<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Adl</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Adl"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Adl"/>
		<updated>2026-04-10T20:41:57Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator&amp;diff=27232</id>
		<title>SpoC 007 - OWASP Site Generator</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator&amp;diff=27232"/>
				<updated>2008-03-29T21:21:33Z</updated>
		
		<summary type="html">&lt;p&gt;Adl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[http://www.owasp.org/index.php/OWASP_Spring_Of_Code_2007_Selection Back to SpoC 007 Selection page]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Project Contributors''': Abby Levenberg, Boris Maletic&lt;br /&gt;
&lt;br /&gt;
'''Project coordinator''': Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
'''Project Progress''': 20% Complete, [[SpoC 007 - OWASP Site Generator - Progress Page|Progress Page]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Site Generator ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Executive Summary ===&lt;br /&gt;
&lt;br /&gt;
OWASP Site Generator is a great tool, but it could be even better and more widespread. There’s a lot room for improvements to both its functionality and user experience. The way I see it, main user needs to be addressed and specific development objectives for the next release of OWASP Site Generator would be the following. &lt;br /&gt;
&lt;br /&gt;
=== User Needs ===&lt;br /&gt;
&lt;br /&gt;
* Create multiple types of sites easily&lt;br /&gt;
* Track and analyze requests easily&lt;br /&gt;
* Change the look and feel of the resulting sites easily&lt;br /&gt;
* Create sites for multiple web backend technologies easily&lt;br /&gt;
* Learn how to use OWASP Site Generator easily  &lt;br /&gt;
&lt;br /&gt;
=== Development Objectives ===&lt;br /&gt;
&lt;br /&gt;
* Create a vulnerability library that can be used for web services, HTML forms, AJAX, etc. instead of having to craft the same attack for each&lt;br /&gt;
* Add support for logging of all received requests, as well as querying resulting log files&lt;br /&gt;
* &amp;quot;Templatize&amp;quot; the code generation process, so it can support skinning of the resulting sites&lt;br /&gt;
* &amp;quot;Templatize&amp;quot; the code generation process, so it can support different backend web technologies&lt;br /&gt;
* Fix all significant defects in the current release of OWASP Site Generator&lt;br /&gt;
* Redesign the GUI to make it more efficient and user friendly&lt;br /&gt;
* Create a smooth setup program which would install both client and server components as effortlessly as possible&lt;br /&gt;
* Write documentation and articles about it&lt;br /&gt;
* Make the development process open to the public and, hopefully, driven by its feedback from day one &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Development Links ===&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_OSG_Functional_Spec OWASP Site Generator Functional Specification]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_OSG_User_Stories OWASP Site Generator User Stories]'''&lt;br /&gt;
&lt;br /&gt;
'''[https://www.owasp.org/images/8/8a/OWASP_SiteGenerator_V2_DFD.pdf OWASP Site Generator Data Flow Diagram]'''&lt;/div&gt;</summary>
		<author><name>Adl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator&amp;diff=27231</id>
		<title>SpoC 007 - OWASP Site Generator</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator&amp;diff=27231"/>
				<updated>2008-03-29T21:19:42Z</updated>
		
		<summary type="html">&lt;p&gt;Adl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[http://www.owasp.org/index.php/OWASP_Spring_Of_Code_2007_Selection Back to SpoC 007 Selection page]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Project Contributors''': Abby Levenberg, Boris Maletic&lt;br /&gt;
&lt;br /&gt;
'''Project coordinator''': Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
'''Project Progress''': 20% Complete, [[SpoC 007 - OWASP Site Generator - Progress Page|Progress Page]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Site Generator ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Executive Summary ===&lt;br /&gt;
&lt;br /&gt;
OWASP Site Generator is a great tool, but it could be even better and more widespread. There’s a lot room for improvements to both its functionality and user experience. The way I see it, main user needs to be addressed and specific development objectives for the next release of OWASP Site Generator would be the following. &lt;br /&gt;
&lt;br /&gt;
=== User Needs ===&lt;br /&gt;
&lt;br /&gt;
* Create multiple types of sites easily&lt;br /&gt;
* Track and analyze requests easily&lt;br /&gt;
* Change the look and feel of the resulting sites easily&lt;br /&gt;
* Create sites for multiple web backend technologies easily&lt;br /&gt;
* Learn how to use OWASP Site Generator easily  &lt;br /&gt;
&lt;br /&gt;
=== Development Objectives ===&lt;br /&gt;
&lt;br /&gt;
* Create a vulnerability library that can be used for web services, HTML forms, AJAX, etc. instead of having to craft the same attack for each&lt;br /&gt;
* Add support for logging of all received requests, as well as querying resulting log files&lt;br /&gt;
* &amp;quot;Templatize&amp;quot; the code generation process, so it can support skinning of the resulting sites&lt;br /&gt;
* &amp;quot;Templatize&amp;quot; the code generation process, so it can support different backend web technologies&lt;br /&gt;
* Fix all significant defects in the current release of OWASP Site Generator&lt;br /&gt;
* Redesign the GUI to make it more efficient and user friendly&lt;br /&gt;
* Create a smooth setup program which would install both client and server components as effortlessly as possible&lt;br /&gt;
* Write documentation and articles about it&lt;br /&gt;
* Make the development process open to the public and, hopefully, driven by its feedback from day one &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Development Links ===&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_OSG_Functional_Spec OWASP Site Generator Functional Specification]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_OSG_User_Stories OWASP Site Generator User Stories]'''&lt;br /&gt;
&lt;br /&gt;
'''[OWASP_SiteGenerator_V2_DFD.pdf OWASP Site Generator Data Flow Diagram]'''&lt;/div&gt;</summary>
		<author><name>Adl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_SiteGenerator_V2_DFD.pdf&amp;diff=27230</id>
		<title>File:OWASP SiteGenerator V2 DFD.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_SiteGenerator_V2_DFD.pdf&amp;diff=27230"/>
				<updated>2008-03-29T21:16:46Z</updated>
		
		<summary type="html">&lt;p&gt;Adl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator&amp;diff=27229</id>
		<title>SpoC 007 - OWASP Site Generator</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator&amp;diff=27229"/>
				<updated>2008-03-29T21:14:51Z</updated>
		
		<summary type="html">&lt;p&gt;Adl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[http://www.owasp.org/index.php/OWASP_Spring_Of_Code_2007_Selection Back to SpoC 007 Selection page]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Project Contributors''': Abby Levenberg, Boris Maletic&lt;br /&gt;
&lt;br /&gt;
'''Project coordinator''': Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
'''Project Progress''': 20% Complete, [[SpoC 007 - OWASP Site Generator - Progress Page|Progress Page]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Site Generator ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Executive Summary ===&lt;br /&gt;
&lt;br /&gt;
OWASP Site Generator is a great tool, but it could be even better and more widespread. There’s a lot room for improvements to both its functionality and user experience. The way I see it, main user needs to be addressed and specific development objectives for the next release of OWASP Site Generator would be the following. &lt;br /&gt;
&lt;br /&gt;
=== User Needs ===&lt;br /&gt;
&lt;br /&gt;
* Create multiple types of sites easily&lt;br /&gt;
* Track and analyze requests easily&lt;br /&gt;
* Change the look and feel of the resulting sites easily&lt;br /&gt;
* Create sites for multiple web backend technologies easily&lt;br /&gt;
* Learn how to use OWASP Site Generator easily  &lt;br /&gt;
&lt;br /&gt;
=== Development Objectives ===&lt;br /&gt;
&lt;br /&gt;
* Create a vulnerability library that can be used for web services, HTML forms, AJAX, etc. instead of having to craft the same attack for each&lt;br /&gt;
* Add support for logging of all received requests, as well as querying resulting log files&lt;br /&gt;
* &amp;quot;Templatize&amp;quot; the code generation process, so it can support skinning of the resulting sites&lt;br /&gt;
* &amp;quot;Templatize&amp;quot; the code generation process, so it can support different backend web technologies&lt;br /&gt;
* Fix all significant defects in the current release of OWASP Site Generator&lt;br /&gt;
* Redesign the GUI to make it more efficient and user friendly&lt;br /&gt;
* Create a smooth setup program which would install both client and server components as effortlessly as possible&lt;br /&gt;
* Write documentation and articles about it&lt;br /&gt;
* Make the development process open to the public and, hopefully, driven by its feedback from day one &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Development Links ===&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_OSG_Functional_Spec OWASP Site Generator Functional Specification]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_OSG_User_Stories OWASP Site Generator User Stories]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_OSG_dfd OWASP Site Generator Data Flow Diagram]'''&lt;/div&gt;</summary>
		<author><name>Adl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OSG_User_Stories&amp;diff=27228</id>
		<title>OWASP OSG User Stories</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OSG_User_Stories&amp;diff=27228"/>
				<updated>2008-03-29T21:13:29Z</updated>
		
		<summary type="html">&lt;p&gt;Adl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[https://www.owasp.org/index.php/SpoC_007_-_OWASP_Site_Generator Back to SpoC 007 OSG page]'''&lt;br /&gt;
&lt;br /&gt;
== Story #1 ==&lt;br /&gt;
Bob works for a small security consulting firm and has recently been given the job of teaching a local bank's developers common web security issues.  Instead of using an arbitrary website that has vulnerabilities in it he decides to make a copy of the bank's site and adding common vulnerabilities.  However, Bob is stretched thin and doesn't want to write all these vulnerabilities by hand.  He goes to OWASP because he knows of a project that he thinks will help him (OWASP Site Generator) looking at the project's area he thinks it will fit his needs.  Bob installs OSG and sets it up.  Once OSG is installed Bob launches htdig and crawls three levels deep of the bank's site and saves it to disk.  Launching OSG Bob creates a new site using the desktop application and then interlaces the pages with the vulnerabilities he wishes to showcase in the training. &lt;br /&gt;
&lt;br /&gt;
At the training Bob launches both the server and client applications and using the desktop client points the OSG site to use the custom layout he created.  Using the custom template the vulnerabilities sank into the developers at the local bank.  Also, because of his great performance Bob got a raise.  &lt;br /&gt;
&lt;br /&gt;
== Story #2 ==&lt;br /&gt;
Boris is a OWASP volunteer and finds out  about this cool new web attack.  He remembers that OWASP has a tool called OWASP Site Generator(OSG) that has a library of web attacks/vulnerabilities that can be included in web sites and web services.  Boris checks to see if this new attack is in the library of possible attacks, it is not.  He loads up his copy of Visual C# Express and imports in the IVulnerability interface into VS, so, that he can create this new web attack.  After creating the attack and testing it on his local machine.  He submits the source and a description to OWASP for approval and addition into the OSG attack library.  The attack gets approved and included into the library for other people to use.  Boris is also added to the list of people who have contributed to the library with links to what specifically he has added.&lt;br /&gt;
&lt;br /&gt;
== Story #3 ==&lt;br /&gt;
Boris is an entry-level ASP.NET developer, clueless about web security. But he has a gut-feeling that his web apps are not very secure. So he wants to learn more about security using this new cool tool, OSG. He cannot implement the IVulnerability interface, because he doesn't quite get the whole interfaces idea, and even if he did, he wouldn't know what to put in the implementation. Therefore, he completely relies on the existing vulnerabilities library built by other people and made publicly available by OWASP. Specifically, there are only two types of attacks that he's actually interested in: XSS and SQL injection. So, he opens the OSG client and starts a new project (site). He wants to add two pages to it, one for XSS, and another for SQL injection. But he has no idea how to do it. He then hits “create site” and a default template is used to generate a site with links to the XSS and SQL Injection examples he specified as being available for his site.&lt;/div&gt;</summary>
		<author><name>Adl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OSG_User_Stories&amp;diff=27227</id>
		<title>OWASP OSG User Stories</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OSG_User_Stories&amp;diff=27227"/>
				<updated>2008-03-29T21:00:43Z</updated>
		
		<summary type="html">&lt;p&gt;Adl: New page: == Story #1 == Bob works for a small security consulting firm and has recently been given the job of teaching a local bank's developers common web security issues.  Instead of using an arb...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Story #1 ==&lt;br /&gt;
Bob works for a small security consulting firm and has recently been given the job of teaching a local bank's developers common web security issues.  Instead of using an arbitrary website that has vulnerabilities in it he decides to make a copy of the bank's site and adding common vulnerabilities.  However, Bob is stretched thin and doesn't want to write all these vulnerabilities by hand.  He goes to OWASP because he knows of a project that he thinks will help him (OWASP Site Generator) looking at the project's area he thinks it will fit his needs.  Bob installs OSG and sets it up.  Once OSG is installed Bob launches htdig and crawls three levels deep of the bank's site and saves it to disk.  Launching OSG Bob creates a new site using the desktop application and then interlaces the pages with the vulnerabilities he wishes to showcase in the training. &lt;br /&gt;
&lt;br /&gt;
At the training Bob launches both the server and client applications and using the desktop client points the OSG site to use the custom layout he created.  Using the custom template the vulnerabilities sank into the developers at the local bank.  Also, because of his great performance Bob got a raise.  &lt;br /&gt;
&lt;br /&gt;
== Story #2 ==&lt;br /&gt;
Boris is a OWASP volunteer and finds out  about this cool new web attack.  He remembers that OWASP has a tool called OWASP Site Generator(OSG) that has a library of web attacks/vulnerabilities that can be included in web sites and web services.  Boris checks to see if this new attack is in the library of possible attacks, it is not.  He loads up his copy of Visual C# Express and imports in the IVulnerability interface into VS, so, that he can create this new web attack.  After creating the attack and testing it on his local machine.  He submits the source and a description to OWASP for approval and addition into the OSG attack library.  The attack gets approved and included into the library for other people to use.  Boris is also added to the list of people who have contributed to the library with links to what specifically he has added.&lt;br /&gt;
&lt;br /&gt;
== Story #3 ==&lt;br /&gt;
Boris is an entry-level ASP.NET developer, clueless about web security. But he has a gut-feeling that his web apps are not very secure. So he wants to learn more about security using this new cool tool, OSG. He cannot implement the IVulnerability interface, because he doesn't quite get the whole interfaces idea, and even if he did, he wouldn't know what to put in the implementation. Therefore, he completely relies on the existing vulnerabilities library built by other people and made publicly available by OWASP. Specifically, there are only two types of attacks that he's actually interested in: XSS and SQL injection. So, he opens the OSG client and starts a new project (site). He wants to add two pages to it, one for XSS, and another for SQL injection. But he has no idea how to do it. He then hits “create site” and a default template is used to generate a site with links to the XSS and SQL Injection examples he specified as being available for his site.&lt;/div&gt;</summary>
		<author><name>Adl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator&amp;diff=27226</id>
		<title>SpoC 007 - OWASP Site Generator</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator&amp;diff=27226"/>
				<updated>2008-03-29T20:59:22Z</updated>
		
		<summary type="html">&lt;p&gt;Adl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[http://www.owasp.org/index.php/OWASP_Spring_Of_Code_2007_Selection Back to SpoC 007 Selection page]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Project Contributors''': Abby Levenberg, Boris Maletic&lt;br /&gt;
&lt;br /&gt;
'''Project coordinator''': Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
'''Project Progress''': 20% Complete, [[SpoC 007 - OWASP Site Generator - Progress Page|Progress Page]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Site Generator ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Executive Summary ===&lt;br /&gt;
&lt;br /&gt;
OWASP Site Generator is a great tool, but it could be even better and more widespread. There’s a lot room for improvements to both its functionality and user experience. The way I see it, main user needs to be addressed and specific development objectives for the next release of OWASP Site Generator would be the following. &lt;br /&gt;
&lt;br /&gt;
=== User Needs ===&lt;br /&gt;
&lt;br /&gt;
* Create multiple types of sites easily&lt;br /&gt;
* Track and analyze requests easily&lt;br /&gt;
* Change the look and feel of the resulting sites easily&lt;br /&gt;
* Create sites for multiple web backend technologies easily&lt;br /&gt;
* Learn how to use OWASP Site Generator easily  &lt;br /&gt;
&lt;br /&gt;
=== Development Objectives ===&lt;br /&gt;
&lt;br /&gt;
* Create a vulnerability library that can be used for web services, HTML forms, AJAX, etc. instead of having to craft the same attack for each&lt;br /&gt;
* Add support for logging of all received requests, as well as querying resulting log files&lt;br /&gt;
* &amp;quot;Templatize&amp;quot; the code generation process, so it can support skinning of the resulting sites&lt;br /&gt;
* &amp;quot;Templatize&amp;quot; the code generation process, so it can support different backend web technologies&lt;br /&gt;
* Fix all significant defects in the current release of OWASP Site Generator&lt;br /&gt;
* Redesign the GUI to make it more efficient and user friendly&lt;br /&gt;
* Create a smooth setup program which would install both client and server components as effortlessly as possible&lt;br /&gt;
* Write documentation and articles about it&lt;br /&gt;
* Make the development process open to the public and, hopefully, driven by its feedback from day one &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Development Links ===&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_OSG_Functional_Spec OWASP Site Generator Functional Specification]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_OSG_User_Stories OWASP Site Generator User Stories]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Spring_Of_Code_2007_Selection Back to SpoC 007 Selection page]'''&lt;/div&gt;</summary>
		<author><name>Adl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator&amp;diff=27225</id>
		<title>SpoC 007 - OWASP Site Generator</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator&amp;diff=27225"/>
				<updated>2008-03-29T20:58:12Z</updated>
		
		<summary type="html">&lt;p&gt;Adl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[http://www.owasp.org/index.php/OWASP_Spring_Of_Code_2007_Selection Back to SpoC 007 Selection page]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Project Contributors''': Abby Levenberg, Boris Maletic&lt;br /&gt;
&lt;br /&gt;
'''Project coordinator''': Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
'''Project Progress''': 20% Complete, [[SpoC 007 - OWASP Site Generator - Progress Page|Progress Page]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Site Generator ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Executive Summary ===&lt;br /&gt;
&lt;br /&gt;
OWASP Site Generator is a great tool, but it could be even better and more widespread. There’s a lot room for improvements to both its functionality and user experience. The way I see it, main user needs to be addressed and specific development objectives for the next release of OWASP Site Generator would be the following. &lt;br /&gt;
&lt;br /&gt;
=== User Needs ===&lt;br /&gt;
&lt;br /&gt;
* Create multiple types of sites easily&lt;br /&gt;
* Track and analyze requests easily&lt;br /&gt;
* Change the look and feel of the resulting sites easily&lt;br /&gt;
* Create sites for multiple web backend technologies easily&lt;br /&gt;
* Learn how to use OWASP Site Generator easily  &lt;br /&gt;
&lt;br /&gt;
=== Development Objectives ===&lt;br /&gt;
&lt;br /&gt;
* Create a vulnerability library that can be used for web services, HTML forms, AJAX, etc. instead of having to craft the same attack for each&lt;br /&gt;
* Add support for logging of all received requests, as well as querying resulting log files&lt;br /&gt;
* &amp;quot;Templatize&amp;quot; the code generation process, so it can support skinning of the resulting sites&lt;br /&gt;
* &amp;quot;Templatize&amp;quot; the code generation process, so it can support different backend web technologies&lt;br /&gt;
* Fix all significant defects in the current release of OWASP Site Generator&lt;br /&gt;
* Redesign the GUI to make it more efficient and user friendly&lt;br /&gt;
* Create a smooth setup program which would install both client and server components as effortlessly as possible&lt;br /&gt;
* Write documentation and articles about it&lt;br /&gt;
* Make the development process open to the public and, hopefully, driven by its feedback from day one &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Development Links ===&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_OSG_Functional_Spec OWASP Site Generator Functional Specification]'''&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_OSG_User_Stories OWASP Site Generator User Stories]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Spring_Of_Code_2007_Selection Back to SpoC 007 Selection page]'''&lt;/div&gt;</summary>
		<author><name>Adl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator&amp;diff=27180</id>
		<title>SpoC 007 - OWASP Site Generator</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator&amp;diff=27180"/>
				<updated>2008-03-28T00:16:52Z</updated>
		
		<summary type="html">&lt;p&gt;Adl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[http://www.owasp.org/index.php/OWASP_Spring_Of_Code_2007_Selection Back to SpoC 007 Selection page]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Project Contributors''': Abby Levenberg, Boris Maletic&lt;br /&gt;
&lt;br /&gt;
'''Project coordinator''': Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
'''Project Progress''': 20% Complete, [[SpoC 007 - OWASP Site Generator - Progress Page|Progress Page]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Site Generator ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Executive Summary ===&lt;br /&gt;
&lt;br /&gt;
OWASP Site Generator is a great tool, but it could be even better and more widespread. There’s a lot room for improvements to both its functionality and user experience. The way I see it, main user needs to be addressed and specific development objectives for the next release of OWASP Site Generator would be the following. &lt;br /&gt;
&lt;br /&gt;
=== User Needs ===&lt;br /&gt;
&lt;br /&gt;
* Create multiple types of sites easily&lt;br /&gt;
* Track and analyze requests easily&lt;br /&gt;
* Change the look and feel of the resulting sites easily&lt;br /&gt;
* Create sites for multiple web backend technologies easily&lt;br /&gt;
* Learn how to use OWASP Site Generator easily  &lt;br /&gt;
&lt;br /&gt;
=== Development Objectives ===&lt;br /&gt;
&lt;br /&gt;
* Create a vulnerability library that can be used for web services, HTML forms, AJAX, etc. instead of having to craft the same attack for each&lt;br /&gt;
* Add support for logging of all received requests, as well as querying resulting log files&lt;br /&gt;
* &amp;quot;Templatize&amp;quot; the code generation process, so it can support skinning of the resulting sites&lt;br /&gt;
* &amp;quot;Templatize&amp;quot; the code generation process, so it can support different backend web technologies&lt;br /&gt;
* Fix all significant defects in the current release of OWASP Site Generator&lt;br /&gt;
* Redesign the GUI to make it more efficient and user friendly&lt;br /&gt;
* Create a smooth setup program which would install both client and server components as effortlessly as possible&lt;br /&gt;
* Write documentation and articles about it&lt;br /&gt;
* Make the development process open to the public and, hopefully, driven by its feedback from day one &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Development Links ===&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_OSG_Functional_Spec OWASP Site Generator Functional Specification]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Spring_Of_Code_2007_Selection Back to SpoC 007 Selection page]'''&lt;/div&gt;</summary>
		<author><name>Adl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator&amp;diff=27179</id>
		<title>SpoC 007 - OWASP Site Generator</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator&amp;diff=27179"/>
				<updated>2008-03-28T00:16:16Z</updated>
		
		<summary type="html">&lt;p&gt;Adl: /* Why I should be sponsored for the project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[http://www.owasp.org/index.php/OWASP_Spring_Of_Code_2007_Selection Back to SpoC 007 Selection page]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''AoC Candidate''': Boris&lt;br /&gt;
&lt;br /&gt;
'''Project coordinator''': Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
'''Project Progress''': 20% Complete, [[SpoC 007 - OWASP Site Generator - Progress Page|Progress Page]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Site Generator ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Executive Summary ===&lt;br /&gt;
&lt;br /&gt;
OWASP Site Generator is a great tool, but it could be even better and more widespread. There’s a lot room for improvements to both its functionality and user experience. The way I see it, main user needs to be addressed and specific development objectives for the next release of OWASP Site Generator would be the following. &lt;br /&gt;
&lt;br /&gt;
=== User Needs ===&lt;br /&gt;
&lt;br /&gt;
* Create multiple types of sites easily&lt;br /&gt;
* Track and analyze requests easily&lt;br /&gt;
* Change the look and feel of the resulting sites easily&lt;br /&gt;
* Create sites for multiple web backend technologies easily&lt;br /&gt;
* Learn how to use OWASP Site Generator easily  &lt;br /&gt;
&lt;br /&gt;
=== Development Objectives ===&lt;br /&gt;
&lt;br /&gt;
* Create a vulnerability library that can be used for web services, HTML forms, AJAX, etc. instead of having to craft the same attack for each&lt;br /&gt;
* Add support for logging of all received requests, as well as querying resulting log files&lt;br /&gt;
* &amp;quot;Templatize&amp;quot; the code generation process, so it can support skinning of the resulting sites&lt;br /&gt;
* &amp;quot;Templatize&amp;quot; the code generation process, so it can support different backend web technologies&lt;br /&gt;
* Fix all significant defects in the current release of OWASP Site Generator&lt;br /&gt;
* Redesign the GUI to make it more efficient and user friendly&lt;br /&gt;
* Create a smooth setup program which would install both client and server components as effortlessly as possible&lt;br /&gt;
* Write documentation and articles about it&lt;br /&gt;
* Make the development process open to the public and, hopefully, driven by its feedback from day one &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Development Links ===&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_OSG_Functional_Spec OWASP Site Generator Functional Specification]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Spring_Of_Code_2007_Selection Back to SpoC 007 Selection page]'''&lt;/div&gt;</summary>
		<author><name>Adl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator_-_Progress_Page&amp;diff=27178</id>
		<title>SpoC 007 - OWASP Site Generator - Progress Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator_-_Progress_Page&amp;diff=27178"/>
				<updated>2008-03-28T00:14:13Z</updated>
		
		<summary type="html">&lt;p&gt;Adl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[https://www.owasp.org/index.php/SpoC_007_-_OWASP_Site_Generator Back to SpoC 007 OSG page]'''&lt;br /&gt;
&lt;br /&gt;
== First Deliverable march 28th 2008 ==&lt;br /&gt;
* Developed the hollow framework for the new OSG that includes&lt;br /&gt;
** Owasp.Osg.HttpModule - can route any filetypes set in the web.config to it&lt;br /&gt;
** Owasp.Osg.Controller - currently only opens a go between connection&lt;br /&gt;
** Owasp.Osg.Communication - wraps shared comm classes and houses buffer that shares osg data between remote objects.&lt;/div&gt;</summary>
		<author><name>Adl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator_-_Progress_Page&amp;diff=27177</id>
		<title>SpoC 007 - OWASP Site Generator - Progress Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator_-_Progress_Page&amp;diff=27177"/>
				<updated>2008-03-28T00:12:37Z</updated>
		
		<summary type="html">&lt;p&gt;Adl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://www.owasp.org/index.php/Sponsored_Projects Back to Sponsored Projects]&lt;br /&gt;
&lt;br /&gt;
== First Deliverable march 28th 2008 ==&lt;br /&gt;
* Developed the hollow framework for the new OSG that includes&lt;br /&gt;
** Owasp.Osg.HttpModule - can route any filetypes set in the web.config to it&lt;br /&gt;
** Owasp.Osg.Controller - currently only opens a go between connection&lt;br /&gt;
** Owasp.Osg.Communication - wraps shared comm classes and houses buffer that shares osg data between remote objects.&lt;/div&gt;</summary>
		<author><name>Adl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OSG_Functional_Spec&amp;diff=27176</id>
		<title>OWASP OSG Functional Spec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OSG_Functional_Spec&amp;diff=27176"/>
				<updated>2008-03-28T00:07:24Z</updated>
		
		<summary type="html">&lt;p&gt;Adl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[https://www.owasp.org/index.php/SpoC_007_-_OWASP_Site_Generator Back to SpoC 007 OSG page]'''&lt;br /&gt;
&lt;br /&gt;
=== Overview ===&lt;br /&gt;
&lt;br /&gt;
Currently it is hard to use OSG.  There are a few things we want to improve in OSG to improve usability and increase adoption of OSG.&lt;br /&gt;
&lt;br /&gt;
1) Clean-up the user interface (UI) so it is more intuitive and explorable.&lt;br /&gt;
2) Be able to create a library of exploitable code that highlights common mistakes by developers and administrators.  This area will be used for dynamically generating websites and web services on the fly.  Currently a new page needs to be created for each exploit and transmission method. &lt;br /&gt;
&lt;br /&gt;
=== Components of OSG ===&lt;br /&gt;
&lt;br /&gt;
== Controller ==&lt;br /&gt;
This is a desktop application that opens up a port that listens for requests from given web page. The server will take a given site and URL and pass back one of the two following things:&lt;br /&gt;
1) The page rendered from a template. The template will be a master page in ASP.Net it will control the layout of the site and the actual content will be defined at the page level.  &lt;br /&gt;
2) The pages physical file location. Aspx files not needed really as everything will get built on the fly.  A few physical files we will need to know are the controls and master pages.  &lt;br /&gt;
&lt;br /&gt;
  NOTE: It is not uncommon for the old-school OSG devs to refer to this as the desktop client but in reality it is the server.&lt;br /&gt;
&lt;br /&gt;
== Client ==&lt;br /&gt;
The client is a web site or virtual folder that has an HTTPModule that talks with the server asking for the proper page to display to the user. &lt;br /&gt;
&lt;br /&gt;
=== UI Changes ===&lt;br /&gt;
TBD.&lt;br /&gt;
&lt;br /&gt;
=== Library specification ===&lt;br /&gt;
&lt;br /&gt;
QUESTION: DOES THIS MAKE SENSE, WHAT IS MISSING?&lt;br /&gt;
SHOULD THIS BE AN ABSTRACT CLASS INSTEAD?&lt;br /&gt;
&lt;br /&gt;
The following interface will be used for each exploit:&lt;br /&gt;
&lt;br /&gt;
  interface IExploit {&lt;br /&gt;
  /*&lt;br /&gt;
   * Description: This will be used for returning a form or web page to a calling site.&lt;br /&gt;
   * &lt;br /&gt;
   * Precondition: This string will be used on a web page and not something like a web service&lt;br /&gt;
   *&lt;br /&gt;
   * Postcondition: The HTML is returned and is ready to be used. &lt;br /&gt;
   */&lt;br /&gt;
  public string getExploitHtml();&lt;br /&gt;
  /*&lt;br /&gt;
   * Description: This method will be used for processing the form that was returned in the getExploitHtml call. &lt;br /&gt;
   *&lt;br /&gt;
   * Precondition: The HTTPRequest object is accessible&lt;br /&gt;
   */&lt;br /&gt;
  public string processExploitForm(); How are the form values passed on to this method? -Borismaletic 3/12/08 4:00 AM  Dude this is a functional spec not a dev-level spec.  It is to give you the general idea of how it will work.  Nothing here is set in stone, it is just some guidelines.  If you want a dev spec I should just create the program myself. -Medelibero 3/16/08 10:11 AM&lt;br /&gt;
  // Returns a web method defintion for use in a WSDL (is this even possible???)&lt;br /&gt;
  public string getWSDLDefinition(); Is this the idea here to create some test form that invokes the service based on this WSDL? Something like what Visual Studio does for asmx files (when opened in the browser)? -Borismaletic 3/12/08 4:01 AM &lt;br /&gt;
  /*&lt;br /&gt;
   * Description: This handle the processing of the Web Service Method. &lt;br /&gt;
   */&lt;br /&gt;
  public string processWebServiceMethod(); // What parameters does this need?  An Array? &lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
=== HTTPModule ===&lt;br /&gt;
The HTTPModule is the translator between the client and the server. How it works is every site request will initially get handled by the HTTPModule.  What the role of the HTTPModule will be is to look at the request and load the proper template and vulnerability values for the request. If the request does not tie to an existing page the default page should be displayed for the folder or site (folder gets precedence).  The HTTPModule will also have to figure out in what format the data should be returned.  For example if there is a POST request and we need to parse the data the HTTPModule should load the correct form parser and parse the form and return a response. &lt;br /&gt;
&lt;br /&gt;
=== Central Vulnerability Database ===&lt;br /&gt;
The central vulnerability database will be an area hosted on a web server (NOTE: Need to find out where this is) that will store all the vulnerabilities/web test cases.  The OSG “server” and httpmodule will use this information to show available vulnerabilities and to pull down the information they need.  This means that this central area will need to have a web service accessible to anyone.  Given OWASPs nature this needs to be done with security in mind so that it can withstand any assault since we don’t want some insecure on OWASP. &lt;br /&gt;
&lt;br /&gt;
Along with a web service trusted OWASP members will need to be able to go in and manage the available vulnerabilities.  We also need to allow for user submissions.  A user submission will not automatically be authorized but instead will be put in a “bucket” for the trusted OWASP members to review and authorize. &lt;br /&gt;
&lt;br /&gt;
=== Interface between the HTTPModule and the Controller ===&lt;br /&gt;
Description: This area will describe the interface/communication between the HTTPModule and the Controller.  Communication will happen when a new request comes in the HTTPModule will ask the Controller what page and information should actually be rendered. &lt;br /&gt;
&lt;br /&gt;
Details: My thought is to have the two components talk via .Net remoting.  In both of the areas there will be a configuration file specifying the port it needs to listen to or connect to.  The HTTPModule will initiate the connection and send over the data.  The data should be packaged in a class that would look something like.&lt;br /&gt;
&lt;br /&gt;
The httpmodule will send this&lt;br /&gt;
  Public class osgRequest {&lt;br /&gt;
    /* This will hold the URI that was request */&lt;br /&gt;
    public string RequestURI {&lt;br /&gt;
        // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
    /* This will hold the value from HttpRequest.Method, letting us know if it is a post, get, etc..*/&lt;br /&gt;
    public string RequestMethod {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
    /* This will hold a unique transaction ID, my thoughts are a GUID , the HTTPModule will need&lt;br /&gt;
        to keep track of valid transaction IDs so it can handle multiple requests*/&lt;br /&gt;
    public string transactionId {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
The controller will return this&lt;br /&gt;
  public class osgResponse {&lt;br /&gt;
    /* Holds the transactionID received from the osgRequest object */  &lt;br /&gt;
    public string transactionID {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
    /* Specifies the physical file location, if needed */&lt;br /&gt;
    public string PhysicalFileLocation {&lt;br /&gt;
       // TODO: Implement&lt;br /&gt;
    }&lt;br /&gt;
    /* Holds the template location */&lt;br /&gt;
    public string DisplayTemplateLocation {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
    /* This holds an object that implements the IExploit interface */&lt;br /&gt;
    public ***** Exploit {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
=== Changes Required ===&lt;br /&gt;
* New UI and probably a whole new desktop application&lt;br /&gt;
* A new HTTPModule that leverages the new vulnerability library&lt;br /&gt;
* An eye on making the web site portion of the program working on multiple web servers&lt;br /&gt;
* Create a better unified installer that sets up the initial web site along with installing all the bit correctly (this will use WiX)&lt;br /&gt;
* Make the websites be able to work under virtual directories&lt;br /&gt;
* Investigate the possibility of multiple web sites working at once against a OSG &amp;quot;server&amp;quot;&lt;br /&gt;
* Currently whenever a new site has to be created vulnerabilities have to be duplicated and are not dynamically loaded from a library of vulnerabilities.  On top of this the pages always have to be manually edited causing for user pain and very little point of OSG being there.  A user should be able to supply the pages and using tags like you will find in .Net for adding web-controls they will be able to specify where the vulnerability will be located.  That is what the user stories are for..they are examples..-Medelibero 3/16/08 10:10 AM    An example of this would be very useful. I am still trying to visualize the solution. -Borismaletic 3/12/08 4:13 AM      &lt;br /&gt;
* A central store for the majority of vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
'''[https://www.owasp.org/index.php/SpoC_007_-_OWASP_Site_Generator Back to SpoC 007 OSG page]'''&lt;/div&gt;</summary>
		<author><name>Adl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OSG_Functional_Spec&amp;diff=27175</id>
		<title>OWASP OSG Functional Spec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OSG_Functional_Spec&amp;diff=27175"/>
				<updated>2008-03-28T00:04:00Z</updated>
		
		<summary type="html">&lt;p&gt;Adl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Overview ===&lt;br /&gt;
&lt;br /&gt;
Currently it is hard to use OSG.  There are a few things we want to improve in OSG to improve usability and increase adoption of OSG.&lt;br /&gt;
&lt;br /&gt;
1) Clean-up the user interface (UI) so it is more intuitive and explorable.&lt;br /&gt;
2) Be able to create a library of exploitable code that highlights common mistakes by developers and administrators.  This area will be used for dynamically generating websites and web services on the fly.  Currently a new page needs to be created for each exploit and transmission method. &lt;br /&gt;
&lt;br /&gt;
=== Components of OSG ===&lt;br /&gt;
&lt;br /&gt;
== Controller ==&lt;br /&gt;
This is a desktop application that opens up a port that listens for requests from given web page. The server will take a given site and URL and pass back one of the two following things:&lt;br /&gt;
1) The page rendered from a template. The template will be a master page in ASP.Net it will control the layout of the site and the actual content will be defined at the page level.  &lt;br /&gt;
2) The pages physical file location. Aspx files not needed really as everything will get built on the fly.  A few physical files we will need to know are the controls and master pages.  &lt;br /&gt;
&lt;br /&gt;
  NOTE: It is not uncommon for the old-school OSG devs to refer to this as the desktop client but in reality it is the server.&lt;br /&gt;
&lt;br /&gt;
== Client ==&lt;br /&gt;
The client is a web site or virtual folder that has an HTTPModule that talks with the server asking for the proper page to display to the user. &lt;br /&gt;
&lt;br /&gt;
=== UI Changes ===&lt;br /&gt;
TBD.&lt;br /&gt;
&lt;br /&gt;
=== Library specification ===&lt;br /&gt;
&lt;br /&gt;
QUESTION: DOES THIS MAKE SENSE, WHAT IS MISSING?&lt;br /&gt;
SHOULD THIS BE AN ABSTRACT CLASS INSTEAD?&lt;br /&gt;
&lt;br /&gt;
The following interface will be used for each exploit:&lt;br /&gt;
&lt;br /&gt;
  interface IExploit {&lt;br /&gt;
  /*&lt;br /&gt;
   * Description: This will be used for returning a form or web page to a calling site.&lt;br /&gt;
   * &lt;br /&gt;
   * Precondition: This string will be used on a web page and not something like a web service&lt;br /&gt;
   *&lt;br /&gt;
   * Postcondition: The HTML is returned and is ready to be used. &lt;br /&gt;
   */&lt;br /&gt;
  public string getExploitHtml();&lt;br /&gt;
  /*&lt;br /&gt;
   * Description: This method will be used for processing the form that was returned in the getExploitHtml call. &lt;br /&gt;
   *&lt;br /&gt;
   * Precondition: The HTTPRequest object is accessible&lt;br /&gt;
   */&lt;br /&gt;
  public string processExploitForm(); How are the form values passed on to this method? -Borismaletic 3/12/08 4:00 AM  Dude this is a functional spec not a dev-level spec.  It is to give you the general idea of how it will work.  Nothing here is set in stone, it is just some guidelines.  If you want a dev spec I should just create the program myself. -Medelibero 3/16/08 10:11 AM&lt;br /&gt;
  // Returns a web method defintion for use in a WSDL (is this even possible???)&lt;br /&gt;
  public string getWSDLDefinition(); Is this the idea here to create some test form that invokes the service based on this WSDL? Something like what Visual Studio does for asmx files (when opened in the browser)? -Borismaletic 3/12/08 4:01 AM &lt;br /&gt;
  /*&lt;br /&gt;
   * Description: This handle the processing of the Web Service Method. &lt;br /&gt;
   */&lt;br /&gt;
  public string processWebServiceMethod(); // What parameters does this need?  An Array? &lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
=== HTTPModule ===&lt;br /&gt;
The HTTPModule is the translator between the client and the server. How it works is every site request will initially get handled by the HTTPModule.  What the role of the HTTPModule will be is to look at the request and load the proper template and vulnerability values for the request. If the request does not tie to an existing page the default page should be displayed for the folder or site (folder gets precedence).  The HTTPModule will also have to figure out in what format the data should be returned.  For example if there is a POST request and we need to parse the data the HTTPModule should load the correct form parser and parse the form and return a response. &lt;br /&gt;
&lt;br /&gt;
=== Central Vulnerability Database ===&lt;br /&gt;
The central vulnerability database will be an area hosted on a web server (NOTE: Need to find out where this is) that will store all the vulnerabilities/web test cases.  The OSG “server” and httpmodule will use this information to show available vulnerabilities and to pull down the information they need.  This means that this central area will need to have a web service accessible to anyone.  Given OWASPs nature this needs to be done with security in mind so that it can withstand any assault since we don’t want some insecure on OWASP. &lt;br /&gt;
&lt;br /&gt;
Along with a web service trusted OWASP members will need to be able to go in and manage the available vulnerabilities.  We also need to allow for user submissions.  A user submission will not automatically be authorized but instead will be put in a “bucket” for the trusted OWASP members to review and authorize. &lt;br /&gt;
&lt;br /&gt;
=== Interface between the HTTPModule and the Controller ===&lt;br /&gt;
Description: This area will describe the interface/communication between the HTTPModule and the Controller.  Communication will happen when a new request comes in the HTTPModule will ask the Controller what page and information should actually be rendered. &lt;br /&gt;
&lt;br /&gt;
Details: My thought is to have the two components talk via .Net remoting.  In both of the areas there will be a configuration file specifying the port it needs to listen to or connect to.  The HTTPModule will initiate the connection and send over the data.  The data should be packaged in a class that would look something like.&lt;br /&gt;
&lt;br /&gt;
The httpmodule will send this&lt;br /&gt;
  Public class osgRequest {&lt;br /&gt;
    /* This will hold the URI that was request */&lt;br /&gt;
    public string RequestURI {&lt;br /&gt;
        // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
    /* This will hold the value from HttpRequest.Method, letting us know if it is a post, get, etc..*/&lt;br /&gt;
    public string RequestMethod {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
    /* This will hold a unique transaction ID, my thoughts are a GUID , the HTTPModule will need&lt;br /&gt;
        to keep track of valid transaction IDs so it can handle multiple requests*/&lt;br /&gt;
    public string transactionId {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
The controller will return this&lt;br /&gt;
  public class osgResponse {&lt;br /&gt;
    /* Holds the transactionID received from the osgRequest object */  &lt;br /&gt;
    public string transactionID {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
    /* Specifies the physical file location, if needed */&lt;br /&gt;
    public string PhysicalFileLocation {&lt;br /&gt;
       // TODO: Implement&lt;br /&gt;
    }&lt;br /&gt;
    /* Holds the template location */&lt;br /&gt;
    public string DisplayTemplateLocation {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
    /* This holds an object that implements the IExploit interface */&lt;br /&gt;
    public ***** Exploit {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
=== Changes Required ===&lt;br /&gt;
* New UI and probably a whole new desktop application&lt;br /&gt;
* A new HTTPModule that leverages the new vulnerability library&lt;br /&gt;
* An eye on making the web site portion of the program working on multiple web servers&lt;br /&gt;
* Create a better unified installer that sets up the initial web site along with installing all the bit correctly (this will use WiX)&lt;br /&gt;
* Make the websites be able to work under virtual directories&lt;br /&gt;
* Investigate the possibility of multiple web sites working at once against a OSG &amp;quot;server&amp;quot;&lt;br /&gt;
* Currently whenever a new site has to be created vulnerabilities have to be duplicated and are not dynamically loaded from a library of vulnerabilities.  On top of this the pages always have to be manually edited causing for user pain and very little point of OSG being there.  A user should be able to supply the pages and using tags like you will find in .Net for adding web-controls they will be able to specify where the vulnerability will be located.  That is what the user stories are for..they are examples..-Medelibero 3/16/08 10:10 AM    An example of this would be very useful. I am still trying to visualize the solution. -Borismaletic 3/12/08 4:13 AM      &lt;br /&gt;
* A central store for the majority of vulnerabilities.&lt;/div&gt;</summary>
		<author><name>Adl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OSG_Functional_Spec&amp;diff=27174</id>
		<title>OWASP OSG Functional Spec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OSG_Functional_Spec&amp;diff=27174"/>
				<updated>2008-03-28T00:02:27Z</updated>
		
		<summary type="html">&lt;p&gt;Adl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Overview ===&lt;br /&gt;
&lt;br /&gt;
Currently it is hard to use OSG.  There are a few things we want to improve in OSG to improve usability and increase adoption of OSG.&lt;br /&gt;
&lt;br /&gt;
1) Clean-up the user interface (UI) so it is more intuitive and explorable.&lt;br /&gt;
2) Be able to create a library of exploitable code that highlights common mistakes by developers and administrators.  This area will be used for dynamically generating websites and web services on the fly.  Currently a new page needs to be created for each exploit and transmission method. &lt;br /&gt;
&lt;br /&gt;
=== Components of OSG ===&lt;br /&gt;
&lt;br /&gt;
== Controller ==&lt;br /&gt;
This is a desktop application that opens up a port that listens for requests from given web page. The server will take a given site and URL and pass back one of the two following things:&lt;br /&gt;
1) The page rendered from a template. The template will be a master page in ASP.Net it will control the layout of the site and the actual content will be defined at the page level.  &lt;br /&gt;
2) The pages physical file location. Aspx files not needed really as everything will get built on the fly.  A few physical files we will need to know are the controls and master pages.  &lt;br /&gt;
&lt;br /&gt;
  NOTE: It is not uncommon for the old-school OSG devs to refer to this as the desktop client but in reality it is the server.&lt;br /&gt;
&lt;br /&gt;
== Client ==&lt;br /&gt;
The client is a web site or virtual folder that has an HTTPModule that talks with the server asking for the proper page to display to the user. &lt;br /&gt;
&lt;br /&gt;
=== UI Changes ===&lt;br /&gt;
TBD.&lt;br /&gt;
&lt;br /&gt;
=== Library specification ===&lt;br /&gt;
&lt;br /&gt;
QUESTION: DOES THIS MAKE SENSE, WHAT IS MISSING?&lt;br /&gt;
SHOULD THIS BE AN ABSTRACT CLASS INSTEAD?&lt;br /&gt;
&lt;br /&gt;
The following interface will be used for each exploit:&lt;br /&gt;
&lt;br /&gt;
  interface IExploit {&lt;br /&gt;
  /*&lt;br /&gt;
   * Description: This will be used for returning a form or web page to a calling site.&lt;br /&gt;
   * &lt;br /&gt;
   * Precondition: This string will be used on a web page and not something like a web service&lt;br /&gt;
   *&lt;br /&gt;
   * Postcondition: The HTML is returned and is ready to be used. &lt;br /&gt;
   */&lt;br /&gt;
  public string getExploitHtml();&lt;br /&gt;
  /*&lt;br /&gt;
   * Description: This method will be used for processing the form that was returned in the getExploitHtml call. &lt;br /&gt;
   *&lt;br /&gt;
   * Precondition: The HTTPRequest object is accessible&lt;br /&gt;
   */&lt;br /&gt;
  public string processExploitForm(); How are the form values passed on to this method? -Borismaletic 3/12/08 4:00 AM  Dude this is a functional spec not a dev-level spec.  It is to give you the general idea of how it will work.  Nothing here is set in stone, it is just some guidelines.  If you want a dev spec I should just create the program myself. -Medelibero 3/16/08 10:11 AM&lt;br /&gt;
  // Returns a web method defintion for use in a WSDL (is this even possible???)&lt;br /&gt;
  public string getWSDLDefinition(); Is this the idea here to create some test form that invokes the service based on this WSDL? Something like what Visual Studio does for asmx files (when opened in the browser)? -Borismaletic 3/12/08 4:01 AM &lt;br /&gt;
  /*&lt;br /&gt;
   * Description: This handle the processing of the Web Service Method. &lt;br /&gt;
   */&lt;br /&gt;
  public string processWebServiceMethod(); // What parameters does this need?  An Array? &lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
=== HTTPModule ===&lt;br /&gt;
The HTTPModule is the translator between the client and the server. How it works is every site request will initially get handled by the HTTPModule.  What the role of the HTTPModule will be is to look at the request and load the proper template and vulnerability values for the request. If the request does not tie to an existing page the default page should be displayed for the folder or site (folder gets precedence).  The HTTPModule will also have to figure out in what format the data should be returned.  For example if there is a POST request and we need to parse the data the HTTPModule should load the correct form parser and parse the form and return a response. &lt;br /&gt;
&lt;br /&gt;
=== Central Vulnerability Database ===&lt;br /&gt;
The central vulnerability database will be an area hosted on a web server (NOTE: Need to find out where this is) that will store all the vulnerabilities/web test cases.  The OSG “server” and httpmodule will use this information to show available vulnerabilities and to pull down the information they need.  This means that this central area will need to have a web service accessible to anyone.  Given OWASPs nature this needs to be done with security in mind so that it can withstand any assault since we don’t want some insecure on OWASP. &lt;br /&gt;
&lt;br /&gt;
Along with a web service trusted OWASP members will need to be able to go in and manage the available vulnerabilities.  We also need to allow for user submissions.  A user submission will not automatically be authorized but instead will be put in a “bucket” for the trusted OWASP members to review and authorize. &lt;br /&gt;
&lt;br /&gt;
=== Interface between the HTTPModule and the Controller ===&lt;br /&gt;
Description: This area will describe the interface/communication between the HTTPModule and the Controller.  Communication will happen when a new request comes in the HTTPModule will ask the Controller what page and information should actually be rendered. &lt;br /&gt;
&lt;br /&gt;
Details: My thought is to have the two components talk via .Net remoting.  In both of the areas there will be a configuration file specifying the port it needs to listen to or connect to.  The HTTPModule will initiate the connection and send over the data.  The data should be packaged in a class that would look something like.&lt;br /&gt;
&lt;br /&gt;
The httpmodule will send this&lt;br /&gt;
  Public class osgRequest {&lt;br /&gt;
    /* This will hold the URI that was request */&lt;br /&gt;
    public string RequestURI {&lt;br /&gt;
        // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
    /* This will hold the value from HttpRequest.Method, letting us know if it is a post, get, etc..*/&lt;br /&gt;
    public string RequestMethod {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
    /* This will hold a unique transaction ID, my thoughts are a GUID , the HTTPModule will need&lt;br /&gt;
        to keep track of valid transaction IDs so it can handle multiple requests*/&lt;br /&gt;
    public string transactionId {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
The controller will return this&lt;br /&gt;
  public class osgResponse {&lt;br /&gt;
    /* Holds the transactionID received from the osgRequest object */  &lt;br /&gt;
    public string transactionID {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
    /* Specifies the physical file location, if needed */&lt;br /&gt;
    public string PhysicalFileLocation {&lt;br /&gt;
       // TODO: Implement&lt;br /&gt;
    }&lt;br /&gt;
    /* Holds the template location */&lt;br /&gt;
    public string DisplayTemplateLocation {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
    /* This holds an object that implements the IExploit interface */&lt;br /&gt;
    public ***** Exploit {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
=== Changes Required ===&lt;br /&gt;
1. New UI and probably a whole new desktop application&lt;br /&gt;
2. A new HTTPModule that leverages the new vulnerability library&lt;br /&gt;
3. An eye on making the web site portion of the program working on multiple web servers&lt;br /&gt;
4. Create a better unified installer that sets up the initial web site along with installing all the bit correctly (this will use WiX)&lt;br /&gt;
5. Make the websites be able to work under virtual directories&lt;br /&gt;
6. Investigate the possibility of multiple web sites working at once against a OSG &amp;quot;server&amp;quot;&lt;br /&gt;
7. Currently whenever a new site has to be created vulnerabilities have to be duplicated and are not dynamically loaded from a library of vulnerabilities.  On top of this the pages always have to be manually edited causing for user pain and very little point of OSG being there.  A user should be able to supply the pages and using tags like you will find in .Net for adding web-controls they will be able to specify where the vulnerability will be located.  That is what the user stories are for..they are examples..-Medelibero 3/16/08 10:10 AM    An example of this would be very useful. I am still trying to visualize the solution. -Borismaletic 3/12/08 4:13 AM      &lt;br /&gt;
8. A central store for the majority of vulnerabilities.&lt;/div&gt;</summary>
		<author><name>Adl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OSG_Functional_Spec&amp;diff=27173</id>
		<title>OWASP OSG Functional Spec</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OSG_Functional_Spec&amp;diff=27173"/>
				<updated>2008-03-27T23:49:39Z</updated>
		
		<summary type="html">&lt;p&gt;Adl: New page: OWASP Site Generator Functional Specification  Overview  Currently it is hard to use OSG.  There are a few things we want to improve in OSG to improve usability and increase adoption of OS...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP Site Generator Functional Specification&lt;br /&gt;
&lt;br /&gt;
Overview&lt;br /&gt;
&lt;br /&gt;
Currently it is hard to use OSG.  There are a few things we want to improve in OSG to improve usability and increase adoption of OSG.&lt;br /&gt;
&lt;br /&gt;
1) Clean-up the user interface (UI) so it is more intuitive and explorable.&lt;br /&gt;
2) Be able to create a library of exploitable code that highlights common mistakes by developers and administrators.  This area will be used for dynamically generating websites and web services on the fly.  Currently a new page needs to be created for each exploit and transmission method. &lt;br /&gt;
&lt;br /&gt;
Components of OSG&lt;br /&gt;
&lt;br /&gt;
- Controller: this is a desktop application that opens up a port that listens for requests from given web page. The server will take a given site and URL and pass back one of the two following things:&lt;br /&gt;
  1) The page rendered from a template Where is this template located? Who creates it? What does it look like? -Borismaletic 3/12/08 3:59 AM &lt;br /&gt;
      - The template will be a master page in ASP.Net it will control the layout of the site and the actual content will be defined at the page level.  &lt;br /&gt;
  2) The pages physical file location I guess this is a plain old aspx file, right? -Borismaletic 3/12/08 4:00 AM &lt;br /&gt;
    Not needed really as everything will get built on the fly.  A few physical files we will need to know are the controls and master pages.  &lt;br /&gt;
&lt;br /&gt;
  NOTE: It is not uncommon for the old-school OSG devs to refer to this as the desktop client but in reality it is the server.&lt;br /&gt;
&lt;br /&gt;
- Client:  The client is a web site or virtual folder that has an HTTPModule that talks with the server asking for the proper page to display to the user. &lt;br /&gt;
&lt;br /&gt;
UI Changes&lt;br /&gt;
To be determined by Boris&lt;br /&gt;
&lt;br /&gt;
Library specification&lt;br /&gt;
&lt;br /&gt;
QUESTION: DOES THIS MAKE SENSE, WHAT IS MISSING?&lt;br /&gt;
QUESTION: SHOULD THIS BE AN ABSTRACT CLASS INSTEAD?&lt;br /&gt;
&lt;br /&gt;
The following interface will be used for each exploit:&lt;br /&gt;
&lt;br /&gt;
interface IExploit {&lt;br /&gt;
  /*&lt;br /&gt;
   * Description: This will be used for returning a form or web page to a calling site.&lt;br /&gt;
   * &lt;br /&gt;
   * Precondition: This string will be used on a web page and not something like a web service&lt;br /&gt;
   *&lt;br /&gt;
   * Postcondition: The HTML is returned and is ready to be used. &lt;br /&gt;
   */&lt;br /&gt;
  public string getExploitHtml();&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  /*&lt;br /&gt;
   * Description: This method will be used for processing the form that was returned in the getExploitHtml call. &lt;br /&gt;
   *&lt;br /&gt;
   * Precondition: The HTTPRequest object is accessible&lt;br /&gt;
   */&lt;br /&gt;
  public string processExploitForm(); How are the form values passed on to this method? -Borismaletic 3/12/08 4:00 AM  Dude this is a functional spec not a dev-level spec.  It is to give you the general idea of how it will work.  Nothing here is set in stone, it is just some guidelines.  If you want a dev spec I should just create the program myself. -Medelibero 3/16/08 10:11 AM&lt;br /&gt;
  // Returns a web method defintion for use in a WSDL (is this even possible???)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  public string getWSDLDefinition(); Is this the idea here to create some test form that invokes the service based on this WSDL? Something like what Visual Studio does for asmx files (when opened in the browser)? -Borismaletic 3/12/08 4:01 AM &lt;br /&gt;
&lt;br /&gt;
  /*&lt;br /&gt;
   * Description: This handle the processing of the Web Service Method. &lt;br /&gt;
   */&lt;br /&gt;
  public string processWebServiceMethod(); // What parameters does this need?  An Array? &lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
HTTPModule&lt;br /&gt;
Description: The HTTPModule is the translator between the client and the server.&lt;br /&gt;
How it works: Every site request will initially get handled by the HTTPModule.  What the role of the HTTPModule will be is to look at the request and load the proper template and vulnerability values for the request If vulnerability values are loaded by the HttpModule, does that mean that users don't need/are not able to enter any form (or query string, or whatever) values themselves? -Borismaletic 3/12/08 4:03 AM No, it means we will display back the form for them to submit the data.  We are just giving them the way to sploit stuff.  -Medelibero 3/16/08 10:10 AM.  If the request does not tie to an existing page the default page should be displayed for the folder or site (folder gets precedence).  The HTTPModule will also have to figure out in what format the data should be returned.  For example if there is a POST request and we need to parse the data the HTTPModule should load the correct form parser and parse the form and return a response. &lt;br /&gt;
&lt;br /&gt;
Central Vulnerability Database&lt;br /&gt;
Description: The central vulnerability database will be an area hosted on a web server (NOTE: Need to find out where this is) that will store all the vulnerabilities/web test cases.  The OSG “server” and httpmodule will use this information to show available vulnerabilities and to pull down the information they need.  This means that this central area will need to have a web service accessible to anyone.  Given OWASPs nature this needs to be done with security in mind so that it can withstand any assault since we don’t want some insecure on OWASP. &lt;br /&gt;
&lt;br /&gt;
Along with a web service trusted OWASP members will need to be able to go in and manage the available vulnerabilities.  We also need to allow for user submissions.  A user submission will not automatically be authorized but instead will be put in a “bucket” for the trusted OWASP members to review and authorize. &lt;br /&gt;
&lt;br /&gt;
Interface between the HTTPModule and the Controller&lt;br /&gt;
Description: This area will describe the interface/communication between the HTTPModule and the Controller.  Communication will happen when a new request comes in the HTTPModule will ask the Controller what page and information should actually be rendered. &lt;br /&gt;
&lt;br /&gt;
Details: My thought is to have the two components talk via .Net remoting.  In both of the areas there will be a configuration file specifying the port it needs to listen to or connect to.  The HTTPModule will initiate the connection and send over the data.  The data should be packaged in a class that would look something like.&lt;br /&gt;
&lt;br /&gt;
// The httpmodule will send this&lt;br /&gt;
Public class osgRequest {&lt;br /&gt;
    /* This will hold the URI that was request */&lt;br /&gt;
    public string RequestURI {&lt;br /&gt;
        // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
    /* This will hold the value from HttpRequest.Method, letting us know if it is a post, get, etc..*/&lt;br /&gt;
    public string RequestMethod {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
    /* This will hold a unique transaction ID, my thoughts are a GUID , the HTTPModule will need&lt;br /&gt;
        to keep track of valid transaction IDs so it can handle multiple requests*/&lt;br /&gt;
Is this some kind of a session identifier, so several requests can be identified as belonging to the same &amp;quot;client&amp;quot; (or &amp;quot;session&amp;quot;, or &amp;quot;site&amp;quot;)? If so, why is that necessary? If not, what is it for then? -Borismaletic 3/12/08 4:08 AM  Yup it is for a session.  When dealing with multiple requests it could be needed.  If it is not needed then toss it out.  If you do not think it is needed keep it out and if we do need it we will add it at that time. -Medelibero 3/16/08 10:07 AM    public string transactionId {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
// The controller will return this&lt;br /&gt;
public class osgResponse {&lt;br /&gt;
    /* Holds the transactionID received from the osgRequest object */  &lt;br /&gt;
    public string transactionID {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    /* Specifies the physical file location, if needed */&lt;br /&gt;
    public string PhysicalFileLocation {&lt;br /&gt;
       // TODO: Implement&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    /* Holds the template location */&lt;br /&gt;
So template is a file in the file system. I understand it contains some kind of placeholders that are populated by the HTTP module, right?-Borismaletic 3/12/08 4:11 AM  Yea it is an master page in ASP.Net come on man.. -Medelibero 3/16/08 10:08 AM    public string DisplayTemplateLocation {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    /* This holds an object that implements the IExploit interface */&lt;br /&gt;
    public ***** Exploit {&lt;br /&gt;
       // TODO: implement&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Changes Required&lt;br /&gt;
&lt;br /&gt;
   1. New UI and probably a whole new desktop application&lt;br /&gt;
   2. A new HTTPModule that leverages the new vulnerability library&lt;br /&gt;
   3. An eye on making the web site portion of the program working on multiple web servers&lt;br /&gt;
   4. Create a better unified installer that sets up the initial web site along with installing all the bit correctly (this will use WiX)&lt;br /&gt;
   5. Make the websites be able to work under virtual directories&lt;br /&gt;
   6. Investigate the possibility of multiple web sites working at once against a OSG &amp;quot;server&amp;quot;&lt;br /&gt;
   7. Currently whenever a new site has to be created vulnerabilities have to be duplicated and are not dynamically loaded from a library of vulnerabilities.  On top of this the pages always have to be manually edited causing for user pain and very little point of OSG being there.  A user should be able to supply the pages and using tags like you will find in .Net for adding web-controls they will be able to specify where the vulnerability will be located.  That is what the user stories are for..they are examples..-Medelibero 3/16/08 10:10 AM    An example of this would be very useful. I am still trying to visualize the solution. -Borismaletic 3/12/08 4:13 AM      &lt;br /&gt;
   8. A central store for the majority of vulnerabilities.&lt;/div&gt;</summary>
		<author><name>Adl</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator&amp;diff=27172</id>
		<title>SpoC 007 - OWASP Site Generator</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SpoC_007_-_OWASP_Site_Generator&amp;diff=27172"/>
				<updated>2008-03-27T23:48:51Z</updated>
		
		<summary type="html">&lt;p&gt;Adl: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''[http://www.owasp.org/index.php/OWASP_Spring_Of_Code_2007_Selection Back to SpoC 007 Selection page]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''AoC Candidate''': Boris&lt;br /&gt;
&lt;br /&gt;
'''Project coordinator''': Dinis Cruz&lt;br /&gt;
&lt;br /&gt;
'''Project Progress''': 20% Complete, [[SpoC 007 - OWASP Site Generator - Progress Page|Progress Page]]&lt;br /&gt;
&lt;br /&gt;
== OWASP Site Generator ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Executive Summary ===&lt;br /&gt;
&lt;br /&gt;
OWASP Site Generator is a great tool, but it could be even better and more widespread. There’s a lot room for improvements to both its functionality and user experience. The way I see it, main user needs to be addressed and specific development objectives for the next release of OWASP Site Generator would be the following. &lt;br /&gt;
&lt;br /&gt;
=== User Needs ===&lt;br /&gt;
&lt;br /&gt;
* Create multiple types of sites easily&lt;br /&gt;
* Track and analyze requests easily&lt;br /&gt;
* Change the look and feel of the resulting sites easily&lt;br /&gt;
* Create sites for multiple web backend technologies easily&lt;br /&gt;
* Learn how to use OWASP Site Generator easily  &lt;br /&gt;
&lt;br /&gt;
=== Development Objectives ===&lt;br /&gt;
&lt;br /&gt;
* Create a vulnerability library that can be used for web services, HTML forms, AJAX, etc. instead of having to craft the same attack for each&lt;br /&gt;
* Add support for logging of all received requests, as well as querying resulting log files&lt;br /&gt;
* &amp;quot;Templatize&amp;quot; the code generation process, so it can support skinning of the resulting sites&lt;br /&gt;
* &amp;quot;Templatize&amp;quot; the code generation process, so it can support different backend web technologies&lt;br /&gt;
* Fix all significant defects in the current release of OWASP Site Generator&lt;br /&gt;
* Redesign the GUI to make it more efficient and user friendly&lt;br /&gt;
* Create a smooth setup program which would install both client and server components as effortlessly as possible&lt;br /&gt;
* Write documentation and articles about it&lt;br /&gt;
* Make the development process open to the public and, hopefully, driven by its feedback from day one &lt;br /&gt;
&lt;br /&gt;
=== Why I should be sponsored for the project ===&lt;br /&gt;
&lt;br /&gt;
Well, probably because of my past work on AoC (I just hope that won’t be the reason for me not to be sponsored :) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Development Links ===&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_OSG_Functional_Spec OWASP Site Generator Functional Specification]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/OWASP_Spring_Of_Code_2007_Selection Back to SpoC 007 Selection page]'''&lt;/div&gt;</summary>
		<author><name>Adl</name></author>	</entry>

	</feed>