt;br /&gt;
Content-Length: 39&lt;br /&gt;
&lt;br /&gt;
TRACE / HTTP/1.1&lt;br /&gt;
Host: www.victim.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
As we can see, the response body is exactly a copy of our original request, meaning that our target allows this method. Now, where is the danger lurking? If we instruct a browser to issue a TRACE request to the web server, and this browser has a cookie for that domain, the cookie will be automatically included in the request headers, and will therefore echoed back in the resulting response. At that point, the cookie string will be accessible by JavaScript and it will be finally possible to send it to a third party even when the cookie is tagged as httpOnly.&lt;br /&gt;
&lt;br /&gt;
There are multiple ways to make a browser issue a TRACE request, as the XMLHTTP ActiveX control in Internet Explorer and XMLDOM in Mozilla and Netscape. However, for security reasons the browser is allowed to start a connection only to the domain where the hostile script resides. This is a mitigating factor, as the attacker needs to combine the TRACE method with another vulnerability in order to mount the attack. Basically, an attacker has two ways to successfully launch a Cross Site Tracing attack:&lt;br /&gt;
&lt;br /&gt;
* 1. Leveraging another server-side vulnerability: the attacker injects the hostile JavaScript snippet, that contains the TRACE request, in the vulnerable application, as in a normal Cross Site Scripting attack&lt;br /&gt;
* 2. Leveraging a client-side vulnerability: the attacker creates a malicious website that contains the hostile JavaScript snippet and exploits some cross-domain vulnerability of the browser of the victim, in order to make the JavaScript code successfully perform a connection to the site that supports the TRACE method and that originated the cookie that the attacker is trying to steal.&lt;br /&gt;
&lt;br /&gt;
More detailed information, together with code samples, can be found in the original whitepaper written by Jeremiah Grossman.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Black Box Testing of HTTP method tampering ==&lt;br /&gt;
&lt;br /&gt;
Testing for HTTP method tampering is essentially the same as testing for XST. &lt;br /&gt;
&lt;br /&gt;
=== Testing for arbitrary HTTP methods ===&lt;br /&gt;
&lt;br /&gt;
Find a page you'd like to visit that has a security constraint such that it would normally force a 302 redirect to a login page or forces a login directly. The test URL in this example works like this - as do many web applications. However, if you obtain a &amp;quot;200&amp;quot; response that is not a login page, it is possible to bypass authentication and thus authorization.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[rapidoffenseunit:~] vanderaj% nc www.example.com 80&lt;br /&gt;
JEFF / HTTP/1.1&lt;br /&gt;
Host: www.example.com&lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK&lt;br /&gt;
Date: Mon, 18 Aug 2008 22:38:40 GMT&lt;br /&gt;
Server: Apache&lt;br /&gt;
Set-Cookie: PHPSESSID=K53QW...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If your framework or firewall or application does not support the &amp;quot;JEFF&amp;quot; method, it should issue an error page (or preferably a 405 Not Allowed or 501 Not implemented error page). If it services the request, it is vulnerable to this issue.&lt;br /&gt;
&lt;br /&gt;
If you feel that the system is vulnerable to this issue, issue CSRF-like attacks to exploit the issue more fully:&lt;br /&gt;
&lt;br /&gt;
* FOOBAR /admin/createUser.php?member=myAdmin&lt;br /&gt;
* JEFF /admin/changePw.php?member=myAdmin&amp;amp;passwd=foo123&amp;amp;confirm=foo123&lt;br /&gt;
* CATS /admin/groupEdit.php?group=Admins&amp;amp;member=myAdmin&amp;amp;action=add&lt;br /&gt;
&lt;br /&gt;
With some luck, using the above three commands - modified to suit the application under test and testing requirements - a new user would be created, a password assigned, and made an admin.&lt;br /&gt;
&lt;br /&gt;
=== Testing for HEAD access control bypass ===&lt;br /&gt;
&lt;br /&gt;
Find a page you'd like to visit that has a security constraint such that it would normally force a 302 redirect to a login page or forces a login directly. The test URL in this example works like this - as do many web applications. However, if you obtain a &amp;quot;200&amp;quot; response that is not a login page, it is possible to bypass authentication and thus authorization.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[rapidoffenseunit:~] vanderaj% nc www.example.com 80&lt;br /&gt;
HEAD /admin HTTP/1.1&lt;br /&gt;
Host: www.example.com&lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK&lt;br /&gt;
Date: Mon, 18 Aug 2008 22:44:11 GMT&lt;br /&gt;
Server: Apache&lt;br /&gt;
Set-Cookie: PHPSESSID=pKi...; path=/; HttpOnly&lt;br /&gt;
Expires: Thu, 19 Nov 1981 08:52:00 GMT&lt;br /&gt;
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0&lt;br /&gt;
Pragma: no-cache&lt;br /&gt;
Set-Cookie: adminOnlyCookie1=...; expires=Tue, 18-Aug-2009 22:44:31 GMT; domain=www.example.com&lt;br /&gt;
Set-Cookie: adminOnlyCookie2=...; expires=Mon, 18-Aug-2008 22:54:31 GMT; domain=www.example.com&lt;br /&gt;
Set-Cookie: adminOnlyCookie3=...; expires=Sun, 19-Aug-2007 22:44:30 GMT; domain=www.example.com&lt;br /&gt;
Content-Language: EN&lt;br /&gt;
Connection: close&lt;br /&gt;
Content-Type: text/html; charset=ISO-8859-1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you get a &amp;quot;405 Method not allowed&amp;quot; or &amp;quot;501 Method Unimplemented&amp;quot;, the application/framework/language/system/firewall is working correctly. If a &amp;quot;200&amp;quot; response code comes back, and the response contains no body, it's likely that the application has processed the request without authentication or authorization and further testing is warranted.  &lt;br /&gt;
&lt;br /&gt;
If you feel that the system is vulnerable to this issue, issue CSRF-like attacks to exploit the issue more fully:&lt;br /&gt;
&lt;br /&gt;
* HEAD /admin/createUser.php?member=myAdmin&lt;br /&gt;
* HEAD /admin/changePw.php?member=myAdmin&amp;amp;passwd=foo123&amp;amp;confirm=foo123&lt;br /&gt;
* HEAD /admin/groupEdit.php?group=Admins&amp;amp;member=myAdmin&amp;amp;action=add&lt;br /&gt;
&lt;br /&gt;
With some luck, using the above three commands - modified to suit the application under test and testing requirements - a new user would be created, a password assigned, and made an admin, all using blind request submission.&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example == &lt;br /&gt;
The testing in a Gray Box scenario follows the same steps of a Black Box scenario&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* RFC 2616: “Hypertext Transfer Protocol -- HTTP/1.1” &lt;br /&gt;
* RFC 2109 and RFC 2965: “HTTP State Management Mechanism” &lt;br /&gt;
* Jeremiah Grossman: &amp;quot;Cross Site Tracing (XST)&amp;quot; - http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf&amp;lt;br&amp;gt;&lt;br /&gt;
* Amit Klein: &amp;quot;XS(T) attack variants which can, in some cases, eliminate the need for TRACE&amp;quot; - http://www.securityfocus.com/archive/107/308433&lt;br /&gt;
* Arshan Dabirsiaghi: &amp;quot;Bypassing VBAAC with HTTP Verb Tampering&amp;quot; - http://www.aspectsecurity.com/documents/Bypassing_VBAAC_with_HTTP_Verb_Tampering.pdf&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&lt;br /&gt;
* NetCat - http://www.vulnwatch.org/netcat&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Test_HTTP_Methods_(OTG-CONFIG-006)&amp;diff=39097</id>
		<title>Test HTTP Methods (OTG-CONFIG-006)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Test_HTTP_Methods_(OTG-CONFIG-006)&amp;diff=39097"/>
				<updated>2008-09-10T14:55:00Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
HTTP offers a number of methods that can be used to performs actions on the web server. Many of theses methods are designed to aid developers deploy and test HTTP applications. These HTTP methods can be used for nefarious purposes if the web server is misconfigured. Additionally, Cross Site Tracing (XST), a form of cross site scripting using the servers HTTP TRACE method, is examined.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Short Description of the Issue (Topic and Explanation) == &lt;br /&gt;
While GET and POST are by far the most common methods that are used to access information provided by a web server, the Hypertext Transfer Protocol (HTTP) allows several other (and somewhat less known) methods. RFC  2616 (which describes HTTP version 1.1 which is the today standard) defines the following eight methods:&lt;br /&gt;
&lt;br /&gt;
* HEAD&lt;br /&gt;
* GET&lt;br /&gt;
* POST&lt;br /&gt;
* PUT&lt;br /&gt;
* DELETE&lt;br /&gt;
* TRACE&lt;br /&gt;
* OPTIONS&lt;br /&gt;
* CONNECT&lt;br /&gt;
&lt;br /&gt;
Some of these methods can potentially pose a security risk for a web application, as they allow an attacker to modify the files stored on the web server and, in some scenarios, steal the credentials of legitimate users. More specifically, the methods that should be disabled are the following:&lt;br /&gt;
&lt;br /&gt;
* PUT: This method allows a client to upload new files on the web server. An attacker can exploit it by uploading malicious files (e.g.: an asp file that executes commands by invoking cmd.exe), or by simply using the victim server as a file repository&lt;br /&gt;
* DELETE: This method allows a client to delete a file on the web server. An attacker can exploit it as a very simple and direct way to deface a web site or to mount a DoS attack&lt;br /&gt;
* CONNECT:  This method could allow a client to use the web server as a proxy&lt;br /&gt;
* TRACE: This method simply echoes back to the client whatever string has been sent to the server, and it is used mainly for debugging purposes. This method, originally assumed harmless, can be used to mount an attack known as Cross Site Tracing, which has been discovered by Jeremiah Grossman (see links at the bottom of the page)&lt;br /&gt;
&lt;br /&gt;
If an application needs one or more of these methods, such as REST Web Services (which may require PUT or DELETE), it is important to check that their usage is properly limited to trusted users and safe conditions.&lt;br /&gt;
&lt;br /&gt;
== Arbitrary HTTP Methods ==&lt;br /&gt;
&lt;br /&gt;
Arshan Dabirsiaghi (see links) discovered that many web application frameworks allowed well chosen and / or arbitrary HTTP methods to bypass an environment level access control check:&lt;br /&gt;
&lt;br /&gt;
* Many frameworks and languages treat &amp;quot;HEAD&amp;quot; as a &amp;quot;GET&amp;quot; request, albeit one without any body in the response. If a security constraint was set on &amp;quot;GET&amp;quot; requests such that only &amp;quot;authenticatedUsers&amp;quot; could access GET requests for a particular servlet or resource, it would be bypassed for the &amp;quot;HEAD&amp;quot; version. This allowed unauthorized blind submission of any privileged GET request&lt;br /&gt;
&lt;br /&gt;
* Some frameworks allowed arbitrary HTTP methods such as &amp;quot;JEFF&amp;quot; or &amp;quot;CATS&amp;quot; to be used without limitation. These were treated as if a &amp;quot;GET&amp;quot; method was issued, and again were found not to be subject to method role based access control checks on a number of languages and frameworks, again allowing unauthorized blind submission of privileged GET requests.&lt;br /&gt;
&lt;br /&gt;
In many cases, code which explicitly checked for a &amp;quot;GET&amp;quot; or &amp;quot;POST&amp;quot; method would be safe. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
'''Discover the Supported Methods''' &amp;lt;br&amp;gt;&lt;br /&gt;
To perform this test, we need some way to figure out which HTTP methods are supported by the web server we are examining. The OPTIONS HTTP method provides us with the most direct and effective way to do that. RFC 2616 states that “The OPTIONS method represents a request for information about the  communication options available on the request/response chain identified by the Request-URI”. &lt;br /&gt;
&lt;br /&gt;
The testing method is extremely straightforward and we only need to fire up netcat (or telnet):&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
icesurfer@nightblade ~ $ nc www.victim.com 80 &lt;br /&gt;
OPTIONS / HTTP/1.1&lt;br /&gt;
Host: www.victim.com&lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK&lt;br /&gt;
Server: Microsoft-IIS/5.0&lt;br /&gt;
Date: Tue, 31 Oct 2006 08:00:29 GMT&lt;br /&gt;
Connection: close&lt;br /&gt;
Allow: GET, HEAD, POST, TRACE, OPTIONS&lt;br /&gt;
Content-Length: 0&lt;br /&gt;
&lt;br /&gt;
icesurfer@nightblade ~ $ &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
As we can see in the example, OPTIONS provides a list of the methods that are supported by the web server, and in this case we can see, for instance, that TRACE method is enabled. The danger that is posed by this method is illustrated in the following section&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Test XST Potential'''&amp;lt;br&amp;gt;&lt;br /&gt;
Note: in order to understand the logic and the goals of this attack you need to be familiar with [[Cross_site_scripting_AoC | Cross Site Scripting attacks]].&lt;br /&gt;
&lt;br /&gt;
The TRACE method, while apparently harmless, can be successfully leveraged in some scenarios to steal legitimate users' credentials. This attack technique was discovered by Jeremiah Grossman in 2003, in an attempt to bypass the [[HTTPOnly]] tag that Microsoft introduced in Internet Explorer 6 sp1 to protect cookies from being accessed by JavaScript. As a matter of fact, one of the most recurring attack patterns in Cross Site Scripting is to access the document.cookie object and send it to a web server controlled by the attacker so that he/she can hijack the victim's session. Tagging a cookie as httpOnly forbids JavaScript to access it, protecting it from being sent to a third party. However, the TRACE method can be used to bypass this protection and access the cookie even in this scenario.&lt;br /&gt;
&lt;br /&gt;
As mentioned before, TRACE simply returns any string that is sent to the web server. In order to verify its presence (or to double-check the results of the OPTIONS request shown above), we can proceed as shown in the following example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
icesurfer@nightblade ~ $ nc www.victim.com 80&lt;br /&gt;
TRACE / HTTP/1.1&lt;br /&gt;
Host: www.victim.com&lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK&lt;br /&gt;
Server: Microsoft-IIS/5.0&lt;br /&gt;
Date: Tue, 31 Oct 2006 08:01:48 GMT&lt;br /&gt;
Connection: close&lt;br /&gt;
Content-Type: message/http&lt;br /&gt;
Content-Length: 39&lt;br /&gt;
&lt;br /&gt;
TRACE / HTTP/1.1&lt;br /&gt;
Host: www.victim.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
As we can see, the response body is exactly a copy of our original request, meaning that our target allows this method. Now, where is the danger lurking? If we instruct a browser to issue a TRACE request to the web server, and this browser has a cookie for that domain, the cookie will be automatically included in the request headers, and will therefore echoed back in the resulting response. At that point, the cookie string will be accessible by JavaScript and it will be finally possible to send it to a third party even when the cookie is tagged as httpOnly.&lt;br /&gt;
&lt;br /&gt;
There are multiple ways to make a browser issue a TRACE request, as the XMLHTTP ActiveX control in Internet Explorer and XMLDOM in Mozilla and Netscape. However, for security reasons the browser is allowed to start a connection only to the domain where the hostile script resides. This is a mitigating factor, as the attacker needs to combine the TRACE method with another vulnerability in order to mount the attack. Basically, an attacker has two ways to successfully launch a Cross Site Tracing attack:&lt;br /&gt;
&lt;br /&gt;
* 1. Leveraging another server-side vulnerability: the attacker injects the hostile JavaScript snippet, that contains the TRACE request, in the vulnerable application, as in a normal Cross Site Scripting attack&lt;br /&gt;
* 2. Leveraging a client-side vulnerability: the attacker creates a malicious website that contains the hostile JavaScript snippet and exploits some cross-domain vulnerability of the browser of the victim, in order to make the JavaScript code successfully perform a connection to the site that supports the TRACE method and that originated the cookie that the attacker is trying to steal.&lt;br /&gt;
&lt;br /&gt;
More detailed information, together with code samples, can be found in the original whitepaper written by Jeremiah Grossman.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Black Box Testing of HTTP method tampering ==&lt;br /&gt;
&lt;br /&gt;
Testing for HTTP method tampering is essentially the same as testing for XST. &lt;br /&gt;
&lt;br /&gt;
=== Testing for arbitrary HTTP methods ===&lt;br /&gt;
&lt;br /&gt;
Find a page you'd like to visit that has a security constraint such that it would normally force a 302 redirect to a login page or forces a login directly. The test URL in this example works like this - as do many web applications. However, if you obtain a &amp;quot;200&amp;quot; response that is not a login page, it is possible to bypass authentication and thus authorization.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[rapidoffenseunit:~] vanderaj% nc www.example.com 80&lt;br /&gt;
JEFF / HTTP/1.1&lt;br /&gt;
Host: www.example.com&lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK&lt;br /&gt;
Date: Mon, 18 Aug 2008 22:38:40 GMT&lt;br /&gt;
Server: Apache&lt;br /&gt;
Set-Cookie: PHPSESSID=K53QW...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If your framework or firewall or application does not support the &amp;quot;JEFF&amp;quot; method, it should issue an error page (or preferably a 405 Not Allowed or 501 Not implemented error page). If it services the request, it is vulnerable to this issue.&lt;br /&gt;
&lt;br /&gt;
If you feel that the system is vulnerable to this issue, issue CSRF-like attacks to exploit the issue more fully:&lt;br /&gt;
&lt;br /&gt;
* FOOBAR /admin/createUser.php?member=myAdmin&lt;br /&gt;
* JEFF /admin/changePw.php?member=myAdmin&amp;amp;passwd=foo123&amp;amp;confirm=foo123&lt;br /&gt;
* CATS /admin/groupEdit.php?group=Admins&amp;amp;member=myAdmin&amp;amp;action=add&lt;br /&gt;
&lt;br /&gt;
With some luck, using the above three commands - modified to suit the application under test and testing requirements - a new user would be created, a password assigned, and made an admin.&lt;br /&gt;
&lt;br /&gt;
=== Testing for HEAD access control bypass ===&lt;br /&gt;
&lt;br /&gt;
Find a page you'd like to visit that has a security constraint such that it would normally force a 302 redirect to a login page or forces a login directly. The test URL in this example works like this - as do many web applications. However, if you obtain a &amp;quot;200&amp;quot; response that is not a login page, it is possible to bypass authentication and thus authorization.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[rapidoffenseunit:~] vanderaj% nc www.example.com 80&lt;br /&gt;
HEAD /admin HTTP/1.1&lt;br /&gt;
Host: www.example.com&lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK&lt;br /&gt;
Date: Mon, 18 Aug 2008 22:44:11 GMT&lt;br /&gt;
Server: Apache&lt;br /&gt;
Set-Cookie: PHPSESSID=pKi...; path=/; HttpOnly&lt;br /&gt;
Expires: Thu, 19 Nov 1981 08:52:00 GMT&lt;br /&gt;
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0&lt;br /&gt;
Pragma: no-cache&lt;br /&gt;
Set-Cookie: adminOnlyCookie1=...; expires=Tue, 18-Aug-2009 22:44:31 GMT; domain=www.example.com&lt;br /&gt;
Set-Cookie: adminOnlyCookie2=...; expires=Mon, 18-Aug-2008 22:54:31 GMT; domain=www.example.com&lt;br /&gt;
Set-Cookie: adminOnlyCookie3=...; expires=Sun, 19-Aug-2007 22:44:30 GMT; domain=www.example.com&lt;br /&gt;
Content-Language: EN&lt;br /&gt;
Connection: close&lt;br /&gt;
Content-Type: text/html; charset=ISO-8859-1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you get a &amp;quot;405 Method not allowed&amp;quot; or &amp;quot;501 Method Unimplemented&amp;quot;, the application/framework/language/system/firewall is working correctly. If a &amp;quot;200&amp;quot; response code comes back, and the response contains no body, it's likely that the application has processed the request without authentication or authorization and further testing is warranted.  &lt;br /&gt;
&lt;br /&gt;
If you feel that the system is vulnerable to this issue, issue CSRF-like attacks to exploit the issue more fully:&lt;br /&gt;
&lt;br /&gt;
* HEAD /admin/createUser.php?member=myAdmin&lt;br /&gt;
* HEAD /admin/changePw.php?member=myAdmin&amp;amp;passwd=foo123&amp;amp;confirm=foo123&lt;br /&gt;
* HEAD /admin/groupEdit.php?group=Admins&amp;amp;member=myAdmin&amp;amp;action=add&lt;br /&gt;
&lt;br /&gt;
With some luck, using the above three commands - modified to suit the application under test and testing requirements - a new user would be created, a password assigned, and made an admin, all using blind request submission.&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example == &lt;br /&gt;
The testing in a Gray Box scenario follows the same steps of a Black Box scenario&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* RFC 2616: “Hypertext Transfer Protocol -- HTTP/1.1” &lt;br /&gt;
* RFC 2109 and RFC 2965: “HTTP State Management Mechanism” &lt;br /&gt;
* Jeremiah Grossman: &amp;quot;Cross Site Tracing (XST)&amp;quot; - http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf&amp;lt;br&amp;gt;&lt;br /&gt;
* Amit Klein: &amp;quot;XS(T) attack variants which can, in some cases, eliminate the need for TRACE&amp;quot; - http://www.securityfocus.com/archive/107/308433&lt;br /&gt;
* Arshan Dabirsiaghi: &amp;quot;Bypassing VBAAC with HTTP Verb Tampering&amp;quot; - http://www.aspectsecurity.com/documents/Bypassing_VBAAC_with_HTTP_Verb_Tampering.pdf&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&lt;br /&gt;
* NetCat - http://www.vulnwatch.org/netcat&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)&amp;diff=38196</id>
		<title>Conduct search engine discovery/reconnaissance for information leakage (OTG-INFO-001)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)&amp;diff=38196"/>
				<updated>2008-09-03T14:34:51Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
'''This is a draft of a section of the new Testing Guide v3'''&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This section describes how to search the Google Index and remove the associated web content from the Google Cache.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Once the GoogleBot has completed crawling, it commences indexing the web page based on tags and associated attributes, such as &amp;lt;TITLE&amp;gt;, in order to return the relevant search results. [1]&lt;br /&gt;
&lt;br /&gt;
If the robots.txt file is not updated during the lifetime of the web site, then it is possible for web content not intended to be included in Google's Search Results to be returned.&lt;br /&gt;
&lt;br /&gt;
Therefore, it must be removed from the Google Cache.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Black Box Testing==&lt;br /&gt;
Using the advanced &amp;quot;site:&amp;quot; search operator, it is possible to restrict Search Results to a specific domain [2].&lt;br /&gt;
&lt;br /&gt;
Google provides the Advanced &amp;quot;cache:&amp;quot; search operator [2], but this is the equivalent to clicking the &amp;quot;Cached&amp;quot; next to each Google Search Result.  Hence, the use of the Advanced &amp;quot;site:&amp;quot; Search Operator and then clicking &amp;quot;Cached&amp;quot; is preferred.&lt;br /&gt;
&lt;br /&gt;
The Google SOAP Search API supports the doGetCachedPage and the associated doGetCachedPageResponse SOAP Messages [3] to assist with retrieving cached pages. An implementation of this is under development by the [http://www.owasp.org/index.php/Category:OWASP_Google_Hacking_Project OWASP &amp;quot;Google Hacking&amp;quot; Project].&lt;br /&gt;
&lt;br /&gt;
== Example ==&lt;br /&gt;
To find the web content of owasp.org indexed by Google Cache the following Google Search Query is issued:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
site:owasp.org&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
[[Image:Google_site_Operator_Search_Results_Example.JPG]]&lt;br /&gt;
&lt;br /&gt;
To display the index.html of owasp.org as cached by Google the following Google Search Query is issued:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
cache:owasp.org&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
[[Image:Google_Cached_Example.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example == &lt;br /&gt;
Grey Box testing is the same as Black Box testing above.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[1] &amp;quot;Google 101: How Google crawls, indexes, and serves the web&amp;quot; - http://www.google.com/support/webmasters/bin/answer.py?answer=70897 &amp;lt;br&amp;gt;&lt;br /&gt;
[2] &amp;quot;Advanced Google Search Operators&amp;quot; - http://www.google.com/help/operators.html &amp;lt;br&amp;gt;&lt;br /&gt;
[3] &amp;quot;Google SOAP Search API&amp;quot; - http://code.google.com/apis/soapsearch/reference.html#1_2 &amp;lt;br&amp;gt;&lt;br /&gt;
[4] &amp;quot;Preventing content from appearing in Google search results&amp;quot; - http://www.google.com/support/webmasters/bin/topic.py?topic=8459&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Testing_Guide_3.0_50_Review_Second_Review_E&amp;diff=34946</id>
		<title>Project Information:template Testing Guide 3.0 50 Review Second Review E</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Testing_Guide_3.0_50_Review_Second_Review_E&amp;diff=34946"/>
				<updated>2008-07-29T21:13:45Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Testing Guide 3.0|Click here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''50% REVIEW PROCESS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Testing Project v3 Roadmap|OWASP Testing Project V3.0 Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25x%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Testing Project v3 Roadmap|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The Project is well on it's way to completion.  I read the various edits side by side with thier version 2 versions.  I see how the content changes will make the end product easier to read and understand.  The new additions, including the new attack vectors and testing methodologies, will help keep the guide current. The various new additions in the attack vectors and testing methodologies mentioned by reviewer one remain the primary uncompleted tasks.  &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
&lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Testing Project v3 Roadmap|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Considering the progress on the reorganization (90%)  I would mark the project at 60% done.&lt;br /&gt;
 |- &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
It would be usful, though maybe not practical, to somehow highlight the changes made when re-editing exisiting content? Reading side by side with the version 2 in order to identify the content added or changed was very time consuming and tiring.  Also there were a couple of spelling and grammar errors I noted in passing.  Nothing big but cause for note. &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:Sqlibench_50_Review_Second_Review_E&amp;diff=34450</id>
		<title>Project Information:Sqlibench 50 Review Second Review E</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:Sqlibench_50_Review_Second_Review_E&amp;diff=34450"/>
				<updated>2008-07-22T22:07:25Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP_Sqlibench_Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''50% REVIEW PROCESS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#SQL_Injector_Benchmarking_Project_.28SQLiBENCH.29|Sqlibench Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25x%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#SQL_Injector_Benchmarking_Project_.28SQLiBENCH.29|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 &lt;br /&gt;
The project easily met it's %50 percent goals on time and on schedule.  I concur that the documentation was well written.  I actually stepped through procedure and setup the test environment with little diffficulty.  The videos will only add value to this component.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#SQL_Injector_Benchmarking_Project_.28SQLiBENCH.29|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
The Project, at the half way point, is on track and on target for completion.  The only element not completed was the vulnerable application for Site Generator.  Since the decision was to not continue that goal the project reverts to 100% completion of the 50% target.&lt;br /&gt;
 |- &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
- It would be nice if the test environment could work through a web application in order to get a true emulation of     typical connectivity that the test tools may be run against.  Perhaps there may be an opportunity to create one or leverage an existing one like Webgoat to create this additional element for the test environment. &lt;br /&gt;
&lt;br /&gt;
- The matrix is a really nice addition to the project making it easy to locate and cross reference pertinent test information&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:Sqlibench_50_Review_Second_Review_E&amp;diff=34449</id>
		<title>Project Information:Sqlibench 50 Review Second Review E</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:Sqlibench_50_Review_Second_Review_E&amp;diff=34449"/>
				<updated>2008-07-22T21:59:35Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP_Sqlibench_Project|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''50% REVIEW PROCESS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#SQL_Injector_Benchmarking_Project_.28SQLiBENCH.29|Sqlibench Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25x%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#SQL_Injector_Benchmarking_Project_.28SQLiBENCH.29|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
&lt;br /&gt;
The project easily met it's %50 percent goals on time and on schedule.  I concur that the documentation was well written.  I actually stepped through procedure and setup the test environment with little difficulty.  The videos will only add value to this component.&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#SQL_Injector_Benchmarking_Project_.28SQLiBENCH.29|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008&amp;diff=34448</id>
		<title>OWASP EU Summit 2008</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008&amp;diff=34448"/>
				<updated>2008-07-22T21:47:51Z</updated>
		
		<summary type="html">&lt;p&gt;2a373: /* Summer of Code 08 Participants &amp;amp; Reviewers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;(WORK IN PROGRESS /UNDER DISCUSSION)&lt;br /&gt;
== UPDATES ==&lt;br /&gt;
*[[OWASP EU Summit 2008 - updates|'''OWASP EU Summit 2008 - updates''']]&lt;br /&gt;
&lt;br /&gt;
== What: OWASP Summit, a conference about OWASP and for OWASP's community ==&lt;br /&gt;
=== When: 4 to 7 Nov 2008 (4 &amp;amp; 5: Meetings and Training, 6 &amp;amp; 7: Conference) === &lt;br /&gt;
=== Where: Portugal ===&lt;br /&gt;
Faro or Lisbon&lt;br /&gt;
=== Organization===&lt;br /&gt;
Paulo Coimbra and Dinis Cruz&lt;br /&gt;
== Agenda ==&lt;br /&gt;
Theme: Present OWASP's projects, community and activities  .....     '....Connecting the dots.... &amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Day 1 &amp;amp; 2'''&lt;br /&gt;
*Training sessions (similar to what happens at the moment at the other OWASP conferences)&lt;br /&gt;
*OWASP Working Group sessions (1/2 day each) on:&lt;br /&gt;
** OWASP Governance, &amp;quot;What is OWASP's position on ....&amp;quot; &amp;amp; Action Plan for 2009&lt;br /&gt;
** ESAPI&lt;br /&gt;
** Browser Security&lt;br /&gt;
** OWASP Top 10 2009&lt;br /&gt;
&lt;br /&gt;
'''Day 3 &amp;amp; 4 Agenda:'''&lt;br /&gt;
* Presentations from AoC, SpoC and SoC Participants&lt;br /&gt;
* Presentations from 'Release' Quality OWASP projects (not included in the list above) or Key OWASP projects (like ESAPI)&lt;br /&gt;
* Presentations about OWASP : How it works, Financial reports, OotM (OWASP on the Move), new project management guidelines, local chapter finances, OWASP governance &lt;br /&gt;
* Presentation from Chapter leaders on the activities developed on their project&lt;br /&gt;
* Discussion on next steps for OWASP and focus of next OWASP financial investment plans&lt;br /&gt;
&lt;br /&gt;
Other ideas:&lt;br /&gt;
&lt;br /&gt;
* vote on 6th OWASP board member (Candidates to Apply)&lt;br /&gt;
&lt;br /&gt;
== other details==&lt;br /&gt;
&lt;br /&gt;
'''Projected Attendees:450 '''&lt;br /&gt;
* 200 with some (or all) expenses covered by OWASP&lt;br /&gt;
** 33 SoC participants&lt;br /&gt;
** 70 SoC reviewers&lt;br /&gt;
** 10 SoC Collaborators&lt;br /&gt;
** 15 AoC &amp;amp; SpoC participants&lt;br /&gt;
** 15 Chapter Leaders&lt;br /&gt;
** 8 OWASP Board &amp;amp; Employees&lt;br /&gt;
** 49 OWASP non-individual members (2x per 9k Corporate? 1x for the others?)&lt;br /&gt;
&lt;br /&gt;
=== Financial details ===&lt;br /&gt;
'''Expenses'''&lt;br /&gt;
* Accommodation &amp;amp; meals: 80,000 USD  = 400 USD per person (200x) for 3 nights accommodation  and 5 meals (3 dinners and 2 lunches)&lt;br /&gt;
* Flights &amp;amp;  Trains : 70,000 USD&lt;br /&gt;
&lt;br /&gt;
'''Revenue sources'''&lt;br /&gt;
* Tickets (for the 250 non 'OWASP invited' attendees)&lt;br /&gt;
* Training Sessions&lt;br /&gt;
* Conference sponsors&lt;br /&gt;
&lt;br /&gt;
== Participants ==&lt;br /&gt;
=== OWASP Board members &amp;amp; employees ===&lt;br /&gt;
* Jeff Williams &lt;br /&gt;
* Dave Wichers &lt;br /&gt;
* Dinis Cruz &lt;br /&gt;
* Tom Brennan &lt;br /&gt;
* Sebastien Deleersnyder &lt;br /&gt;
* Paulo Coimbra&lt;br /&gt;
* Kate Hartmann (to be confirmed)&lt;br /&gt;
* Alison McNamee (to be confirmed)&lt;br /&gt;
* Larry Casey (to be confirmed)&lt;br /&gt;
&lt;br /&gt;
=== Summer of Code 08 Participants &amp;amp; Reviewers ===&lt;br /&gt;
* (please add your name in the following format)&lt;br /&gt;
* OWASP Classic ASP Security Project&lt;br /&gt;
**Reviewer Esteban Ribicic Argentina -living in Croatia/Wien-&lt;br /&gt;
**Project Lead - Juan Carlos Calderon - Mexico&lt;br /&gt;
* OWASP Internationalization Guidelines &lt;br /&gt;
**Reviewer Esteban Ribicic Argentina -living in Croatia/Wien-&lt;br /&gt;
**Project Lead - Juan Carlos Calderon - Mexico&lt;br /&gt;
* OWASP Spanish Project Reviewer Esteban Ribicic&lt;br /&gt;
**Reviewer Esteban Ribicic Argentina -living in Croatia/Wien-&lt;br /&gt;
**Project Lead - Juan Carlos Calderon - Mexico&lt;br /&gt;
* OWASP Ruby on Rails Security Project Leader Heiko Webers from Germany&lt;br /&gt;
* OWASP Code Review Guide Lead - Eoin Keary - Ireland&lt;br /&gt;
* OWASP Enigform and mod_Openpgp - Arturo Alberto Busleiman (a.k.a Buanzo) - Argentina&lt;br /&gt;
* OWASP AppSensor - Michael Coates - United States&lt;br /&gt;
* OWASP ASDR - Leonardo Cavallari Militelli - Brazil&lt;br /&gt;
**Reviewer - Frederick Donovan - United States&lt;br /&gt;
*OWASP Corporate Application security guide- Parvathy Iyer- USA&lt;br /&gt;
* OWASP Positive Security - Eduardo Vianna de Camargo Neves - Brazil&lt;br /&gt;
* OWASP Backend Security Project - Carlo Pelliccioni - Italy&lt;br /&gt;
* OWASP Source Code Review OWASP Projects&lt;br /&gt;
**First Reviewer - Alexander Fry - USA&lt;br /&gt;
**Second Reviewer - Marco M. Morana - United States&lt;br /&gt;
* OWASP Access Control Rules Tester Project&lt;br /&gt;
**Project leader - Andrew Petukhov - Russia, Moscow&lt;br /&gt;
* OWASP Live CD 2008&lt;br /&gt;
** Project Leader - Matt Tesauro - Austin, USA&lt;br /&gt;
* OWASP OpenSign Server Project&lt;br /&gt;
** Reviewer Pierre Parrend - France&lt;br /&gt;
** SoC's Reviewer Kevin Fuller - Sacramento Ca, USA&lt;br /&gt;
* OWASP Securing WebGoat using ModSecurity&lt;br /&gt;
**Project Lead - Stephen Craig Evans - Singapore&lt;br /&gt;
* OWASP Teachable Static Analysis Workbench&lt;br /&gt;
**First Reviewer - Alexander Fry - USA&lt;br /&gt;
* OWASP WeBekci Project&lt;br /&gt;
**First Reviewer - Alexander Fry - USA&lt;br /&gt;
&lt;br /&gt;
=== Spring of Code 07 Participants (Completed Projects) ===&lt;br /&gt;
* Refresh Attacks list - Przemyslaw Skowron - Poland&lt;br /&gt;
&lt;br /&gt;
* (please add your name)&lt;br /&gt;
* {Project} {Name} {Origin Country}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Autumn of Code 06 Participants ===&lt;br /&gt;
* (please add your name)&lt;br /&gt;
* {Project} {Name} {Origin Country}&lt;br /&gt;
&lt;br /&gt;
* WebScarab-NG, Rogan Dawes, South Africa&lt;br /&gt;
* OWASP Pantera, Simon Roses Femerling, Spain&lt;br /&gt;
&lt;br /&gt;
=== Active Chapter Leaders ===&lt;br /&gt;
* (please add your name in the following format)&lt;br /&gt;
* {Chapter} {Role} {Name} {Origin Country}&lt;br /&gt;
* Helsinki chapter leader - Antti Laulajainen, Finland&lt;br /&gt;
* NY/NJ Metro Board Member - Steve Antoniewicz, USA&lt;br /&gt;
* Twin-Cities chapter leader - Kuai Hinojosa, MN, USA&lt;br /&gt;
* Hawaii chapter leader/founder - Jim Manico, Anahola, Island of Kauai, Hawaii, USA&lt;br /&gt;
&lt;br /&gt;
=== Active Project Leaders (not currently participating on SoC 08)===&lt;br /&gt;
* (please add your name in the following format)&lt;br /&gt;
* {Project} {Role} {Name} {Origin Country}&lt;br /&gt;
.NET ESAPI - Project Leader - Alex Smolen - USA&lt;br /&gt;
&lt;br /&gt;
=== Significant Past OWASP contributor (that is not already covered by one of the above categories) ===&lt;br /&gt;
* (please add your name in the following format)&lt;br /&gt;
* {Project/Chapter} {Role} {Name} {Origin Country}&lt;br /&gt;
&lt;br /&gt;
=== Logistic and Support team ===&lt;br /&gt;
* Summit Graphic Design + Summit organization + on-site logistics support, Sarah Cruz, UK (London)&lt;/div&gt;</summary>
		<author><name>2a373</name></author>	</entry>

	</feed>