<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Amro+Ahmed</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Amro+Ahmed"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Amro_Ahmed"/>
		<updated>2026-05-04T19:40:23Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=178473</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=178473"/>
				<updated>2014-07-10T03:56:03Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* Spider/crawl for missed or hidden content&lt;br /&gt;
* Check the Webserver Metafiles for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* Check the caches of major search engines for publicly accessible sites&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* Check The Webpage Comments and Metadata for Information Leakage&lt;br /&gt;
* Check The Web Application Framework&lt;br /&gt;
* Perform Web Application Fingerprinting&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* Identify user roles&lt;br /&gt;
* Identify application entry points&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app, web services)&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* Check for old, backup and unreferenced files&lt;br /&gt;
* Check HTTP methods supported and Cross Site Tracing (XST)&lt;br /&gt;
* Test file extensions handling&lt;br /&gt;
* Test RIA cross domain policy&lt;br /&gt;
* Test for security HTTP headers (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* Check SSL Version, Algorithms, Key length&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* Check if HTTP Strict Transport Security (HSTS) in use&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* Test for user enumeration&lt;br /&gt;
* Test for authentication bypass&lt;br /&gt;
* Test for brute force protection&lt;br /&gt;
* Test for Credentials Transported over an Encrypted Channel&lt;br /&gt;
* Test password quality rules&lt;br /&gt;
* Test remember me functionality&lt;br /&gt;
* Test for autocomplete on password forms/input &lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* Check session tokens for cookie flags (httpOnly and secure)&lt;br /&gt;
* Check session cookie scope (path and domain)&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* Check session termination after a maximum lifetime&lt;br /&gt;
* Check session termination after relative timeout&lt;br /&gt;
* Check session termination after logout&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* Test for path traversal&lt;br /&gt;
* Test for vertical Access control problems (a.k.a. Privilege Escalation)&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* Test for missing authorisation&lt;br /&gt;
* Test for Insecure Direct Object References&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* Test for Reflected Cross Site Scripting&lt;br /&gt;
* Test for Stored Cross Site Scripting&lt;br /&gt;
* Test for DOM based Cross Site Scripting&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* Test for SQL Injection&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* Test for ORM Injection&lt;br /&gt;
* Test for XML Injection&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* Test for SSI Injection&lt;br /&gt;
* Test for XPath Injection&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* Test for IMAP/SMTP Injection&lt;br /&gt;
* Test for Code Injection&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* Test for Command Injection&lt;br /&gt;
* Test for Overflow (Stack, Heap and Integer)&lt;br /&gt;
* Test for Format String&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* Test for HTTP Splitting/Smuggling&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* Test for Open Redirection&lt;br /&gt;
* Test for Local File Inclusion&lt;br /&gt;
* Test for Remote File Inclusion&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* Test for account lockout&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* Test for integrity of data&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* Test for Process Timing&lt;br /&gt;
* Test Number of Times a Function Can be Used Limits&lt;br /&gt;
* Test for the Circumvention of Work Flows&lt;br /&gt;
* Test Defenses Against Application Mis-use&lt;br /&gt;
* Test Upload of Unexpected File Types&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* Check if data which should be encrypted is not&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* Check for weak algorithms usage&lt;br /&gt;
* Check for proper use of salting&lt;br /&gt;
* Check for randomness functions&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* Test that acceptable file types are whitelisted&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* Test that all file uploads have Anti-Virus scanning in-place.&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Test for Injection vulnerabilities &lt;br /&gt;
* Test for Buffer Overflows&lt;br /&gt;
* Test for Insecure Cryptographic Storage&lt;br /&gt;
* Test for Insufficient Transport Layer Protection&lt;br /&gt;
* Test for Improper Error Handling&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* Test for CSRF&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* Test Web Messaging&lt;br /&gt;
* Test for Web Storage SQL injection&lt;br /&gt;
* Check CORS implementation&lt;br /&gt;
* Check Offline Web Application&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* Check for Error Codes&lt;br /&gt;
* Check for Stack Traces&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Other Formats =&lt;br /&gt;
&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
= Authors and primary contributors =&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All the authors of the Testing Guide v3 &lt;br /&gt;
&lt;br /&gt;
= Other Contributors =&lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related articles =&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=178471</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=178471"/>
				<updated>2014-07-10T03:54:34Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* Spider/crawl for missed or hidden content&lt;br /&gt;
* Check the Webserver Metafiles for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* Check the caches of major search engines for publicly accessible sites&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* Check The Webpage Comments and Metadata for Information Leakage&lt;br /&gt;
* Check The Web Application Framework&lt;br /&gt;
* Perform Web Application Fingerprinting&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* Identify user roles&lt;br /&gt;
* Identify application entry points&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app, web services)&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* Check for old, backup and unreferenced files&lt;br /&gt;
* Check HTTP methods supported and Cross Site Tracing (XST)&lt;br /&gt;
* Test file extensions handling&lt;br /&gt;
* Test RIA cross domain policy&lt;br /&gt;
* Test for security HTTP headers (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* Check SSL Version, Algorithms, Key length&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* Check if HTTP Strict Transport Security (HSTS) in use&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* Test for user enumeration&lt;br /&gt;
* Test for authentication bypass&lt;br /&gt;
* Test for brute force protection&lt;br /&gt;
* * Test for Credentials Transported over an Encrypted Channel&lt;br /&gt;
* Test password quality rules&lt;br /&gt;
* Test remember me functionality&lt;br /&gt;
* Test for autocomplete on password forms/input &lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* Check session tokens for cookie flags (httpOnly and secure)&lt;br /&gt;
* Check session cookie scope (path and domain)&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* Check session termination after a maximum lifetime&lt;br /&gt;
* Check session termination after relative timeout&lt;br /&gt;
* Check session termination after logout&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* Test for path traversal&lt;br /&gt;
* Test for vertical Access control problems (a.k.a. Privilege Escalation)&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* Test for missing authorisation&lt;br /&gt;
* Test for Insecure Direct Object References&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* Test for Reflected Cross Site Scripting&lt;br /&gt;
* Test for Stored Cross Site Scripting&lt;br /&gt;
* Test for DOM based Cross Site Scripting&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* Test for SQL Injection&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* Test for ORM Injection&lt;br /&gt;
* Test for XML Injection&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* Test for SSI Injection&lt;br /&gt;
* Test for XPath Injection&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* Test for IMAP/SMTP Injection&lt;br /&gt;
* Test for Code Injection&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* Test for Command Injection&lt;br /&gt;
* Test for Overflow (Stack, Heap and Integer)&lt;br /&gt;
* Test for Format String&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* Test for HTTP Splitting/Smuggling&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* Test for Open Redirection&lt;br /&gt;
* Test for Local File Inclusion&lt;br /&gt;
* Test for Remote File Inclusion&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* Test for account lockout&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* Test for integrity of data&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* Test for Process Timing&lt;br /&gt;
* Test Number of Times a Function Can be Used Limits&lt;br /&gt;
* Test for the Circumvention of Work Flows&lt;br /&gt;
* Test Defenses Against Application Mis-use&lt;br /&gt;
* Test Upload of Unexpected File Types&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* Check if data which should be encrypted is not&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* Check for weak algorithms usage&lt;br /&gt;
* Check for proper use of salting&lt;br /&gt;
* Check for randomness functions&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* Test that acceptable file types are whitelisted&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* Test that all file uploads have Anti-Virus scanning in-place.&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Test for Injection vulnerabilities &lt;br /&gt;
* Test for Buffer Overflows&lt;br /&gt;
* Test for Insecure Cryptographic Storage&lt;br /&gt;
* Test for Insufficient Transport Layer Protection&lt;br /&gt;
* Test for Improper Error Handling&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* Test for CSRF&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* Test Web Messaging&lt;br /&gt;
* Test for Web Storage SQL injection&lt;br /&gt;
* Check CORS implementation&lt;br /&gt;
* Check Offline Web Application&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* Check for Error Codes&lt;br /&gt;
* Check for Stack Traces&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Other Formats =&lt;br /&gt;
&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
= Authors and primary contributors =&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All the authors of the Testing Guide v3 &lt;br /&gt;
&lt;br /&gt;
= Other Contributors =&lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related articles =&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=178453</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=178453"/>
				<updated>2014-07-10T03:23:10Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* Spider/crawl for missed or hidden content&lt;br /&gt;
* Check for files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* Check the caches of major search engines for publicly accessible sites&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* Perform Web Application Fingerprinting&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* Identify user roles&lt;br /&gt;
* Identify application entry points&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app, web services)&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* Check for old, backup and unreferenced files&lt;br /&gt;
* Check HTTP methods supported and Cross Site Tracing (XST)&lt;br /&gt;
* Test file extensions handling&lt;br /&gt;
* Test for security HTTP headers (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* Check SSL Version, Algorithms, Key length&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* Check if HTTP Strict Transport Security (HSTS) in use&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* Test for user enumeration&lt;br /&gt;
* Test for authentication bypass&lt;br /&gt;
* Test for bruteforce protection&lt;br /&gt;
* Test password quality rules&lt;br /&gt;
* Test remember me functionality&lt;br /&gt;
* Test for autocomplete on password forms/input &lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* Check session tokens for cookie flags (httpOnly and secure)&lt;br /&gt;
* Check session cookie scope (path and domain)&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* Check session termination after a maximum lifetime&lt;br /&gt;
* Check session termination after relative timeout&lt;br /&gt;
* Check session termination after logout&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* Test for path traversal&lt;br /&gt;
* Test for bypassing authorization schema&lt;br /&gt;
* Test for vertical Access control problems (a.k.a. Privilege Escalation)&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* Test for missing authorization&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* Test for Reflected Cross Site Scripting&lt;br /&gt;
* Test for Stored Cross Site Scripting&lt;br /&gt;
* Test for DOM based Cross Site Scripting&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* Test for SQL Injection&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* Test for ORM Injection&lt;br /&gt;
* Test for XML Injection&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* Test for SSI Injection&lt;br /&gt;
* Test for XPath Injection&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* Test for IMAP/SMTP Injection&lt;br /&gt;
* Test for Code Injection&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* Test for Command Injection&lt;br /&gt;
* Test for Overflow (Stack, Heap and Integer)&lt;br /&gt;
* Test for Format String&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* Test for HTTP Splitting/Smuggling&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* Test for Open Redirection&lt;br /&gt;
* Test for Local File Inclusion&lt;br /&gt;
* Test for Remote File Inclusion&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* Test for account lockout&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* Test for integrity of data&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* Test for Process Timing&lt;br /&gt;
* Test Number of Times a Function Can be Used Limits&lt;br /&gt;
* Test for the Circumvention of Work Flows&lt;br /&gt;
* Test Defenses Against Application Mis-use&lt;br /&gt;
* Test Upload of Unexpected File Types&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* Check if data which should be encrypted is not&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* Check for weak algorithms usage&lt;br /&gt;
* Check for proper use of salting&lt;br /&gt;
* Check for randomness functions&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* Test that acceptable file types are whitelisted&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* Test that all file uploads have Anti-Virus scanning in-place.&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Test for Injection vulnerabilities &lt;br /&gt;
* Test for Buffer Overflows&lt;br /&gt;
* Test for Insecure Cryptographic Storage&lt;br /&gt;
* Test for Insufficient Transport Layer Protection&lt;br /&gt;
* Test for Improper Error Handling&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* Test for CSRF&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* Test Web Messaging&lt;br /&gt;
* Test for Web Storage SQL injection&lt;br /&gt;
* Check CORS implementation&lt;br /&gt;
* Check Offline Web Application&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* Check for Error Codes&lt;br /&gt;
* Analysis for Stack Traces&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Other Formats =&lt;br /&gt;
&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
= Authors and primary contributors =&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
All the authors of theTesting Guide v3&lt;br /&gt;
&lt;br /&gt;
= Other Contributors =&lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
= Related articles =&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=178451</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=178451"/>
				<updated>2014-07-10T03:19:26Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* Spider/crawl for missed or hidden content&lt;br /&gt;
* Check for files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* Check the caches of major search engines for publicly accessible sites&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* Perform Web Application Fingerprinting&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* Identify user roles&lt;br /&gt;
* Identify application entry points&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app, web services)&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* Check for old, backup and unreferenced files&lt;br /&gt;
* Check HTTP methods supported and Cross Site Tracing (XST)&lt;br /&gt;
* Test file extensions handling&lt;br /&gt;
* Test for security HTTP headers (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* Check SSL Version, Algorithms, Key length&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* Check if HTTP Strict Transport Security (HSTS) in use&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* Test for user enumeration&lt;br /&gt;
* Test for authentication bypass&lt;br /&gt;
* Test for bruteforce protection&lt;br /&gt;
* Test password quality rules&lt;br /&gt;
* Test remember me functionality&lt;br /&gt;
* Test for autocomplete on password forms/input &lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* Check session tokens for cookie flags (httpOnly and secure)&lt;br /&gt;
* Check session cookie scope (path and domain)&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* Check session termination after a maximum lifetime&lt;br /&gt;
* Check session termination after relative timeout&lt;br /&gt;
* Check session termination after logout&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* Test for path traversal&lt;br /&gt;
* Test for bypassing authorization schema&lt;br /&gt;
* Test for vertical Access control problems (a.k.a. Privilege Escalation)&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* Test for missing authorization&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* Test for Reflected Cross Site Scripting&lt;br /&gt;
* Test for Stored Cross Site Scripting&lt;br /&gt;
* Test for DOM based Cross Site Scripting&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* Test for SQL Injection&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* Test for ORM Injection&lt;br /&gt;
* Test for XML Injection&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* Test for SSI Injection&lt;br /&gt;
* Test for XPath Injection&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* Test for IMAP/SMTP Injection&lt;br /&gt;
* Test for Code Injection&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* Test for Command Injection&lt;br /&gt;
* Test for Overflow (Stack, Heap and Integer)&lt;br /&gt;
* Test for Format String&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* Test for HTTP Splitting/Smuggling&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* Test for Open Redirection&lt;br /&gt;
* Test for Local File Inclusion&lt;br /&gt;
* Test for Remote File Inclusion&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* Test for account lockout&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* Test for integrity of data&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* Check if data which should be encrypted is not&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* Check for weak algorithms usage&lt;br /&gt;
* Check for proper use of salting&lt;br /&gt;
* Check for randomness functions&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* Test that acceptable file types are whitelisted&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* Test that all file uploads have Anti-Virus scanning in-place.&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Test for Injection vulnerabilities &lt;br /&gt;
* Test for Buffer Overflows&lt;br /&gt;
* Test for Insecure Cryptographic Storage&lt;br /&gt;
* Test for Insufficient Transport Layer Protection&lt;br /&gt;
* Test for Improper Error Handling&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* Test for CSRF&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* Test Web Messaging&lt;br /&gt;
* Test for Web Storage SQL injection&lt;br /&gt;
* Check CORS implementation&lt;br /&gt;
* Check Offline Web Application&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* Check for Error Codes&lt;br /&gt;
* Analysis for Stack Traces&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Other Formats =&lt;br /&gt;
&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
= Authors and primary contributors =&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
All the authors of theTesting Guide v3&lt;br /&gt;
&lt;br /&gt;
= Other Contributors =&lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
= Related articles =&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Reporting&amp;diff=176065</id>
		<title>Reporting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Reporting&amp;diff=176065"/>
				<updated>2014-05-29T11:45:49Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
Performing the technical side of the assessment is only half of the overall assessment process. The final product is the production of a well written and informative report. A report should be easy to understand and should highlight all the risks found during the assessment phase. The report should appeal to both executive management and technical staff. &lt;br /&gt;
&lt;br /&gt;
The report needs to have three major sections. It should be created in a manner that allows each separate section to be printed and given to the appropriate teams, such as the developers or system managers. The recommended sections are outlined below.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''1. Executive Summary'''&lt;br /&gt;
&lt;br /&gt;
The executive summary sums up the overall findings of the assessment and gives managers and system owners an idea of the overall risk faced. &lt;br /&gt;
&lt;br /&gt;
The language used should be more suited to people who are not technically aware and should include graphs or other charts which show the risk level. It is recommended to include a summary that details when the testing commenced and when it was completed.&lt;br /&gt;
&lt;br /&gt;
Another section that is often overlooked is a paragraph on implications and actions. This allows the system owners to understand what is required to be done to ensure the system remains secure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.1  Project Objective:&lt;br /&gt;
This section outlines the project objectives and the expected outcome of the assessment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.2 Project Scope: &lt;br /&gt;
This section outlines the agreed scope.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.3 Limitations:&lt;br /&gt;
This section outlines every limitation which was faced throughout the assessment. For example, limitations of project-focused tests, limitation in the security testing methods, performance or technical issues that the tester come across during the course of assessment, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.4 Targets: &lt;br /&gt;
This section lists the number of applications or targeted systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2. Technical Management Overview'''&lt;br /&gt;
&lt;br /&gt;
The technical management overview section often appeals to technical managers who require more technical detail than found in the executive summary. This section should include details about the scope of the assessment, the targets included and any caveats, such as system availability etc. &lt;br /&gt;
&lt;br /&gt;
This section also needs to include an introduction on the risk rating used throughout the report. It should also include a technical summary of the findings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''3. Assessment Findings''' &lt;br /&gt;
&lt;br /&gt;
The last section of the report includes detailed technical information about the vulnerabilities found and the actions needed to resolve them. This section is aimed at a technical level and should include all the necessary information for the technical teams to understand the issue and resolve it. Each finding should be clear and concise and give the reader of the report a full understanding of the issue at hand.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The findings section should include:&lt;br /&gt;
&lt;br /&gt;
* A reference number for easy reference with screenshots &lt;br /&gt;
* The affected item&lt;br /&gt;
* A technical description of the issue &lt;br /&gt;
* A section on resolving the issue &lt;br /&gt;
* The risk rating and impact value&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is the report (see https://www.owasp.org/index.php/Testing_Checklist for the complete list of tests):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:tablerep.PNG]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:tablerep2.PNG]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:tablerep3.PNG]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Appendix'''  &lt;br /&gt;
&lt;br /&gt;
This section is often used to describe the commercial and open-source tools that were used in conducting the assessment. When custom scripts or code are utilized during the assessment, it should be disclosed in this section or noted as attachment. Customers appreciate when the methodology used by the consultants is included. It gives them an idea of the thoroughness of the assessment and what areas were included.&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Breakers&amp;diff=172955</id>
		<title>Breakers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Breakers&amp;diff=172955"/>
				<updated>2014-04-17T13:13:15Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== OWASP Breakers  ====&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
'''Breakers Community''' &lt;br /&gt;
&lt;br /&gt;
A community of security professionals and stakeholders with the common goal of advancing the state of security in the area of security testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Examples''' &lt;br /&gt;
&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Target Audience''' &lt;br /&gt;
&lt;br /&gt;
Application Security Professionals, Infrastructure Security Teams, Pentesters &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''What Are OWASP Communities?'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Builders Builders], Breakers and [http://www.owasp.org/index.php/Defenders Defenders]; the idea of OWASP Communities is to bring together experts in the area that they are best at with the common goal of advancing the state of application security.  This approach allows similar groups of professionals and experts to tackle security problems with the involvement of the most relevant stakeholders.  The intent is to drive high quality output that is immediately usable by the target audience.  More information about this vision can be found [http://michael-coates.blogspot.com/2011/02/vision-for-owasp.html here]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:OWASP-vision.jpg]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== The Community  ====&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; style=&amp;quot;width: 404px; height: 413px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp; &amp;lt;br&amp;gt;&lt;br /&gt;
| '''Erwin Geirnaert'''&amp;lt;br&amp;gt; ''ZION SECURITY''&amp;lt;br&amp;gt; ''erwin.geirnaert@zionsecurity.com''&amp;lt;br&amp;gt; ''http://www.zionsecurity.com/'' &amp;lt;br&amp;gt; ''@ZIONSECURITY''&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:SimonBennetts-OWASP.jpg]]&amp;lt;br&amp;gt; &lt;br /&gt;
| '''Simon Bennetts''' &amp;lt;br&amp;gt; [[:OWASP Zed Attack Proxy Project|OWASP Zed Attack Proxy Project]] Lead &amp;lt;br&amp;gt; psiinon@owasp.org &amp;lt;br&amp;gt; http://pentest4devs.blogspot.com/ &amp;lt;br&amp;gt; @psiinon&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp; &amp;lt;br&amp;gt; &lt;br /&gt;
| '''Axel Neumann''' &amp;lt;br&amp;gt; [[:OWASP Zed Attack Proxy Project|OWASP Zed Attack Proxy Project]] &amp;lt;br&amp;gt; @x3l_ch&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[File:2f726dc85913c41ad3c18138d49ba3bc.png|100px]]&amp;lt;br&amp;gt;&lt;br /&gt;
| '''Amro AlOlaqi'''&amp;lt;br&amp;gt; [[:OWASP Zed Attack Proxy Project|OWASP Zed Attack Proxy Project]]  &amp;lt;br&amp;gt; [[Cheat Sheets]] &amp;lt;br&amp;gt; [[OWASP Testing Project]] &amp;lt;br&amp;gt;amro@owasp.org &amp;lt;br&amp;gt; ''https://www.owasp.org/index.php/User:Amro_Ahmed'' &amp;lt;br&amp;gt; @Amro_AlOlaqi&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Your pic; &amp;lt;br&amp;gt;&lt;br /&gt;
| '''Your name'''&amp;lt;br&amp;gt; ''Your company/project'' &amp;lt;br&amp;gt; ''Your email'' &amp;lt;br&amp;gt; ''Your website'' &amp;lt;br&amp;gt; ''Your twitter''&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Want to contribute to the OWASP Breakers Community? &amp;lt;br&amp;gt;Add your info here!&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Roadmap  ====&lt;br /&gt;
To be determined &lt;br /&gt;
&lt;br /&gt;
==== Official Breaker Projects  ====&lt;br /&gt;
&lt;br /&gt;
To be determined &lt;br /&gt;
&lt;br /&gt;
==== All Breaker Related Projects ====&lt;br /&gt;
All projects that are related to the OWASP Breakers community can be found at the following link: [[:Category:OWASP_Breakers]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:2f726dc85913c41ad3c18138d49ba3bc.png&amp;diff=172954</id>
		<title>File:2f726dc85913c41ad3c18138d49ba3bc.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:2f726dc85913c41ad3c18138d49ba3bc.png&amp;diff=172954"/>
				<updated>2014-04-17T12:59:59Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: Amro Ahmed uploaded a new version of &amp;amp;quot;File:2f726dc85913c41ad3c18138d49ba3bc.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;AMRO ALOLAQI&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Amro_Ahmed&amp;diff=172953</id>
		<title>User:Amro Ahmed</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Amro_Ahmed&amp;diff=172953"/>
				<updated>2014-04-17T12:57:58Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
[[File:2f726dc85913c41ad3c18138d49ba3bc.png|100px]]&lt;br /&gt;
&lt;br /&gt;
Amro AlOlaqi joined OWASP back in 2008. ( My old user account: https://www.owasp.org/index.php/User:Amro )&lt;br /&gt;
&lt;br /&gt;
Amro currently works as a Sr. Consultant at Verizon (Threat &amp;amp; Vulnerability). Prior joining Verizon, Amro worked for BAE Systems, Saudi Aramco, IS, and Red Hat, he has more than 9 years of experience in Information security. He started his professional career at early age, since then, he engaged the field of UNIX/Linux engineering and systems’ security.  He carried out penetration tests, application , vulnerability assessments and security audits for prestigious organizations. Moreover, his expertise extends across industry verticals, security technologies plus hacking tools and techniques.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''OWASP Involvement''''' &lt;br /&gt;
* Chapter leader: Saudi Arabia &lt;br /&gt;
* Chapter leader: Untied Arab Emirates &lt;br /&gt;
* Contributor:  OWASP Testing Guide v4&lt;br /&gt;
* Contributor: OWASP Web Application Security Testing Cheat Sheet&lt;br /&gt;
* ZAP Core Team: OWASP Zed Attack Proxy Project&lt;br /&gt;
* ZAP Evangelist: Middle East&lt;br /&gt;
* Contributor: OWASP Speakers Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Public Speaking'''''&lt;br /&gt;
*Speaker: Web Application Security (&amp;quot;Why&amp;quot; &amp;quot;How&amp;quot; and &amp;quot;When&amp;quot;) at IDC IT Security Roadshow - Dubai&lt;br /&gt;
*Speaker: Application Security at  i-safe (ISACA UAE) – UAE&lt;br /&gt;
*Speaker: Ethical Hacking at Compliance and Beyond - Saudi.&lt;br /&gt;
*Speaker: Web Application Security at F5 - Saudi.&lt;br /&gt;
*Speaker: OWASP The Power of Code Review at aSecurity,  Netherlands&lt;br /&gt;
*Speaker: Web Application Security and the OWASP top 10 at ISACA Jeddah – Saudi&lt;br /&gt;
*Speaker: Web App Critical Vulnerabilities and OWASP's ESAPI at The Cyber Information Security Summit - UAE&lt;br /&gt;
*Speaker: Information Security Awareness at Arabou University - Saudi.&lt;br /&gt;
*Speaker: Threat Modeling and Penetration test at IT for Government Summit - UAE&lt;br /&gt;
*Speaker: Ethical Hacking and penetration testing at Microsoft Open Doors – Saudi.&lt;br /&gt;
*Speaker: Ethical Hacking and penetration testing at Microsoft Open Doors – Saudi.&lt;br /&gt;
*Speaker: OWASP Testing Guide at OWASP KSA - Saudi.&lt;br /&gt;
*Speaker: OWASP's introduction and projects at the open university - Saudi&lt;br /&gt;
&lt;br /&gt;
'''Get in touch with Amro on LinkedIn: http://www.linkedin.com/in/iamro'''&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:2f726dc85913c41ad3c18138d49ba3bc.png&amp;diff=172952</id>
		<title>File:2f726dc85913c41ad3c18138d49ba3bc.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:2f726dc85913c41ad3c18138d49ba3bc.png&amp;diff=172952"/>
				<updated>2014-04-17T12:52:56Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: AMRO ALOLAQI&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;AMRO ALOLAQI&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Amro_Ahmed&amp;diff=172317</id>
		<title>User:Amro Ahmed</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Amro_Ahmed&amp;diff=172317"/>
				<updated>2014-04-10T21:30:21Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Amro AlOlaqi joined OWASP back in 2008. ( My old user account: https://www.owasp.org/index.php/User:Amro )&lt;br /&gt;
&lt;br /&gt;
Amro currently works as a Sr. Consultant at Verizon (Threat &amp;amp; Vulnerability). Prior joining Verizon, Amro worked for BAE Systems, Saudi Aramco, IS, and Red Hat, he has more than 9 years of experience in Information security. He started his professional career at early age, since then, he engaged the field of UNIX/Linux engineering and systems’ security.  He carried out penetration tests, application , vulnerability assessments and security audits for prestigious organizations. Moreover, his expertise extends across industry verticals, security technologies plus hacking tools and techniques.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''OWASP Involvement''''' &lt;br /&gt;
* Chapter leader: Saudi Arabia &lt;br /&gt;
* Chapter leader: Untied Arab Emirates &lt;br /&gt;
* Contributor:  OWASP Testing Guide v4&lt;br /&gt;
* Contributor: OWASP Web Application Security Testing Cheat Sheet&lt;br /&gt;
* ZAP Core Team: OWASP Zed Attack Proxy Project&lt;br /&gt;
* ZAP Evangelist: Middle East&lt;br /&gt;
* Contributor: OWASP Speakers Project&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Public Speaking'''''&lt;br /&gt;
*Speaker: Web Application Security (&amp;quot;Why&amp;quot; &amp;quot;How&amp;quot; and &amp;quot;When&amp;quot;) at IDC IT Security Roadshow - Dubai&lt;br /&gt;
*Speaker: Application Security at  i-safe (ISACA UAE) – UAE&lt;br /&gt;
*Speaker: Ethical Hacking at Compliance and Beyond - Saudi.&lt;br /&gt;
*Speaker: Web Application Security at F5 - Saudi.&lt;br /&gt;
*Speaker: OWASP The Power of Code Review at aSecurity,  Netherlands&lt;br /&gt;
*Speaker: Web Application Security and the OWASP top 10 at ISACA Jeddah – Saudi&lt;br /&gt;
*Speaker: Web App Critical Vulnerabilities and OWASP's ESAPI at The Cyber Information Security Summit - UAE&lt;br /&gt;
*Speaker: Information Security Awareness at Arabou University - Saudi.&lt;br /&gt;
*Speaker: Threat Modeling and Penetration test at IT for Government Summit - UAE&lt;br /&gt;
*Speaker: Ethical Hacking and penetration testing at Microsoft Open Doors – Saudi.&lt;br /&gt;
*Speaker: Ethical Hacking and penetration testing at Microsoft Open Doors – Saudi.&lt;br /&gt;
*Speaker: OWASP Testing Guide at OWASP KSA - Saudi.&lt;br /&gt;
*Speaker: OWASP's introduction and projects at the open university - Saudi&lt;br /&gt;
&lt;br /&gt;
'''Get in touch with Amro on LinkedIn: http://www.linkedin.com/in/iamro'''&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Appendix_A:_Testing_Tools&amp;diff=171494</id>
		<title>Appendix A: Testing Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Appendix_A:_Testing_Tools&amp;diff=171494"/>
				<updated>2014-04-02T20:34:01Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
==Open Source Black Box Testing tools==&lt;br /&gt;
&lt;br /&gt;
=== General Testing ===&lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_WebScarab_Project|OWASP WebScarab]]'''&lt;br /&gt;
** WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins.&lt;br /&gt;
* '''[[OWASP_CAL9000_Project|OWASP CAL9000]]'''&lt;br /&gt;
** CAL9000 is a collection of browser-based tools that enable more effective and efficient manual testing efforts.&lt;br /&gt;
** Includes an XSS Attack Library, Character Encoder/Decoder, HTTP Request Generator and Response Evaluator, Testing Checklist, Automated Attack Editor and much more.&lt;br /&gt;
*  '''[[:Category:OWASP Pantera Web Assessment Studio Project|OWASP Pantera Web Assessment Studio Project]]'''&lt;br /&gt;
** Pantera uses an improved version of SpikeProxy to provide a powerful web application analysis engine. The primary goal of Pantera is to combine automated capabilities with complete manual testing to get the best penetration testing results.&lt;br /&gt;
* '''[[:OWASP Zed Attack Proxy Project]]'''&lt;br /&gt;
** The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.&lt;br /&gt;
** ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.&lt;br /&gt;
* '''[[:OWASP Mantra - Security Framework]]'''&lt;br /&gt;
**Mantra is a web application security testing framework built on top of a browser. It supports Windows, Linux(both 32 and 64 bit) and Macintosh, in addition, it can work with other software like ZAP using built in proxy management function which makes it much more convenient. Mantra is available in 9 languages: Arabic, Chinese - Simplified, Chinese - Traditional, English, French, Portuguese, Russian, Spanish and Turkish.&lt;br /&gt;
* '''SPIKE''' - http://www.immunitysec.com/resources-freesoftware.shtml&lt;br /&gt;
** SPIKE designed to analyze new network protocols for buffer overflows or similar weaknesses. It requires a strong knowledge of C to use and only available for the Linux platform.&lt;br /&gt;
* '''Burp Proxy''' - http://www.portswigger.net/Burp/&lt;br /&gt;
** Burp Proxy is an intercepting proxy server for security testing of web applications it allows Intercepting and modifying all HTTP/S traffic passing in both directions, it can work with custom SSL certificates and non-proxy-aware clients.&lt;br /&gt;
* '''Odysseus Proxy''' - http://www.wastelands.gen.nz/odysseus/&lt;br /&gt;
** Odysseus is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical HTTP proxy will relay packets to and from a client browser and a web server. It will intercept an HTTP session's data in either direction.&lt;br /&gt;
* '''Webstretch Proxy''' - http://sourceforge.net/projects/webstretch&lt;br /&gt;
** Webstretch Proxy enable users to view and alter all aspects of communications with a web site via a proxy. It can also be used for debugging during development. &lt;br /&gt;
*  '''WATOBO''' - http://sourceforge.net/apps/mediawiki/watobo/index.php?title=Main_Page&lt;br /&gt;
** WATOBO works like a local proxy, similar to Webscarab, ZAP or BurpSuite and it supports passive and active checks.&lt;br /&gt;
* '''Firefox LiveHTTPHeaders''' - https://addons.mozilla.org/en-US/firefox/addon/live-http-headers/&lt;br /&gt;
** View HTTP headers of a page and while browsing.&lt;br /&gt;
* '''Firefox Tamper Data''' - https://addons.mozilla.org/en-US/firefox/addon/tamper-data/&lt;br /&gt;
** Use tamperdata to view and modify HTTP/HTTPS headers and post parameters&lt;br /&gt;
* '''Firefox Web Developer Tools''' - https://addons.mozilla.org/en-US/firefox/addon/web-developer/&lt;br /&gt;
** The Web Developer extension adds various web developer tools to the browser.&lt;br /&gt;
* '''DOM Inspector''' - https://developer.mozilla.org/en/docs/DOM_Inspector&lt;br /&gt;
**  DOM Inspector is a developer tool used to inspect, browse, and edit the Document Object Model (DOM)&lt;br /&gt;
* '''Firefox Firebug''' - http://getfirebug.com/&lt;br /&gt;
** Firebug integrates with Firefox to edit, debug, and monitor CSS, HTML, and JavaScript.&lt;br /&gt;
* '''Grendel-Scan''' - http://securitytube-tools.net/index.php?title=Grendel_Scan&lt;br /&gt;
** Grendel-Scan is an automated security scanning of web applications and also supports manual penetration testing.&lt;br /&gt;
*  '''OWASP SWFIntruder''' - http://www.mindedsecurity.com/swfintruder.html&lt;br /&gt;
** SWFIntruder (pronounced Swiff Intruder) is the first tool specifically developed for analyzing and testing security of Flash applications at runtime.&lt;br /&gt;
* '''SWFScan''' - http://h30499.www3.hp.com/t5/Following-the-Wh1t3-Rabbit/SWFScan-FREE-Flash-decompiler/ba-p/5440167 &lt;br /&gt;
** Flash decompiler&lt;br /&gt;
*  '''Wikto''' - http://www.sensepost.com/labs/tools/pentest/wikto&lt;br /&gt;
** Wikto features including fuzzy logic error code checking, a back-end miner, Google-assisted directory mining and real time HTTP request/response monitoring.&lt;br /&gt;
* '''w3af''' - http://w3af.org&lt;br /&gt;
** w3af is a Web Application Attack and Audit Framework. The project’s goal is finding and exploiting web application vulnerabilities.&lt;br /&gt;
* '''skipfish''' - http://code.google.com/p/skipfish/&lt;br /&gt;
** Skipfish is an active web application security reconnaissance tool.&lt;br /&gt;
* '''Web Developer toolbar''' - https://chrome.google.com/webstore/detail/bfbameneiokkgbdmiekhjnmfkcnldhhm&lt;br /&gt;
** The Web Developer extension adds a toolbar button to the browser with various web developer tools. This is the official port of the Web Developer extension for Firefox.&lt;br /&gt;
* '''HTTP Request Maker''' - https://chrome.google.com/webstore/detail/kajfghlhfkcocafkcjlajldicbikpgnp?hl=en-US&lt;br /&gt;
** Request Maker is a tool for penetration testing. With it you can easily capture requests made by web pages, tamper with the URL, headers and POST data and, of course, make new requests&lt;br /&gt;
* '''Cookie Editor''' - https://chrome.google.com/webstore/detail/fngmhnnpilhplaeedifhccceomclgfbg?hl=en-US&lt;br /&gt;
** Edit This Cookie is a cookie manager. You can add, delete, edit, search, protect and block cookies&lt;br /&gt;
* '''Cookie swap''' - https://chrome.google.com/webstore/detail/dffhipnliikkblkhpjapbecpmoilcama?hl=en-US&lt;br /&gt;
** Swap My Cookies is a session manager, it manages cookies, letting you login on any website with several different accounts. &lt;br /&gt;
* '''Firebug lite for Chrome&amp;quot;&amp;quot; -  https://chrome.google.com/webstore/detail/bmagokdooijbeehmkpknfglimnifench&lt;br /&gt;
**Firebug Lite is not a substitute for Firebug, or Chrome Developer Tools. It is a tool to be used in conjunction with these tools. Firebug Lite provides the rich visual representation we are used to see in Firebug when it comes to HTML elements, DOM elements, and Box Model shading. It provides also some cool features like inspecting HTML elemements with your mouse, and live editing CSS properties&lt;br /&gt;
* '''Session Manager&amp;quot;&amp;quot; -  https://chrome.google.com/webstore/detail/bbcnbpafconjjigibnhbfmmgdbbkcjfi&lt;br /&gt;
**With Session Manager you can quickly save your current browser state and reload it whenever necessary. You can manage multiple sessions, rename or remove them from the session library. Each session remembers the state of the browser at its creation time, i.e the opened tabs and windows.&lt;br /&gt;
* '''Subgraph Vega''' - http://www.subgraph.com/products.html &lt;br /&gt;
**Vega is a free and open source scanner and testing platform to test the security of web applications. Vega can help you find and validate SQL Injection, Cross-Site Scripting (XSS), inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI based, and runs on Linux, OS X, and Windows.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Testing for specific vulnerabilities ===&lt;br /&gt;
&lt;br /&gt;
==== Testing for DOM XSS ====&lt;br /&gt;
* DOMinator Pro - https://dominator.mindedsecurity.com&lt;br /&gt;
&lt;br /&gt;
==== Testing AJAX ====&lt;br /&gt;
* '''[[:Category:OWASP Sprajax Project|OWASP Sprajax Project]]'''&lt;br /&gt;
==== Testing for SQL Injection ====&lt;br /&gt;
* '''[[:Category:OWASP_SQLiX_Project|OWASP SQLiX]]'''&lt;br /&gt;
* Sqlninja: a SQL Server Injection &amp;amp; Takeover Tool - http://sqlninja.sourceforge.net&lt;br /&gt;
* Bernardo Damele A. G.: sqlmap, automatic SQL injection tool - http://sqlmap.org/&lt;br /&gt;
* Absinthe 1.1 (formerly SQLSqueal) - http://sourceforge.net/projects/absinthe/&lt;br /&gt;
* SQLInjector - Uses inference techniques to extract data and determine the backend database server.  http://www.databasesecurity.com/sql-injector.htm&lt;br /&gt;
* Bsqlbf-v2: A perl script allows extraction of data from Blind SQL Injections - http://code.google.com/p/bsqlbf-v2/&lt;br /&gt;
* Pangolin: An automatic SQL injection penetration testing tool - http://www.darknet.org.uk/2009/05/pangolin-automatic-sql-injection-tool/&lt;br /&gt;
* Antonio Parata: Dump Files by sql inference on Mysql - SqlDumper - http://www.ruizata.com/&lt;br /&gt;
* Multiple DBMS Sql Injection tool - SQL Power Injector - http://www.sqlpowerinjector.com/&lt;br /&gt;
* MySql Blind Injection Bruteforcing, Reversing.org - sqlbftools - http://packetstormsecurity.org/files/43795/sqlbftools-1.2.tar.gz.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Testing Oracle ====&lt;br /&gt;
* TNS Listener tool (Perl) - http://www.jammed.com/%7Ejwa/hacks/security/tnscmd/tnscmd-doc.html&lt;br /&gt;
* Toad for Oracle - http://www.quest.com/toad &lt;br /&gt;
==== Testing SSL ====&lt;br /&gt;
* Foundstone SSL Digger - http://www.mcafee.com/us/downloads/free-tools/ssldigger.aspx&lt;br /&gt;
==== Testing for Brute Force Password ====&lt;br /&gt;
* THC Hydra - http://www.thc.org/thc-hydra/&lt;br /&gt;
* John the Ripper - http://www.openwall.com/john/&lt;br /&gt;
* Brutus - http://www.hoobie.net/brutus/ &lt;br /&gt;
* Medusa - http://www.foofus.net/~jmk/medusa/medusa.html&lt;br /&gt;
*Ncat - http://nmap.org/ncat/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Testing Buffer Overflow ====&lt;br /&gt;
*  OllyDbg - http://www.ollydbg.de&lt;br /&gt;
** &amp;quot;A windows based debugger used for analyzing buffer overflow vulnerabilities&amp;quot;&lt;br /&gt;
* Spike - http://www.immunitysec.com/downloads/SPIKE2.9.tgz&lt;br /&gt;
** A fuzzer framework that can be used to explore vulnerabilities and perform length testing&lt;br /&gt;
* Brute Force Binary Tester (BFB) - http://bfbtester.sourceforge.net&lt;br /&gt;
** A proactive binary checker&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|link not working&lt;br /&gt;
&lt;br /&gt;
* Metasploit - http://www.metasploit.com/projects/Framework/&lt;br /&gt;
** A rapid exploit development and Testing frame work&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
==== Fuzzer  ====&lt;br /&gt;
* '''[[:Category:OWASP_WSFuzzer_Project|OWASP WSFuzzer]]'''&lt;br /&gt;
* Wfuzz - http://www.darknet.org.uk/2007/07/wfuzz-a-tool-for-bruteforcingfuzzing-web-applications/&lt;br /&gt;
&lt;br /&gt;
==== Googling ====&lt;br /&gt;
* Stach &amp;amp; Liu's Google Hacking Diggity Project - http://www.stachliu.com/resources/tools/google-hacking-diggity-project/&lt;br /&gt;
* Foundstone Sitedigger (Google cached fault-finding) - http://www.mcafee.com/us/downloads/free-tools/sitedigger.aspx&lt;br /&gt;
&lt;br /&gt;
==Commercial Black Box Testing tools==&lt;br /&gt;
&lt;br /&gt;
* NGS Typhon III - http://www.nccgroup.com/en/our-services/security-testing-audit-compliance/information-security-software/ngs-typhon-iii/&lt;br /&gt;
* NGSSQuirreL - http://www.nccgroup.com/en/our-services/security-testing-audit-compliance/information-security-software/ngs-squirrel-vulnerability-scanners/&lt;br /&gt;
* IBM AppScan - http://www-01.ibm.com/software/awdtools/appscan/&lt;br /&gt;
* Cenzic Hailstorm - http://www.cenzic.com/products_services/cenzic_hailstorm.php&lt;br /&gt;
* Burp Intruder - http://www.portswigger.net/burp/intruder.html&lt;br /&gt;
* Acunetix Web Vulnerability Scanner - http://www.acunetix.com&lt;br /&gt;
* Sleuth - http://www.sandsprite.com&lt;br /&gt;
* NT Objectives NTOSpider - http://www.ntobjectives.com/products/ntospider.php&lt;br /&gt;
* MaxPatrol Security Scanner - http://www.maxpatrol.com&lt;br /&gt;
* Ecyware GreenBlue Inspector - http://www.ecyware.com&lt;br /&gt;
* Parasoft SOAtest (more QA-type tool)- http://www.parasoft.com/jsp/products/soatest.jsp?itemId=101&lt;br /&gt;
* MatriXay - http://www.dbappsecurity.com/webscan.html&lt;br /&gt;
* N-Stalker Web Application Security Scanner - http://www.nstalker.com&lt;br /&gt;
* HP WebInspect - http://www.hpenterprisesecurity.com/products/hp-fortify-software-security-center/hp-webinspect&lt;br /&gt;
* SoapUI (Web Service security testing) - http://www.soapui.org/Security/getting-started.html&lt;br /&gt;
* Netsparker - http://www.mavitunasecurity.com/netsparker/&lt;br /&gt;
* SAINT - http://www.saintcorporation.com/&lt;br /&gt;
* QualysGuard WAS - http://www.qualys.com/enterprises/qualysguard/web-application-scanning/&lt;br /&gt;
* Retina Web - http://www.eeye.com/Products/Retina/Web-Security-Scanner.aspx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|check these links&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Cenzic Hailstorm - http://www.cenzic.com/products_services/cenzic_hailstorm.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
link broken:&lt;br /&gt;
&lt;br /&gt;
* ScanDo - http://www.kavado.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
==Source Code Analyzers==&lt;br /&gt;
&lt;br /&gt;
===Open Source / Freeware===&lt;br /&gt;
* [[:Category:OWASP_Orizon_Project|Owasp Orizon]]&lt;br /&gt;
* '''[[:Category:OWASP_LAPSE_Project|OWASP LAPSE]]''' &lt;br /&gt;
* [[OWASP O2 Platform]]&lt;br /&gt;
* Google CodeSearchDiggity - http://www.stachliu.com/resources/tools/google-hacking-diggity-project/attack-tools/&lt;br /&gt;
* PMD - http://pmd.sourceforge.net/&lt;br /&gt;
* FlawFinder - http://www.dwheeler.com/flawfinder&lt;br /&gt;
* Microsoft’s [[FxCop]]&lt;br /&gt;
* Splint - http://splint.org&lt;br /&gt;
* Boon - http://www.cs.berkeley.edu/~daw/boon&lt;br /&gt;
* FindBugs - http://findbugs.sourceforge.net&lt;br /&gt;
* Find Security Bugs - http://h3xstream.github.io/find-sec-bugs/&lt;br /&gt;
* Oedipus - http://www.darknet.org.uk/2006/06/oedipus-open-source-web-application-security-analysis/&lt;br /&gt;
* W3af - http://w3af.sourceforge.net/&lt;br /&gt;
* phpcs-security-audit - https://github.com/Pheromone/phpcs-security-audit&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|broken link&lt;br /&gt;
&lt;br /&gt;
* Pscan - http://www.striker.ottawa.on.ca/~aland/pscan&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
===Commercial ===&lt;br /&gt;
&lt;br /&gt;
* Armorize CodeSecure - http://www.armorize.com/index.php?link_id=codesecure&lt;br /&gt;
* Parasoft C/C++ test - http://www.parasoft.com/jsp/products/cpptest.jsp/index.htm&lt;br /&gt;
* Checkmarx CxSuite  - http://www.checkmarx.com&lt;br /&gt;
* HP Fortify - http://www.hpenterprisesecurity.com/products/hp-fortify-software-security-center/hp-fortify-static-code-analyzer&lt;br /&gt;
* GrammaTech - http://www.grammatech.com&lt;br /&gt;
* ITS4 - http://seclab.cs.ucdavis.edu/projects/testing/tools/its4.html&lt;br /&gt;
* Appscan - http://www-01.ibm.com/software/rational/products/appscan/source/&lt;br /&gt;
* ParaSoft - http://www.parasoft.com&lt;br /&gt;
* Virtual Forge CodeProfiler for ABAP - http://www.virtualforge.de&lt;br /&gt;
* Veracode - http://www.veracode.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|link not working&lt;br /&gt;
&lt;br /&gt;
* Armorize CodeSecure - http://www.armorize.com/product/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
==Acceptance Testing Tools==&lt;br /&gt;
Acceptance testing tools are used to validate the functionality of web applications.  Some follow a scripted approach and typically make use of a Unit Testing framework to construct test suites and test cases.  Most, if not all, can be adapted to perform security specific tests in addition to functional tests.&lt;br /&gt;
&lt;br /&gt;
===Open Source Tools===&lt;br /&gt;
&lt;br /&gt;
* WATIR - http://wtr.rubyforge.org&lt;br /&gt;
** A Ruby based web testing framework that provides an interface into Internet Explorer.&lt;br /&gt;
** Windows only.&lt;br /&gt;
* HtmlUnit - http://htmlunit.sourceforge.net &lt;br /&gt;
** A Java and JUnit based framework that uses the Apache HttpClient as the transport.&lt;br /&gt;
** Very robust and configurable and is used as the engine for a number of other testing tools.&lt;br /&gt;
* jWebUnit - http://jwebunit.sourceforge.net&lt;br /&gt;
** A Java based meta-framework that uses htmlunit or selenium as the testing engine.&lt;br /&gt;
* Canoo Webtest - http://webtest.canoo.com&lt;br /&gt;
** An XML based testing tool that provides a facade on top of htmlunit.&lt;br /&gt;
** No coding is necessary as the tests are completely specified in XML.&lt;br /&gt;
** There is the option of scripting some elements in Groovy if XML does not suffice.&lt;br /&gt;
** Very actively maintained.&lt;br /&gt;
* HttpUnit - http://httpunit.sourceforge.net&lt;br /&gt;
** One of the first web testing frameworks, suffers from using the native JDK provided HTTP transport, which can be a bit limiting for security testing.&lt;br /&gt;
* Watij - http://watij.com&lt;br /&gt;
** A Java implementation of WATIR.&lt;br /&gt;
** Windows only because it uses IE for its tests (Mozilla integration is in the works).&lt;br /&gt;
* Solex - http://solex.sourceforge.net&lt;br /&gt;
** An Eclipse plugin that provides a graphical tool to record HTTP sessions and make assertions based on the results.&lt;br /&gt;
* Selenium - http://seleniumhq.org/&lt;br /&gt;
** JavaScript based testing framework, cross-platform and provides a GUI for creating tests.&lt;br /&gt;
** Mature and popular tool, but the use of JavaScript could hamper certain security tests.&lt;br /&gt;
&lt;br /&gt;
==Other Tools==&lt;br /&gt;
&lt;br /&gt;
===Runtime Analysis===&lt;br /&gt;
&lt;br /&gt;
* Rational PurifyPlus - http://www-01.ibm.com/software/awdtools/purify/&lt;br /&gt;
* Seeker by Quotium - http://www.quotium.com/prod/security.php&lt;br /&gt;
&lt;br /&gt;
===Binary Analysis===&lt;br /&gt;
&lt;br /&gt;
* BugScam IDC Package - http://sourceforge.net/projects/bugscam&lt;br /&gt;
* Veracode - http://www.veracode.com&lt;br /&gt;
&lt;br /&gt;
===Requirements Management===&lt;br /&gt;
&lt;br /&gt;
* Rational Requisite Pro - http://www-306.ibm.com/software/awdtools/reqpro&lt;br /&gt;
&lt;br /&gt;
===Site Mirroring===&lt;br /&gt;
* wget - http://www.gnu.org/software/wget, http://www.interlog.com/~tcharron/wgetwin.html&lt;br /&gt;
* curl - http://curl.haxx.se &lt;br /&gt;
* Sam Spade - http://www.samspade.org&lt;br /&gt;
* Xenu's Link Sleuth - http://home.snafu.de/tilman/xenulink.html&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Appendix_A:_Testing_Tools&amp;diff=171479</id>
		<title>Appendix A: Testing Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Appendix_A:_Testing_Tools&amp;diff=171479"/>
				<updated>2014-04-02T18:19:57Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
==Open Source Black Box Testing tools==&lt;br /&gt;
&lt;br /&gt;
=== General Testing ===&lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_WebScarab_Project|OWASP WebScarab]]'''&lt;br /&gt;
** WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins.&lt;br /&gt;
* '''[[OWASP_CAL9000_Project|OWASP CAL9000]]'''&lt;br /&gt;
** CAL9000 is a collection of browser-based tools that enable more effective and efficient manual testing efforts.&lt;br /&gt;
** Includes an XSS Attack Library, Character Encoder/Decoder, HTTP Request Generator and Response Evaluator, Testing Checklist, Automated Attack Editor and much more.&lt;br /&gt;
*  '''[[:Category:OWASP Pantera Web Assessment Studio Project|OWASP Pantera Web Assessment Studio Project]]'''&lt;br /&gt;
** Pantera uses an improved version of SpikeProxy to provide a powerful web application analysis engine. The primary goal of Pantera is to combine automated capabilities with complete manual testing to get the best penetration testing results.&lt;br /&gt;
* '''[[:OWASP Zed Attack Proxy Project]]'''&lt;br /&gt;
** The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.&lt;br /&gt;
** ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.&lt;br /&gt;
* '''[[:OWASP Mantra - Security Framework]]'''&lt;br /&gt;
**Mantra is a web application security testing framework built on top of a browser. It supports Windows, Linux(both 32 and 64 bit) and Macintosh, in addition, it can work with other software like ZAP using built in proxy management function which makes it much more convenient. Mantra is available in 9 languages: Arabic, Chinese - Simplified, Chinese - Traditional, English, French, Portuguese, Russian, Spanish and Turkish.&lt;br /&gt;
* '''SPIKE''' - http://www.immunitysec.com/resources-freesoftware.shtml&lt;br /&gt;
** SPIKE designed to analyze new network protocols for buffer overflows or similar weaknesses. It requires a strong knowledge of C to use and only available for the Linux platform.&lt;br /&gt;
* '''Burp Proxy''' - http://www.portswigger.net/Burp/&lt;br /&gt;
** Burp Proxy is an intercepting proxy server for security testing of web applications it allows Intercepting and modifying all HTTP/S traffic passing in both directions, it can work with custom SSL certificates and non-proxy-aware clients.&lt;br /&gt;
* '''Odysseus Proxy''' - http://www.wastelands.gen.nz/odysseus/&lt;br /&gt;
** Odysseus is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical HTTP proxy will relay packets to and from a client browser and a web server. It will intercept an HTTP session's data in either direction.&lt;br /&gt;
* '''Webstretch Proxy''' - http://sourceforge.net/projects/webstretch&lt;br /&gt;
** Webstretch Proxy enable users to view and alter all aspects of communications with a web site via a proxy. It can also be used for debugging during development. &lt;br /&gt;
*  '''WATOBO''' - http://sourceforge.net/apps/mediawiki/watobo/index.php?title=Main_Page&lt;br /&gt;
** WATOBO works like a local proxy, similar to Webscarab, ZAP or BurpSuite and it supports passive and active checks.&lt;br /&gt;
* '''Firefox LiveHTTPHeaders''' - https://addons.mozilla.org/en-US/firefox/addon/live-http-headers/&lt;br /&gt;
** View HTTP headers of a page and while browsing.&lt;br /&gt;
* '''Firefox Tamper Data''' - https://addons.mozilla.org/en-US/firefox/addon/tamper-data/&lt;br /&gt;
** Use tamperdata to view and modify HTTP/HTTPS headers and post parameters&lt;br /&gt;
* '''Firefox Web Developer Tools''' - https://addons.mozilla.org/en-US/firefox/addon/web-developer/&lt;br /&gt;
** The Web Developer extension adds various web developer tools to the browser.&lt;br /&gt;
* '''DOM Inspector''' - https://developer.mozilla.org/en/docs/DOM_Inspector&lt;br /&gt;
**  DOM Inspector is a developer tool used to inspect, browse, and edit the Document Object Model (DOM)&lt;br /&gt;
* '''Firefox Firebug''' - http://getfirebug.com/&lt;br /&gt;
** Firebug integrates with Firefox to edit, debug, and monitor CSS, HTML, and JavaScript.&lt;br /&gt;
* '''Grendel-Scan''' - http://securitytube-tools.net/index.php?title=Grendel_Scan&lt;br /&gt;
** Grendel-Scan is an automated security scanning of web applications and also supports manual penetration testing.&lt;br /&gt;
*  '''OWASP SWFIntruder''' - http://www.mindedsecurity.com/swfintruder.html&lt;br /&gt;
** SWFIntruder (pronounced Swiff Intruder) is the first tool specifically developed for analyzing and testing security of Flash applications at runtime.&lt;br /&gt;
* '''SWFScan''' - http://h30499.www3.hp.com/t5/Following-the-Wh1t3-Rabbit/SWFScan-FREE-Flash-decompiler/ba-p/5440167 &lt;br /&gt;
** Flash decompiler&lt;br /&gt;
*  '''Wikto''' - http://www.sensepost.com/labs/tools/pentest/wikto&lt;br /&gt;
** Wikto features including fuzzy logic error code checking, a back-end miner, Google-assisted directory mining and real time HTTP request/response monitoring.&lt;br /&gt;
* '''w3af''' - http://w3af.org&lt;br /&gt;
** w3af is a Web Application Attack and Audit Framework. The project’s goal is finding and exploiting web application vulnerabilities.&lt;br /&gt;
* '''skipfish''' - http://code.google.com/p/skipfish/&lt;br /&gt;
** Skipfish is an active web application security reconnaissance tool.&lt;br /&gt;
* '''Web Developer toolbar''' - https://chrome.google.com/webstore/detail/bfbameneiokkgbdmiekhjnmfkcnldhhm&lt;br /&gt;
** The Web Developer extension adds a toolbar button to the browser with various web developer tools. This is the official port of the Web Developer extension for Firefox.&lt;br /&gt;
** '''HTTP Request Maker''' - https://chrome.google.com/webstore/detail/kajfghlhfkcocafkcjlajldicbikpgnp?hl=en-US&lt;br /&gt;
* Request Maker is a tool for penetration testing. With it you can easily capture requests made by web pages, tamper with the URL, headers and POST data and, of course, make new requests&lt;br /&gt;
** '''Cookie Editor''' - https://chrome.google.com/webstore/detail/fngmhnnpilhplaeedifhccceomclgfbg?hl=en-US&lt;br /&gt;
* Edit This Cookie is a cookie manager. You can add, delete, edit, search, protect and block cookies&lt;br /&gt;
** '''Cookie swap''' - https://chrome.google.com/webstore/detail/dffhipnliikkblkhpjapbecpmoilcama?hl=en-US&lt;br /&gt;
* Swap My Cookies is a session manager, it manages cookies, letting you login on any website with several different accounts. &lt;br /&gt;
** '''Firebug lite for Chrome&amp;quot;&amp;quot; -  https://chrome.google.com/webstore/detail/bmagokdooijbeehmkpknfglimnifench&lt;br /&gt;
*Firebug Lite is not a substitute for Firebug, or Chrome Developer Tools. It is a tool to be used in conjunction with these tools. Firebug Lite provides the rich visual representation we are used to see in Firebug when it comes to HTML elements, DOM elements, and Box Model shading. It provides also some cool features like inspecting HTML elemements with your mouse, and live editing CSS properties&lt;br /&gt;
** '''Session Manager&amp;quot;&amp;quot; -  https://chrome.google.com/webstore/detail/bbcnbpafconjjigibnhbfmmgdbbkcjfi&lt;br /&gt;
*With Session Manager you can quickly save your current browser state and reload it whenever necessary. You can manage multiple sessions, rename or remove them from the session library. Each session remembers the state of the browser at its creation time, i.e the opened tabs and windows.&lt;br /&gt;
** '''Subgraph Vega''' - http://www.subgraph.com/products.html &lt;br /&gt;
*Vega is a free and open source scanner and testing platform to test the security of web applications. Vega can help you find and validate SQL Injection, Cross-Site Scripting (XSS), inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI based, and runs on Linux, OS X, and Windows.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Testing for specific vulnerabilities ===&lt;br /&gt;
&lt;br /&gt;
==== Testing for DOM XSS ====&lt;br /&gt;
* DOMinator Pro - https://dominator.mindedsecurity.com&lt;br /&gt;
&lt;br /&gt;
==== Testing AJAX ====&lt;br /&gt;
* '''[[:Category:OWASP Sprajax Project|OWASP Sprajax Project]]'''&lt;br /&gt;
==== Testing for SQL Injection ====&lt;br /&gt;
* '''[[:Category:OWASP_SQLiX_Project|OWASP SQLiX]]'''&lt;br /&gt;
* Sqlninja: a SQL Server Injection &amp;amp; Takeover Tool - http://sqlninja.sourceforge.net&lt;br /&gt;
* Bernardo Damele A. G.: sqlmap, automatic SQL injection tool - http://sqlmap.org/&lt;br /&gt;
* Absinthe 1.1 (formerly SQLSqueal) - http://sourceforge.net/projects/absinthe/&lt;br /&gt;
* SQLInjector - Uses inference techniques to extract data and determine the backend database server.  http://www.databasesecurity.com/sql-injector.htm&lt;br /&gt;
* Bsqlbf-v2: A perl script allows extraction of data from Blind SQL Injections - http://code.google.com/p/bsqlbf-v2/&lt;br /&gt;
* Pangolin: An automatic SQL injection penetration testing tool - http://www.darknet.org.uk/2009/05/pangolin-automatic-sql-injection-tool/&lt;br /&gt;
* Antonio Parata: Dump Files by sql inference on Mysql - SqlDumper - http://www.ruizata.com/&lt;br /&gt;
* Multiple DBMS Sql Injection tool - SQL Power Injector - http://www.sqlpowerinjector.com/&lt;br /&gt;
* MySql Blind Injection Bruteforcing, Reversing.org - sqlbftools - http://packetstormsecurity.org/files/43795/sqlbftools-1.2.tar.gz.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Testing Oracle ====&lt;br /&gt;
* TNS Listener tool (Perl) - http://www.jammed.com/%7Ejwa/hacks/security/tnscmd/tnscmd-doc.html&lt;br /&gt;
* Toad for Oracle - http://www.quest.com/toad &lt;br /&gt;
==== Testing SSL ====&lt;br /&gt;
* Foundstone SSL Digger - http://www.mcafee.com/us/downloads/free-tools/ssldigger.aspx&lt;br /&gt;
==== Testing for Brute Force Password ====&lt;br /&gt;
* THC Hydra - http://www.thc.org/thc-hydra/&lt;br /&gt;
* John the Ripper - http://www.openwall.com/john/&lt;br /&gt;
* Brutus - http://www.hoobie.net/brutus/ &lt;br /&gt;
* Medusa - http://www.foofus.net/~jmk/medusa/medusa.html&lt;br /&gt;
*Ncat - http://nmap.org/ncat/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Testing Buffer Overflow ====&lt;br /&gt;
*  OllyDbg - http://www.ollydbg.de&lt;br /&gt;
** &amp;quot;A windows based debugger used for analyzing buffer overflow vulnerabilities&amp;quot;&lt;br /&gt;
* Spike - http://www.immunitysec.com/downloads/SPIKE2.9.tgz&lt;br /&gt;
** A fuzzer framework that can be used to explore vulnerabilities and perform length testing&lt;br /&gt;
* Brute Force Binary Tester (BFB) - http://bfbtester.sourceforge.net&lt;br /&gt;
** A proactive binary checker&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|link not working&lt;br /&gt;
&lt;br /&gt;
* Metasploit - http://www.metasploit.com/projects/Framework/&lt;br /&gt;
** A rapid exploit development and Testing frame work&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
==== Fuzzer  ====&lt;br /&gt;
* '''[[:Category:OWASP_WSFuzzer_Project|OWASP WSFuzzer]]'''&lt;br /&gt;
* Wfuzz - http://www.darknet.org.uk/2007/07/wfuzz-a-tool-for-bruteforcingfuzzing-web-applications/&lt;br /&gt;
&lt;br /&gt;
==== Googling ====&lt;br /&gt;
* Stach &amp;amp; Liu's Google Hacking Diggity Project - http://www.stachliu.com/resources/tools/google-hacking-diggity-project/&lt;br /&gt;
* Foundstone Sitedigger (Google cached fault-finding) - http://www.mcafee.com/us/downloads/free-tools/sitedigger.aspx&lt;br /&gt;
&lt;br /&gt;
==Commercial Black Box Testing tools==&lt;br /&gt;
&lt;br /&gt;
* NGS Typhon III - http://www.nccgroup.com/en/our-services/security-testing-audit-compliance/information-security-software/ngs-typhon-iii/&lt;br /&gt;
* NGSSQuirreL - http://www.nccgroup.com/en/our-services/security-testing-audit-compliance/information-security-software/ngs-squirrel-vulnerability-scanners/&lt;br /&gt;
* IBM AppScan - http://www-01.ibm.com/software/awdtools/appscan/&lt;br /&gt;
* Cenzic Hailstorm - http://www.cenzic.com/products_services/cenzic_hailstorm.php&lt;br /&gt;
* Burp Intruder - http://www.portswigger.net/burp/intruder.html&lt;br /&gt;
* Acunetix Web Vulnerability Scanner - http://www.acunetix.com&lt;br /&gt;
* Sleuth - http://www.sandsprite.com&lt;br /&gt;
* NT Objectives NTOSpider - http://www.ntobjectives.com/products/ntospider.php&lt;br /&gt;
* MaxPatrol Security Scanner - http://www.maxpatrol.com&lt;br /&gt;
* Ecyware GreenBlue Inspector - http://www.ecyware.com&lt;br /&gt;
* Parasoft SOAtest (more QA-type tool)- http://www.parasoft.com/jsp/products/soatest.jsp?itemId=101&lt;br /&gt;
* MatriXay - http://www.dbappsecurity.com/webscan.html&lt;br /&gt;
* N-Stalker Web Application Security Scanner - http://www.nstalker.com&lt;br /&gt;
* HP WebInspect - http://www.hpenterprisesecurity.com/products/hp-fortify-software-security-center/hp-webinspect&lt;br /&gt;
* SoapUI (Web Service security testing) - http://www.soapui.org/Security/getting-started.html&lt;br /&gt;
* Netsparker - http://www.mavitunasecurity.com/netsparker/&lt;br /&gt;
* SAINT - http://www.saintcorporation.com/&lt;br /&gt;
* QualysGuard WAS - http://www.qualys.com/enterprises/qualysguard/web-application-scanning/&lt;br /&gt;
* Retina Web - http://www.eeye.com/Products/Retina/Web-Security-Scanner.aspx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|check these links&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Cenzic Hailstorm - http://www.cenzic.com/products_services/cenzic_hailstorm.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
link broken:&lt;br /&gt;
&lt;br /&gt;
* ScanDo - http://www.kavado.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
==Source Code Analyzers==&lt;br /&gt;
&lt;br /&gt;
===Open Source / Freeware===&lt;br /&gt;
* [[:Category:OWASP_Orizon_Project|Owasp Orizon]]&lt;br /&gt;
* '''[[:Category:OWASP_LAPSE_Project|OWASP LAPSE]]''' &lt;br /&gt;
* [[OWASP O2 Platform]]&lt;br /&gt;
* Google CodeSearchDiggity - http://www.stachliu.com/resources/tools/google-hacking-diggity-project/attack-tools/&lt;br /&gt;
* PMD - http://pmd.sourceforge.net/&lt;br /&gt;
* FlawFinder - http://www.dwheeler.com/flawfinder&lt;br /&gt;
* Microsoft’s [[FxCop]]&lt;br /&gt;
* Splint - http://splint.org&lt;br /&gt;
* Boon - http://www.cs.berkeley.edu/~daw/boon&lt;br /&gt;
* FindBugs - http://findbugs.sourceforge.net&lt;br /&gt;
* Find Security Bugs - http://h3xstream.github.io/find-sec-bugs/&lt;br /&gt;
* Oedipus - http://www.darknet.org.uk/2006/06/oedipus-open-source-web-application-security-analysis/&lt;br /&gt;
* W3af - http://w3af.sourceforge.net/&lt;br /&gt;
* phpcs-security-audit - https://github.com/Pheromone/phpcs-security-audit&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|broken link&lt;br /&gt;
&lt;br /&gt;
* Pscan - http://www.striker.ottawa.on.ca/~aland/pscan&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
===Commercial ===&lt;br /&gt;
&lt;br /&gt;
* Armorize CodeSecure - http://www.armorize.com/index.php?link_id=codesecure&lt;br /&gt;
* Parasoft C/C++ test - http://www.parasoft.com/jsp/products/cpptest.jsp/index.htm&lt;br /&gt;
* Checkmarx CxSuite  - http://www.checkmarx.com&lt;br /&gt;
* HP Fortify - http://www.hpenterprisesecurity.com/products/hp-fortify-software-security-center/hp-fortify-static-code-analyzer&lt;br /&gt;
* GrammaTech - http://www.grammatech.com&lt;br /&gt;
* ITS4 - http://seclab.cs.ucdavis.edu/projects/testing/tools/its4.html&lt;br /&gt;
* Appscan - http://www-01.ibm.com/software/rational/products/appscan/source/&lt;br /&gt;
* ParaSoft - http://www.parasoft.com&lt;br /&gt;
* Virtual Forge CodeProfiler for ABAP - http://www.virtualforge.de&lt;br /&gt;
* Veracode - http://www.veracode.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|link not working&lt;br /&gt;
&lt;br /&gt;
* Armorize CodeSecure - http://www.armorize.com/product/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
==Acceptance Testing Tools==&lt;br /&gt;
Acceptance testing tools are used to validate the functionality of web applications.  Some follow a scripted approach and typically make use of a Unit Testing framework to construct test suites and test cases.  Most, if not all, can be adapted to perform security specific tests in addition to functional tests.&lt;br /&gt;
&lt;br /&gt;
===Open Source Tools===&lt;br /&gt;
&lt;br /&gt;
* WATIR - http://wtr.rubyforge.org&lt;br /&gt;
** A Ruby based web testing framework that provides an interface into Internet Explorer.&lt;br /&gt;
** Windows only.&lt;br /&gt;
* HtmlUnit - http://htmlunit.sourceforge.net &lt;br /&gt;
** A Java and JUnit based framework that uses the Apache HttpClient as the transport.&lt;br /&gt;
** Very robust and configurable and is used as the engine for a number of other testing tools.&lt;br /&gt;
* jWebUnit - http://jwebunit.sourceforge.net&lt;br /&gt;
** A Java based meta-framework that uses htmlunit or selenium as the testing engine.&lt;br /&gt;
* Canoo Webtest - http://webtest.canoo.com&lt;br /&gt;
** An XML based testing tool that provides a facade on top of htmlunit.&lt;br /&gt;
** No coding is necessary as the tests are completely specified in XML.&lt;br /&gt;
** There is the option of scripting some elements in Groovy if XML does not suffice.&lt;br /&gt;
** Very actively maintained.&lt;br /&gt;
* HttpUnit - http://httpunit.sourceforge.net&lt;br /&gt;
** One of the first web testing frameworks, suffers from using the native JDK provided HTTP transport, which can be a bit limiting for security testing.&lt;br /&gt;
* Watij - http://watij.com&lt;br /&gt;
** A Java implementation of WATIR.&lt;br /&gt;
** Windows only because it uses IE for its tests (Mozilla integration is in the works).&lt;br /&gt;
* Solex - http://solex.sourceforge.net&lt;br /&gt;
** An Eclipse plugin that provides a graphical tool to record HTTP sessions and make assertions based on the results.&lt;br /&gt;
* Selenium - http://seleniumhq.org/&lt;br /&gt;
** JavaScript based testing framework, cross-platform and provides a GUI for creating tests.&lt;br /&gt;
** Mature and popular tool, but the use of JavaScript could hamper certain security tests.&lt;br /&gt;
&lt;br /&gt;
==Other Tools==&lt;br /&gt;
&lt;br /&gt;
===Runtime Analysis===&lt;br /&gt;
&lt;br /&gt;
* Rational PurifyPlus - http://www-01.ibm.com/software/awdtools/purify/&lt;br /&gt;
* Seeker by Quotium - http://www.quotium.com/prod/security.php&lt;br /&gt;
&lt;br /&gt;
===Binary Analysis===&lt;br /&gt;
&lt;br /&gt;
* BugScam IDC Package - http://sourceforge.net/projects/bugscam&lt;br /&gt;
* Veracode - http://www.veracode.com&lt;br /&gt;
&lt;br /&gt;
===Requirements Management===&lt;br /&gt;
&lt;br /&gt;
* Rational Requisite Pro - http://www-306.ibm.com/software/awdtools/reqpro&lt;br /&gt;
&lt;br /&gt;
===Site Mirroring===&lt;br /&gt;
* wget - http://www.gnu.org/software/wget, http://www.interlog.com/~tcharron/wgetwin.html&lt;br /&gt;
* curl - http://curl.haxx.se &lt;br /&gt;
* Sam Spade - http://www.samspade.org&lt;br /&gt;
* Xenu's Link Sleuth - http://home.snafu.de/tilman/xenulink.html&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Test_HTTP_Methods_(OTG-CONFIG-006)&amp;diff=171422</id>
		<title>Test HTTP Methods (OTG-CONFIG-006)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Test_HTTP_Methods_(OTG-CONFIG-006)&amp;diff=171422"/>
				<updated>2014-04-01T21:57:25Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
HTTP offers a number of methods that can be used to perform actions on the web server. Many of theses methods are designed to aid developers in deploying and testing HTTP applications. These HTTP methods can be used for nefarious purposes if the web server is misconfigured. Additionally, Cross Site Tracing (XST), a form of cross site scripting using the server's HTTP TRACE method, is examined.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Short Description of the Issue == &lt;br /&gt;
While GET and POST are by far the most common methods that are used to access information provided by a web server, the Hypertext Transfer Protocol (HTTP) allows several other (and somewhat less known) methods. RFC  2616 (which describes HTTP version 1.1 which is the today standard) defines the following eight methods:&lt;br /&gt;
&lt;br /&gt;
* HEAD&lt;br /&gt;
* GET&lt;br /&gt;
* POST&lt;br /&gt;
* PUT&lt;br /&gt;
* DELETE&lt;br /&gt;
* TRACE&lt;br /&gt;
* OPTIONS&lt;br /&gt;
* CONNECT&lt;br /&gt;
&lt;br /&gt;
Some of these methods can potentially pose a security risk for a web application, as they allow an attacker to modify the files stored on the web server and, in some scenarios, steal the credentials of legitimate users. More specifically, the methods that should be disabled are the following:&lt;br /&gt;
&lt;br /&gt;
* PUT: This method allows a client to upload new files on the web server. An attacker can exploit it by uploading malicious files (e.g.: an asp file that executes commands by invoking cmd.exe), or by simply using the victim's server as a file repository&lt;br /&gt;
* DELETE: This method allows a client to delete a file on the web server. An attacker can exploit it as a very simple and direct way to deface a web site or to mount a DoS attack&lt;br /&gt;
* CONNECT:  This method could allow a client to use the web server as a proxy&lt;br /&gt;
* TRACE: This method simply echoes back to the client whatever string has been sent to the server, and is used mainly for debugging purposes. This method, originally assumed harmless, can be used to mount an attack known as Cross Site Tracing, which has been discovered by Jeremiah Grossman (see links at the bottom of the page)&lt;br /&gt;
&lt;br /&gt;
If an application needs one or more of these methods, such as REST Web Services (which may require PUT or DELETE), it is important to check that their usage is properly limited to trusted users and safe conditions.&lt;br /&gt;
&lt;br /&gt;
== Arbitrary HTTP Methods ==&lt;br /&gt;
&lt;br /&gt;
Arshan Dabirsiaghi (see links) discovered that many web application frameworks allowed well chosen and/or arbitrary HTTP methods to bypass an environment level access control check:&lt;br /&gt;
&lt;br /&gt;
* Many frameworks and languages treat &amp;quot;HEAD&amp;quot; as a &amp;quot;GET&amp;quot; request, albeit one without any body in the response. If a security constraint was set on &amp;quot;GET&amp;quot; requests such that only &amp;quot;authenticatedUsers&amp;quot; could access GET requests for a particular servlet or resource, it would be bypassed for the &amp;quot;HEAD&amp;quot; version. This allowed unauthorized blind submission of any privileged GET request&lt;br /&gt;
&lt;br /&gt;
* Some frameworks allowed arbitrary HTTP methods such as &amp;quot;JEFF&amp;quot; or &amp;quot;CATS&amp;quot; to be used without limitation. These were treated as if a &amp;quot;GET&amp;quot; method was issued, and again were found not to be subject to method role based access control checks on a number of languages and frameworks, again allowing unauthorized blind submission of privileged GET requests.&lt;br /&gt;
&lt;br /&gt;
In many cases, code which explicitly checked for a &amp;quot;GET&amp;quot; or &amp;quot;POST&amp;quot; method would be safe. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
'''Discover the Supported Methods''' &amp;lt;br&amp;gt;&lt;br /&gt;
To perform this test, we need some way to figure out which HTTP methods are supported by the web server we are examining. The OPTIONS HTTP method provides us with the most direct and effective way to do that. RFC 2616 states that, &amp;quot;The OPTIONS method represents a request for information about the  communication options available on the request/response chain identified by the Request-URI&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
The testing method is extremely straightforward and we only need to fire up netcat (or telnet):&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc www.victim.com 80 &lt;br /&gt;
OPTIONS / HTTP/1.1&lt;br /&gt;
Host: www.victim.com&lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK&lt;br /&gt;
Server: Microsoft-IIS/5.0&lt;br /&gt;
Date: Tue, 31 Oct 2006 08:00:29 GMT&lt;br /&gt;
Connection: close&lt;br /&gt;
Allow: GET, HEAD, POST, TRACE, OPTIONS&lt;br /&gt;
Content-Length: 0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
As we can see in the example, OPTIONS provides a list of the methods that are supported by the web server, and in this case we can see, for instance, that TRACE method is enabled. The danger that is posed by this method is illustrated in the following section&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Test XST Potential'''&amp;lt;br&amp;gt;&lt;br /&gt;
Note: in order to understand the logic and the goals of this attack you need to be familiar with [[XSS |Cross Site Scripting attacks]].&lt;br /&gt;
&lt;br /&gt;
The TRACE method, while apparently harmless, can be successfully leveraged in some scenarios to steal legitimate users' credentials. This attack technique was discovered by Jeremiah Grossman in 2003, in an attempt to bypass the [[HTTPOnly]] tag that Microsoft introduced in Internet Explorer 6 sp1 to protect cookies from being accessed by JavaScript. As a matter of fact, one of the most recurring attack patterns in Cross Site Scripting is to access the document.cookie object and send it to a web server controlled by the attacker so that he/she can hijack the victim's session. Tagging a cookie as httpOnly forbids JavaScript to access it, protecting it from being sent to a third party. However, the TRACE method can be used to bypass this protection and access the cookie even in this scenario.&lt;br /&gt;
&lt;br /&gt;
As mentioned before, TRACE simply returns any string that is sent to the web server. In order to verify its presence (or to double-check the results of the OPTIONS request shown above), we can proceed as shown in the following example:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc www.victim.com 80&lt;br /&gt;
TRACE / HTTP/1.1&lt;br /&gt;
Host: www.victim.com&lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK&lt;br /&gt;
Server: Microsoft-IIS/5.0&lt;br /&gt;
Date: Tue, 31 Oct 2006 08:01:48 GMT&lt;br /&gt;
Connection: close&lt;br /&gt;
Content-Type: message/http&lt;br /&gt;
Content-Length: 39&lt;br /&gt;
&lt;br /&gt;
TRACE / HTTP/1.1&lt;br /&gt;
Host: www.victim.com&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
As we can see, the response body is exactly a copy of our original request, meaning that our target allows this method. Now, where is the danger lurking? If we instruct a browser to issue a TRACE request to the web server, and this browser has a cookie for that domain, the cookie will be automatically included in the request headers, and will therefore be echoed back in the resulting response. At that point, the cookie string will be accessible by JavaScript and it will be finally possible to send it to a third party even when the cookie is tagged as httpOnly.&lt;br /&gt;
&lt;br /&gt;
There are multiple ways to make a browser issue a TRACE request, such as the XMLHTTP ActiveX control in Internet Explorer and XMLDOM in Mozilla and Netscape. However, for security reasons the browser is allowed to start a connection only to the domain where the hostile script resides. This is a mitigating factor, as the attacker needs to combine the TRACE method with another vulnerability in order to mount the attack. Basically, an attacker has two ways to successfully launch a Cross Site Tracing attack:&lt;br /&gt;
&lt;br /&gt;
# Leveraging another server-side vulnerability: the attacker injects the hostile JavaScript snippet that contains the TRACE request in the vulnerable application, as in a normal Cross Site Scripting attack&lt;br /&gt;
# Leveraging a client-side vulnerability: the attacker creates a malicious website that contains the hostile JavaScript snippet and exploits some cross-domain vulnerability of the browser of the victim, in order to make the JavaScript code successfully perform a connection to the site that supports the TRACE method and that originated the cookie that the attacker is trying to steal.&lt;br /&gt;
&lt;br /&gt;
More detailed information, together with code samples, can be found in the original whitepaper written by Jeremiah Grossman.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Black Box Testing of HTTP method tampering ==&lt;br /&gt;
&lt;br /&gt;
Testing for HTTP method tampering is essentially the same as testing for XST. &lt;br /&gt;
&lt;br /&gt;
=== Testing for arbitrary HTTP methods ===&lt;br /&gt;
&lt;br /&gt;
Find a page you'd like to visit that has a security constraint such that it would normally force a 302 redirect to a login page or forces a login directly. The test URL in this example works like this - as do many web applications. However, if you obtain a &amp;quot;200&amp;quot; response that is not a login page, it is possible to bypass authentication and thus authorization.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc www.example.com 80&lt;br /&gt;
JEFF / HTTP/1.1&lt;br /&gt;
Host: www.example.com&lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK&lt;br /&gt;
Date: Mon, 18 Aug 2008 22:38:40 GMT&lt;br /&gt;
Server: Apache&lt;br /&gt;
Set-Cookie: PHPSESSID=K53QW...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If your framework or firewall or application does not support the &amp;quot;JEFF&amp;quot; method, it should issue an error page (or preferably a 405 Not Allowed or 501 Not implemented error page). If it services the request, it is vulnerable to this issue.&lt;br /&gt;
&lt;br /&gt;
If you feel that the system is vulnerable to this issue, issue CSRF-like attacks to exploit the issue more fully:&lt;br /&gt;
&lt;br /&gt;
* FOOBAR /admin/createUser.php?member=myAdmin&lt;br /&gt;
* JEFF /admin/changePw.php?member=myAdmin&amp;amp;passwd=foo123&amp;amp;confirm=foo123&lt;br /&gt;
* CATS /admin/groupEdit.php?group=Admins&amp;amp;member=myAdmin&amp;amp;action=add&lt;br /&gt;
&lt;br /&gt;
With some luck, using the above three commands - modified to suit the application under test and testing requirements - a new user would be created, a password assigned, and made an admin.&lt;br /&gt;
&lt;br /&gt;
=== Testing for HEAD access control bypass ===&lt;br /&gt;
&lt;br /&gt;
Find a page you'd like to visit that has a security constraint such that it would normally force a 302 redirect to a login page or forces a login directly. The test URL in this example works like this - as do many web applications. However, if you obtain a &amp;quot;200&amp;quot; response that is not a login page, it is possible to bypass authentication and thus authorization.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc www.example.com 80&lt;br /&gt;
HEAD /admin HTTP/1.1&lt;br /&gt;
Host: www.example.com&lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK&lt;br /&gt;
Date: Mon, 18 Aug 2008 22:44:11 GMT&lt;br /&gt;
Server: Apache&lt;br /&gt;
Set-Cookie: PHPSESSID=pKi...; path=/; HttpOnly&lt;br /&gt;
Expires: Thu, 19 Nov 1981 08:52:00 GMT&lt;br /&gt;
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0&lt;br /&gt;
Pragma: no-cache&lt;br /&gt;
Set-Cookie: adminOnlyCookie1=...; expires=Tue, 18-Aug-2009 22:44:31 GMT; domain=www.example.com&lt;br /&gt;
Set-Cookie: adminOnlyCookie2=...; expires=Mon, 18-Aug-2008 22:54:31 GMT; domain=www.example.com&lt;br /&gt;
Set-Cookie: adminOnlyCookie3=...; expires=Sun, 19-Aug-2007 22:44:30 GMT; domain=www.example.com&lt;br /&gt;
Content-Language: EN&lt;br /&gt;
Connection: close&lt;br /&gt;
Content-Type: text/html; charset=ISO-8859-1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you get a &amp;quot;405 Method not allowed&amp;quot; or &amp;quot;501 Method Unimplemented&amp;quot;, the application/framework/language/system/firewall is working correctly. If a &amp;quot;200&amp;quot; response code comes back, and the response contains no body, it's likely that the application has processed the request without authentication or authorization and further testing is warranted.  &lt;br /&gt;
&lt;br /&gt;
If you feel that the system is vulnerable to this issue, issue CSRF-like attacks to exploit the issue more fully:&lt;br /&gt;
&lt;br /&gt;
* HEAD /admin/createUser.php?member=myAdmin&lt;br /&gt;
* HEAD /admin/changePw.php?member=myAdmin&amp;amp;passwd=foo123&amp;amp;confirm=foo123&lt;br /&gt;
* HEAD /admin/groupEdit.php?group=Admins&amp;amp;member=myAdmin&amp;amp;action=add&lt;br /&gt;
&lt;br /&gt;
With some luck, using the above three commands - modified to suit the application under test and testing requirements - a new user would be created, a password assigned, and made an admin, all using blind request submission.&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example == &lt;br /&gt;
The testing in a Gray Box scenario follows the same steps of a Black Box scenario.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* RFC 2616: &amp;quot;Hypertext Transfer Protocol -- HTTP/1.1&amp;quot;&lt;br /&gt;
* RFC 2109 and RFC 2965: &amp;quot;HTTP State Management Mechanism&amp;quot;&lt;br /&gt;
* Jeremiah Grossman: &amp;quot;Cross Site Tracing (XST)&amp;quot; - http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf&amp;lt;br&amp;gt;&lt;br /&gt;
* Amit Klein: &amp;quot;XS(T) attack variants which can, in some cases, eliminate the need for TRACE&amp;quot; - http://www.securityfocus.com/archive/107/308433&lt;br /&gt;
* Arshan Dabirsiaghi: &amp;quot;Bypassing VBAAC with HTTP Verb Tampering&amp;quot; - http://static.swpag.info/download/Bypassing_VBAAC_with_HTTP_Verb_Tampering.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&lt;br /&gt;
* NetCat - http://nc110.sourceforge.net&lt;br /&gt;
*cURL - http://curl.haxx.se/&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Amro_Ahmed&amp;diff=168855</id>
		<title>User:Amro Ahmed</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Amro_Ahmed&amp;diff=168855"/>
				<updated>2014-02-24T11:33:47Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Amro AlOlaqi joined OWASP back in 2008. ( My old user account: https://www.owasp.org/index.php/User:Amro )&lt;br /&gt;
&lt;br /&gt;
Amro currently works as a Sr. Consultant at Verizon (Threat &amp;amp; Vulnerability). Prior joining Verizon, Amro worked for BAE Systems, Saudi Aramco, IS, and Red Hat, he has more than 9 years of experience in Information security. He started his professional career at early age, since then, he engaged the field of UNIX/Linux engineering and systems’ security.  He carried out penetration tests, application , vulnerability assessments and security audits for prestigious organizations. Moreover, his expertise extends across industry verticals, security technologies plus hacking tools and techniques.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''OWASP Involvement''''' &lt;br /&gt;
* Chapter leader: Saudi Arabia &lt;br /&gt;
* Chapter leader: Untied Arab Emirates &lt;br /&gt;
* Contributor:  OWASP Testing Guide v4&lt;br /&gt;
* Contributor: OWASP Web Application Security Testing Cheat Sheet&lt;br /&gt;
* ZAP Core Team: OWASP Zed Attack Proxy Project&lt;br /&gt;
* ZAP Evangelist: Middle East&lt;br /&gt;
* Contributor: OWASP Speakers Project&lt;br /&gt;
* Volunteer: OWASP Periodic Table of Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Public Speaking'''''&lt;br /&gt;
*Speaker: Web Application Security (&amp;quot;Why&amp;quot; &amp;quot;How&amp;quot; and &amp;quot;When&amp;quot;) at IDC IT Security Roadshow - Dubai&lt;br /&gt;
*Speaker: Application Security at  i-safe (ISACA UAE) – UAE&lt;br /&gt;
*Speaker: Ethical Hacking at Compliance and Beyond - Saudi.&lt;br /&gt;
*Speaker: Web Application Security at F5 - Saudi.&lt;br /&gt;
*Speaker: OWASP The Power of Code Review at aSecurity,  Netherlands&lt;br /&gt;
*Speaker: Web Application Security and the OWASP top 10 at ISACA Jeddah – Saudi&lt;br /&gt;
*Speaker: Web App Critical Vulnerabilities and OWASP's ESAPI at The Cyber Information Security Summit - UAE&lt;br /&gt;
*Speaker: Information Security Awareness at Arabou University - Saudi.&lt;br /&gt;
*Speaker: Threat Modeling and Penetration test at IT for Government Summit - UAE&lt;br /&gt;
*Speaker: Ethical Hacking and penetration testing at Microsoft Open Doors – Saudi.&lt;br /&gt;
*Speaker: Ethical Hacking and penetration testing at Microsoft Open Doors – Saudi.&lt;br /&gt;
*Speaker: OWASP Testing Guide at OWASP KSA - Saudi.&lt;br /&gt;
*Speaker: OWASP's introduction and projects at the open university - Saudi&lt;br /&gt;
&lt;br /&gt;
'''Get in touch with Amro on LinkedIn: http://www.linkedin.com/in/iamro'''&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Amro_Ahmed&amp;diff=168854</id>
		<title>User:Amro Ahmed</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Amro_Ahmed&amp;diff=168854"/>
				<updated>2014-02-24T11:15:09Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Amro AlOlaqi joined OWASP back in 2008. ( My old user account: https://www.owasp.org/index.php/User:Amro )&lt;br /&gt;
&lt;br /&gt;
Amro currently works as a Sr. Consultant at Verizon (Threat &amp;amp; Vulnerability). Prior joining Verizon, Amro worked for BAE Systems, Saudi Aramco, IS, and Red Hat, he has more than 9 years of experience in Information security. He started his professional career at early age, since then, he engaged the field of UNIX/Linux engineering and systems’ security.  He carried out penetration tests, application , vulnerability assessments and security audits for prestigious organizations. Moreover, his expertise extends across industry verticals, security technologies plus hacking tools and techniques. Amro hold well-recognized international certifications such as CISSP, GCIH, GHTQ, LPT, CEH, CHFI, RHCE, SCSA, Linux+, LPIC1/2 SCSECA, and Certified ISO 27001 LA/LI&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''OWASP Involvement''''' &lt;br /&gt;
* Chapter leader: Saudi Arabia &lt;br /&gt;
* Chapter leader: Untied Arab Emirates &lt;br /&gt;
* Contributor:  OWASP Testing Guide v4&lt;br /&gt;
* Contributor: OWASP Web Application Security Testing Cheat Sheet&lt;br /&gt;
* Contributor: OWASP Zed Attack Proxy Project&lt;br /&gt;
* Volunteer: OWASP Periodic Table of Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Media Interaction'''''&lt;br /&gt;
&lt;br /&gt;
*Appeared in 13 TV shows, some of which in the biggest news channels in the Middle East.&lt;br /&gt;
*Published +20 newspaper articles to increase the public awareness about Information Security.&lt;br /&gt;
&lt;br /&gt;
After my humble interaction with the Middle East media, I shifted my interest and focus to increase the Application Security awareness among business corporates and GCC governments. Please refer to Public Speaking for more information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Public Speaking'''''&lt;br /&gt;
*Speaker: IDC's IT Security Roadshow - Dubai&lt;br /&gt;
*Speaker: Application Security and OWASP  at i-safe – UAE&lt;br /&gt;
*Speaker: Ethical Hacking at the ‘Compliance and Beyond’ - Saudi.&lt;br /&gt;
*Speaker: Web Application Security at F5 - Saudi.&lt;br /&gt;
*Speaker: OWASP The Power of Code Review,  Netherlands&lt;br /&gt;
*Speaker: Web Application Security and OWASP top 10 at ISACA Jeddah – Saudi&lt;br /&gt;
*Speaker: Web App Critical Vulnerabilities and OWASP's ESAPI at The Cyber Information Security Summit - UAE&lt;br /&gt;
*Speaker: Information Security Awareness at Arabou University - Saudi.&lt;br /&gt;
*Speaker: Threat Modeling and Penetration test at IT for Government - UAE&lt;br /&gt;
*Speaker: Ethical Hacking and penetration testing at Microsoft Open Doors – Saudi.&lt;br /&gt;
*Speaker: Ethical Hacking and penetration testing at Microsoft Open Doors – Saudi.&lt;br /&gt;
*Speaker: OWASP Testing Guide at OWASP - Saudi.&lt;br /&gt;
&lt;br /&gt;
* Speaker: OWASP's introduction and projects at the open university - Saudi&lt;br /&gt;
&lt;br /&gt;
'''Get in touch with me. https://twitter.com/Amro_AlOlaqi LinkedIn: http://www.linkedin.com/in/iamro'''&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Testing_Project/Releases/Testing_Guide_V_4.0&amp;diff=165916</id>
		<title>Projects/OWASP Testing Project/Releases/Testing Guide V 4.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Testing_Project/Releases/Testing_Guide_V_4.0&amp;diff=165916"/>
				<updated>2014-01-15T16:42:48Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template: &amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Release About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP Testing Project&lt;br /&gt;
| project_home_page = :Category:OWASP Testing Project&lt;br /&gt;
| release_name = Testing Guide V 4.0&lt;br /&gt;
| release_date = 15th February 2013&lt;br /&gt;
The new project is available [https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents here]&lt;br /&gt;
| release_description =&lt;br /&gt;
* Review all the control numbers to adhere to the [http://www.owasp.org/index.php/Common_OWASP_Numbering OWASP Common numbering], &lt;br /&gt;
* Review all the sections in v3,&lt;br /&gt;
* Create a more readable guide, eliminating some sections that are not really useful,&lt;br /&gt;
* Insert new testing techniques: HTTP Verb tampering, HTTP Parameter Pollutions, etc.,&lt;br /&gt;
* Rationalize some sections as Session Management Testing,&lt;br /&gt;
* Create a new section: Client side security and Firefox extensions testing.&lt;br /&gt;
| release_license = [http://creativecommons.org/licenses/by-sa/3.0/ '''Creative Commons Attribution Share Alike 3.0''']&lt;br /&gt;
| release_download_link = &lt;br /&gt;
| leader_name1 = Matteo Meucci&lt;br /&gt;
| leader_username1 = Mmeucci&lt;br /&gt;
| leader_email1 = matteo.meucci@owasp.org&lt;br /&gt;
&lt;br /&gt;
| contributor_name1 = Roberto Suggi Liverani&lt;br /&gt;
| contributor_email1 =&lt;br /&gt;
| contributor_username1 =&lt;br /&gt;
&lt;br /&gt;
| contributor_name2 = Nick Freeman&lt;br /&gt;
| contributor_email2 =&lt;br /&gt;
| contributor_username2 =&lt;br /&gt;
&lt;br /&gt;
| contributor_name3 = Stefano Di Paola&lt;br /&gt;
| contributor_email3 = stefano.dipaola@gmail.com&lt;br /&gt;
| contributor_username3 =&lt;br /&gt;
&lt;br /&gt;
| contributor_name4 = Marco Morana&lt;br /&gt;
| contributor_email4 = marco.morana@owasp.org&lt;br /&gt;
| contributor_username4 =&lt;br /&gt;
&lt;br /&gt;
| contributor_name5 = Giorgio Fedon&lt;br /&gt;
| contributor_email5 = giorgio.fedon@gmail.com&lt;br /&gt;
| contributor_username5 =&lt;br /&gt;
&lt;br /&gt;
| contributor_name6 =  Kevin Horvath&lt;br /&gt;
| contributor_email6 = kevin.horvath@gmail.com&lt;br /&gt;
| contributor_username6 =&lt;br /&gt;
&lt;br /&gt;
| contributor_name6 =  Amro AlOlaqi&lt;br /&gt;
| contributor_email6 = amro@owasp.org&lt;br /&gt;
| contributor_username7 =&lt;br /&gt;
&lt;br /&gt;
| release_notes = http://www.owasp.org/index.php/Projects/OWASP_Testing_Project/Releases/Testing_Guide_V_4.0/Roadmap&lt;br /&gt;
| links_url1 = https://spreadsheets.google.com/ccc?key=0An4Puwz7EA41dDV6cUY2YWpGaHdEbFktbklNMUFiSEE&amp;amp;hl=en&lt;br /&gt;
| links_name1 = Testing Guide's (Version 4.0) Approved Budget&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=165046</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=165046"/>
				<updated>2013-12-20T23:30:55Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek N]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
OWASP is pleased to announce the arrival of OWASP 2.0! &lt;br /&gt;
&lt;br /&gt;
OWASP 2.0 utilizes the MediaWiki portal to manage and provide the latest OWASP related information. Enjoy! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Our next gathering is on the 14th of Dec 2013 at 6-8pm.'''&lt;br /&gt;
&lt;br /&gt;
   MAKE Business Hub [https://maps.google.com/maps?ie=UTF8&amp;amp;q=MAKE+Business+Hub+Cafe&amp;amp;fb=1&amp;amp;hq=make+business+hub&amp;amp;cid=1882949530944650280&amp;amp;hnear=&amp;amp;ll=25.079127,55.136797&amp;amp;spn=0.011816,0.021136&amp;amp;t=m&amp;amp;z=16&amp;amp;vpsrc=0&amp;amp;iwloc=A MAP ]&lt;br /&gt;
   Al Fattan Tower - Dubai&lt;br /&gt;
   United Arab Emirate&lt;br /&gt;
   +971 4 392 9216&lt;br /&gt;
   Speaker: Peter Dowley &lt;br /&gt;
   Topic: Security Architecture for Applications, titled &amp;quot;What's the difference between a security bug and a security flaw?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Speaker bio : Peter has been working in computer security for over 10 years, after&lt;br /&gt;
another decade in other areas of IT - System &amp;amp; infrastructure architecture,&lt;br /&gt;
Windows desktop &amp;amp; server design &amp;amp; management, database modelling &amp;amp; design,&lt;br /&gt;
programming. He has strong expertise in security architecture (especially&lt;br /&gt;
for banking systems) and how this relates to risk and fraud management. He&lt;br /&gt;
is a senior security consultant with Hewlett-Packard (HP) in Dubai and has&lt;br /&gt;
been based in the Gulf region for 5 years.&lt;br /&gt;
&lt;br /&gt;
'''Download the presentation:''' [https://www.owasp.org/index.php/File:Security_Bugs_vs_Flaws.pptx &amp;quot;What's the difference between a security bug and a security flaw&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
    Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
    Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
    Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
    Speaker: Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: Grand Hayat - Dubai &lt;br /&gt;
   Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
   Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
    OWASP's session: 11:20 PM  &lt;br /&gt;
    Speaker: Amro AlOlaqi &lt;br /&gt;
    Subject: The Ten Web Application Critical Risks &lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:Middle_East]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=165045</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=165045"/>
				<updated>2013-12-20T23:29:28Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek N]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
OWASP is pleased to announce the arrival of OWASP 2.0! &lt;br /&gt;
&lt;br /&gt;
OWASP 2.0 utilizes the MediaWiki portal to manage and provide the latest OWASP related information. Enjoy! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Our next gathering is on the 14th of Dec 2013 at 6-8pm.'''&lt;br /&gt;
&lt;br /&gt;
   MAKE Business Hub [https://maps.google.com/maps?ie=UTF8&amp;amp;q=MAKE+Business+Hub+Cafe&amp;amp;fb=1&amp;amp;hq=make+business+hub&amp;amp;cid=1882949530944650280&amp;amp;hnear=&amp;amp;ll=25.079127,55.136797&amp;amp;spn=0.011816,0.021136&amp;amp;t=m&amp;amp;z=16&amp;amp;vpsrc=0&amp;amp;iwloc=A MAP ]&lt;br /&gt;
   Al Fattan Tower - Dubai&lt;br /&gt;
   United Arab Emirate&lt;br /&gt;
   +971 4 392 9216&lt;br /&gt;
&lt;br /&gt;
Speaker: Peter Dowley &lt;br /&gt;
Topic: Security Architecture for Applications, titled &amp;quot;What's the difference between a security bug and a security flaw?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Speaker bio : Peter has been working in computer security for over 10 years, after&lt;br /&gt;
another decade in other areas of IT - System &amp;amp; infrastructure architecture,&lt;br /&gt;
Windows desktop &amp;amp; server design &amp;amp; management, database modelling &amp;amp; design,&lt;br /&gt;
programming. He has strong expertise in security architecture (especially&lt;br /&gt;
for banking systems) and how this relates to risk and fraud management. He&lt;br /&gt;
is a senior security consultant with Hewlett-Packard (HP) in Dubai and has&lt;br /&gt;
been based in the Gulf region for 5 years.&lt;br /&gt;
&lt;br /&gt;
'''Download the presentation:''' [https://www.owasp.org/index.php/File:Security_Bugs_vs_Flaws.pptx &amp;quot;What's the difference between a security bug and a security flaw&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
    Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
    Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
    Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
    Speaker: Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: Grand Hayat - Dubai &lt;br /&gt;
   Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
   Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
   Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
   Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
   Speaker: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
    OWASP's session: 11:20 PM  &lt;br /&gt;
    Speaker: Amro AlOlaqi &lt;br /&gt;
    Subject: The Ten Web Application Critical Risks &lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:Middle_East]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=165044</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=165044"/>
				<updated>2013-12-20T23:15:44Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek N]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
OWASP is pleased to announce the arrival of OWASP 2.0! &lt;br /&gt;
&lt;br /&gt;
OWASP 2.0 utilizes the MediaWiki portal to manage and provide the latest OWASP related information. Enjoy! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Our next gathering is on the 14th of Dec 2013 at 6-8pm.&lt;br /&gt;
&lt;br /&gt;
Address is Make Business Hub [https://maps.google.com/maps?ie=UTF8&amp;amp;q=MAKE+Business+Hub+Cafe&amp;amp;fb=1&amp;amp;hq=make+business+hub&amp;amp;cid=1882949530944650280&amp;amp;hnear=&amp;amp;ll=25.079127,55.136797&amp;amp;spn=0.011816,0.021136&amp;amp;t=m&amp;amp;z=16&amp;amp;vpsrc=0&amp;amp;iwloc=A MAP ]&lt;br /&gt;
&lt;br /&gt;
MAKE Business Hub&lt;br /&gt;
Al Fattan Tower - Dubai&lt;br /&gt;
United Arab Emirates&lt;br /&gt;
+971 4 392 9216&lt;br /&gt;
&lt;br /&gt;
Our presenter Peter Dowley will give a talk on Security Architecture for&lt;br /&gt;
Applications, titled &amp;quot;What's the difference between a security bug and a&lt;br /&gt;
security flaw?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Peter has been working in computer security for over 10 years, after&lt;br /&gt;
another decade in other areas of IT - System &amp;amp; infrastructure architecture,&lt;br /&gt;
Windows desktop &amp;amp; server design &amp;amp; management, database modelling &amp;amp; design,&lt;br /&gt;
programming. He has strong expertise in security architecture (especially&lt;br /&gt;
for banking systems) and how this relates to risk and fraud management. He&lt;br /&gt;
is a senior security consultant with Hewlett-Packard (HP) in Dubai and has&lt;br /&gt;
been based in the Gulf region for 5 years.&lt;br /&gt;
&lt;br /&gt;
'''Download the presentation:''' [https://www.owasp.org/index.php/File:Security_Bugs_vs_Flaws.pptx &amp;quot;What's the difference between a security bug and a security flaw&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
&lt;br /&gt;
Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
&lt;br /&gt;
Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Presented by : Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
&lt;br /&gt;
Venue: Grand Hayat - Dubai &lt;br /&gt;
&lt;br /&gt;
Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
&lt;br /&gt;
Presented by: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
&lt;br /&gt;
Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
&lt;br /&gt;
Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
&lt;br /&gt;
Presented by: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
OWASP's session: 11:20 PM  Amro AlOlaqi ( The Ten Web Application Critical Risks )&lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:Middle_East]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Security_Bugs_vs_Flaws.pptx&amp;diff=165043</id>
		<title>File:Security Bugs vs Flaws.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Security_Bugs_vs_Flaws.pptx&amp;diff=165043"/>
				<updated>2013-12-20T23:07:53Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: Security Architecture for Applications, titled &amp;quot;What's the difference between a security bug and a security flaw? presented at the UAE chapter by Peter.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Security Architecture for Applications, titled &amp;quot;What's the difference between a security bug and a security flaw? presented at the UAE chapter by Peter.&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=164229</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=164229"/>
				<updated>2013-12-03T18:44:45Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek N]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
OWASP is pleased to announce the arrival of OWASP 2.0! &lt;br /&gt;
&lt;br /&gt;
OWASP 2.0 utilizes the MediaWiki portal to manage and provide the latest OWASP related information. Enjoy! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Our next gathering is on the 14th of Dec 2013 at 6-8pm.&lt;br /&gt;
&lt;br /&gt;
Address is Make Business Hub [https://maps.google.com/maps?ie=UTF8&amp;amp;q=MAKE+Business+Hub+Cafe&amp;amp;fb=1&amp;amp;hq=make+business+hub&amp;amp;cid=1882949530944650280&amp;amp;hnear=&amp;amp;ll=25.079127,55.136797&amp;amp;spn=0.011816,0.021136&amp;amp;t=m&amp;amp;z=16&amp;amp;vpsrc=0&amp;amp;iwloc=A MAP ]&lt;br /&gt;
&lt;br /&gt;
MAKE Business Hub&lt;br /&gt;
Al Fattan Tower - Dubai&lt;br /&gt;
United Arab Emirates&lt;br /&gt;
+971 4 392 9216&lt;br /&gt;
&lt;br /&gt;
Our presenter Peter Dowley will give a talk on Security Architecture for&lt;br /&gt;
Applications, titled &amp;quot;What's the difference between a security bug and a&lt;br /&gt;
security flaw?&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Peter has been working in computer security for over 10 years, after&lt;br /&gt;
another decade in other areas of IT - System &amp;amp; infrastructure architecture,&lt;br /&gt;
Windows desktop &amp;amp; server design &amp;amp; management, database modelling &amp;amp; design,&lt;br /&gt;
programming. He has strong expertise in security architecture (especially&lt;br /&gt;
for banking systems) and how this relates to risk and fraud management. He&lt;br /&gt;
is a senior security consultant with Hewlett-Packard (HP) in Dubai and has&lt;br /&gt;
been based in the Gulf region for 5 years.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
&lt;br /&gt;
Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
&lt;br /&gt;
Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Presented by : Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
&lt;br /&gt;
Venue: Grand Hayat - Dubai &lt;br /&gt;
&lt;br /&gt;
Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
&lt;br /&gt;
Presented by: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
&lt;br /&gt;
Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
&lt;br /&gt;
Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
&lt;br /&gt;
Presented by: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
OWASP's session: 11:20 PM  Amro AlOlaqi ( The Ten Web Application Critical Risks )&lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:Middle_East]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Saudi_Arabia&amp;diff=162476</id>
		<title>Saudi Arabia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Saudi_Arabia&amp;diff=162476"/>
				<updated>2013-11-04T22:37:39Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Saudi Arabia|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi]  [mailto:mohannad.shahat@owasp.org Mohannad Shahat] &lt;br /&gt;
&amp;lt;paypal&amp;gt;Saudi Arabia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-SA|emailarchives=http://lists.owasp.org/pipermail/owasp-SA}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
The Saudi Chapter is pleased to announce that we've successfully transalted The Zed Attack Proxy (ZAP) to Arabic - you can now download the ZAP 2.2.2 Language Pack 1 from the following link &lt;br /&gt;
&lt;br /&gt;
https://code.google.com/p/zaproxy/downloads/detail?name=ZAP_2.2.2_language_pack.1.zaplang&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
-------&lt;br /&gt;
December - 10th/2013 (Members gathering)&lt;br /&gt;
&lt;br /&gt;
The agenda for this gathering would be as follows:&lt;br /&gt;
&lt;br /&gt;
*OWASP introduction for new members &lt;br /&gt;
*OWASP Saudi Arabia, event planning for 2014&lt;br /&gt;
*OWASP Top 10 translation initiative and discuss the possibility of translating the new testing guide when released. &lt;br /&gt;
&lt;br /&gt;
Date: 10th of December Time: 18:00 - 19:00&lt;br /&gt;
Venue: Costa Coffee, Olaya Street, Riyadh&lt;br /&gt;
&lt;br /&gt;
Direction: https://maps.google.com.sa/maps?hl=en&amp;amp;sig=BZ4&amp;amp;ie=UTF-8&amp;amp;q=costa+coffee+in+riyadh&amp;amp;fb=1&amp;amp;gl=sacid=0,0,2944591365254196345&amp;amp;ei=OTUeUaOaN8rIswa2x4HYBw&amp;amp;ved=0CAEQ5xgwAA&lt;br /&gt;
&lt;br /&gt;
-------&lt;br /&gt;
'''February - 25th/2013 (Members gathering)'''&lt;br /&gt;
&lt;br /&gt;
''The agenda for this gathering would be as follows:''&lt;br /&gt;
&lt;br /&gt;
- Catch up with new members&lt;br /&gt;
&lt;br /&gt;
- OWASP Saudi Arabia and its involvement with other non-profit organizations&lt;br /&gt;
&lt;br /&gt;
- Planning for our next conference/technical session&lt;br /&gt;
&lt;br /&gt;
''Date: 25th of Feb&lt;br /&gt;
Time: 18:00 - 19:00&lt;br /&gt;
Venue: Costa Coffee, Olaya Street, Riyadh''&lt;br /&gt;
&lt;br /&gt;
Direction: https://maps.google.com.sa/maps?hl=en&amp;amp;sig=BZ4&amp;amp;ie=UTF-8&amp;amp;q=costa+coffee+in+riyadh&amp;amp;fb=1&amp;amp;gl=sacid=0,0,2944591365254196345&amp;amp;ei=OTUeUaOaN8rIswa2x4HYBw&amp;amp;ved=0CAEQ5xgwAA&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
'''Date:''' 24th May 2012, starting at 8:30 PM to 9:30 PM&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
&lt;br /&gt;
1- Welcoming to OWASP Sharqiyah ''Jalsah''#1&lt;br /&gt;
&lt;br /&gt;
2- OWASP?&lt;br /&gt;
&lt;br /&gt;
3- Discussion: How to Start in Web Application Security?&lt;br /&gt;
&lt;br /&gt;
3- Closing&lt;br /&gt;
&lt;br /&gt;
Detailed Agenda document [https://docs.google.com/open?id=0B4eUULYLYNDsLUFOVlJEVkFhRzQ] &lt;br /&gt;
 &lt;br /&gt;
'''Location:'''&lt;br /&gt;
&lt;br /&gt;
Al-Liwan Coffee Shop in Khobar opposite to SAAD Hospital.&lt;br /&gt;
&lt;br /&gt;
= &amp;lt;u&amp;gt;'''Application Security and OWASP top 10 - Jeddah'''&amp;lt;/u&amp;gt;  =&lt;br /&gt;
&lt;br /&gt;
We'll have a technical session to talk about application security and OWASP top 10, as we'll demonstrate the top critical vulnerabilities against web applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''The OWASP Top 10 Web Application Security Risks are:'''&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A1: Injection &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A2: Cross-Site Scripting (XSS) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A3: Broken Authentication and Session Management &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A4: Insecure Direct Object References &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A5: Cross-Site Request Forgery (CSRF) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A6: Security Misconfiguration &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A7: Insecure Cryptographic Storage &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A8: Failure to Restrict URL Access &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A9: Insufficient Transport Layer Protection &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A10: Unvalidated Redirects and Forwards &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''''Date: 21 Jun 2011''''' &lt;br /&gt;
&lt;br /&gt;
'''''Location: Rosewood Corniche - Jeddah''''' &lt;br /&gt;
&lt;br /&gt;
'''''Start: 19:00 End: 21:00''''' &lt;br /&gt;
&lt;br /&gt;
'''''Speaker: Amro AlOlaqi''''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
If you're interested to attend the session please confirm by sending your information to amro at owasp.org.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= &amp;lt;u&amp;gt;'''Jeddah meeting'''&amp;lt;/u&amp;gt;  =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''The agenda of the inaugural meeting will be as follows:'''&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. Introduction to OWASP &lt;br /&gt;
&lt;br /&gt;
2. Discuss local OWASP awareness and image programs for Jeddah members. &lt;br /&gt;
&lt;br /&gt;
Date: Sunday, 3, 2010 &lt;br /&gt;
&lt;br /&gt;
Location: Costa Coffee, alHamrah, Jeddah. &lt;br /&gt;
&lt;br /&gt;
Sponsored by: SAIS technology &lt;br /&gt;
&lt;br /&gt;
Please do not hesitate to contact me at amro (at) owasp.org for any clarification or inquires &lt;br /&gt;
&lt;br /&gt;
= '''Information Security and beyond - Event'''  =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''Location'''&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue: Makarim Hall - Marriott Hotel&lt;br /&gt;
 &lt;br /&gt;
 City&amp;amp;nbsp;: Riyadh - KSA&lt;br /&gt;
 &lt;br /&gt;
 Date: 25 May 2009&lt;br /&gt;
 &lt;br /&gt;
 Time: 08:30 - 15:00&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''''Seminar Agenda''''' &lt;br /&gt;
&lt;br /&gt;
 08:00 – 08:30  Registration&lt;br /&gt;
 08:30 – 09:00  Key note ( SAMA Speaker )&lt;br /&gt;
 09:00 – 10:00  ISO 27001 ( BSI Speaker )&lt;br /&gt;
 10:00 – 10:20  Refreshment&lt;br /&gt;
 10:20 – 11:0   Application Security ( Verizon Business Speaker )&lt;br /&gt;
 11:00 – 12:00  Penetration Testing using OWASP methodology ( OWASP )&lt;br /&gt;
 12:00 – 12:30  Prayer time&lt;br /&gt;
 12:30 - 01:20  Enterprise Security ( F5 Speaker )&lt;br /&gt;
 01:20 – 01:40  Q &amp;amp;amp; A    &lt;br /&gt;
 01:40 – 02:30  Lunch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''''Event Speaker''''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''''Mr. Saqer Al-Orabi Al-Harthi.''' Information System and Control Manager Saudi Arabian Monetary Agency (SAMA) &lt;br /&gt;
&lt;br /&gt;
Mr. Saqer Al-Orabi Al-Harthi is responsible for the Information System and Control at SAMA – Banking Technology Department. Mr. Al-Harthi has been the chairman of various committees at SAMA such as: SAMA and Banks Information Security Managers Committee, Information Security Awareness Committee and Security Training Committee. Mr. Al-Harthi has been instrumental in building Information Security for the Saudi financial industry by initiating and executing major projects such as SARIE Security, SPAN Security, PKI, and he has been the champion in PCI development within Saudi Arabia along with other security related projects. Furthermore, Mr. Al-Harthi has presented in many IT Security seminars and events. Mr. Al-Harthi holds a Masters degree in Computer and Information System from U.S.A. and he is a Certified Information Security Manager (CISM). &lt;br /&gt;
&lt;br /&gt;
''''Amro AlOlaqi''' Information Security Consultant&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Amro has more than 7 years of experience in Information security. He started his professional career at early age, since then, he engaged the field of UNIX/Linux engineering and systems’ security. Throughout his extraordinary achievements and accomplishments, he became amongst the most recognized experts in the field of penetration testing, application security and vulnerability assessment within Saudi Arabia. He carried out penetration tests, application , vulnerability assessments and security audits for prestigious organizations. Moreover, his expertise extends across industry verticals, security technologies plus hacking tools and techniques. Amro is the OWASP chapter leader for Saudi Arabia and United Arab Emirates, also he is specialized at cyber crime investigations and digital forensics. Nevertheles, Amro hold well-recognized international certifications such as GCIH, GHTQ, ECSA/LPT, CEH, CHFI, Security+, RHCE, SCSA, Linux+, LPIC1, LPIC2 and SCSECA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''''Theuns Kotze''' Regional Director BSI – Middle East and Africa &lt;br /&gt;
&lt;br /&gt;
Mr. Kotze holds a B. Comm. Degree from the University of Pretoria. He is currently the Regional Director for BSI – Management Systems in Middle East and Africa. In BSI he was the Sales and Marketing Director for BSI- Management Systems in Europe based in London. He was an Executive Director of Nosa International responsible for Auditing and Certification Globally. During 2002 he developed an Aids management standard now known as AMS 16001. The AMS 16001 is now the South African Standard for Aids management and could become the ISO standard for aids management in future. He gained extensive knowledge and experience in Europe and Middle East in the last 2 years. He conducted more than 2000 assessments on various standards in the last 20 years. Theuns had a private pilot’s license for 20 years and has flown many types of airplanes. He is married to Maria and has a son John 8 and they now live in Dubai. &lt;br /&gt;
&lt;br /&gt;
'''Ali Akl''' Principal Consultant Verizon Business Security Solutions &lt;br /&gt;
&lt;br /&gt;
Ali has over 10 years experience in Information Security, Business Continuity and Disaster Recovery. He has a unique blend of technical expertise along with management consulting experience, which has made him a valuable consultant to many organizations in the public and private sectors. He has contributed to the OPM3 standard development project, he is also CISSP and CISM, and has earned the GIAC Fundamentals of Security Policy certificate and recently has earned the Member Status of the Business Continuity Institute as well Certified in Disaster Recovery and Planning and finally he has been invited into the Fellowship Program of the International Multilateral Partnership Against Cyber-Terrorism (‘IMPACT’). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''''Zakeer Zubair''' Field Systems Engineer &lt;br /&gt;
&lt;br /&gt;
Zakeer Zubair is a senior technical team player in F5’s Middle East operation. Since obtaining his Bachelor degree in Mathematics, Zubair has spent the last 9 years working in networking and security for a variety of systems integrators including Schlumberger and Atos Origin. This role has involved integrating best of breed vendor networking and security devices and necessitated skills in routing, switching, security and application switching. Zubair has technical certifications from F5, Cisco, Juniper, Nortel Networks, Extreme Networks, Microsoft and CISSP. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= '''PCI compliance seminar'''  =&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
 '''Location'''&lt;br /&gt;
 &lt;br /&gt;
 Venue: Makarim Hall - Marriott Hotel&lt;br /&gt;
 &lt;br /&gt;
 City&amp;amp;nbsp;: Riyadh - KSA&lt;br /&gt;
 &lt;br /&gt;
 Date: 2nd March 2009&lt;br /&gt;
 &lt;br /&gt;
 Time: 08:30 - 15:00 &lt;br /&gt;
&lt;br /&gt;
'''Seminar Agenda''' &lt;br /&gt;
&lt;br /&gt;
 08:30 – 09:00    Registration Team&lt;br /&gt;
 09:00 – 09:30    Introduction&lt;br /&gt;
 09:30 – 10:20    PCI (Applications Firewalls/SSL VPN) &lt;br /&gt;
 10:20 – 10:40    Refreshment &lt;br /&gt;
 10:40 – 11:20    OWASP and PCI compliance &lt;br /&gt;
 11:20 – 12:10    Application Delivery Controller&lt;br /&gt;
 12:10 – 12:40    Prayer&lt;br /&gt;
 12:40 – 01:00    Last Session + Questions +Closing Session&lt;br /&gt;
 01:00 – 02:00    Lunch&lt;br /&gt;
&lt;br /&gt;
'''''Speakers''''' &lt;br /&gt;
&lt;br /&gt;
'''Peter Draper''', Security Specialist: has been providing guidance, design and implementation of Info Sec solutions for some 17+ years. The last ten years have been focused on Application delivery and security with the most recent focus following the main hacking attempts into the Web Application Security space. Peter has been instrumental in delivering Web Application Security into a wide and varied range of customers including finance, government, ecommerce and travel industry companies. Within the Middle East region Peter had delivered solutions to Government, Finance and Corporate customers ensuring the best possible protection is in place to secure customer sensitive data. &lt;br /&gt;
&lt;br /&gt;
Peter’s presentation will focus on: &lt;br /&gt;
&lt;br /&gt;
 1) What is the “PCI Journey”?&lt;br /&gt;
 2) What do I need to do and when?&lt;br /&gt;
 3) Is PCI the only reason to deploy security solutions?&lt;br /&gt;
 4) Where should I concentrate my $&lt;br /&gt;
 5) What happens once I have it?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Nigel Ashworth''', F5 MEA Technical Director: has been F5’s Technical Director for Middle East and Africa since September 2005. In that time he has driven the region’s increasing importance to F5’s global business, managing the pre sales engineering team, and investing technical resources in key verticals to drive double-digit sales growth. Nigel has been with F5 for nine years in a number of senior technical roles, including Technical Director responsible for driving EMEA Strategic Alliances with key partners including Microsoft, SAP and Oracle, and Technical Director responsible for pre-sales in Europe. Prior to joining F5, Nigel held technical leadership positions for companies including Reuters and UB Networks. He received his B.S in Electrical Engineering from Portsmouth University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''''Amro AlOlaqi,&amp;amp;nbsp;'''&amp;amp;nbsp;Information Security Consultant &amp;lt;br&amp;gt;Amro has more than 7 years of experience in Information security. He started his professional career at early age, since then, he engaged the field of UNIX/Linux engineering and systems’ security. Throughout his extraordinary achievements and accomplishments, he became amongst the most recognized experts in the field of penetration testing, application security and vulnerability assessment within Saudi Arabia. He carried out penetration tests, application , vulnerability assessments and security audits for prestigious organizations. Moreover, his expertise extends across industry verticals, security technologies plus hacking tools and techniques. Amro is the OWASP chapter leader for Saudi Arabia and United Arab Emirates, also he is specialized at cyber crime investigations and digital forensics. Nevertheles, Amro hold well-recognized international certifications such as GCIH, GHTQ, ECSA/LPT, CEH, CHFI, Security+, RHCE, SCSA, Linux+, LPIC1, LPIC2 and SCSECA.&amp;lt;br&amp;gt;'''&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
Amro’s presentation will focus on: &lt;br /&gt;
&lt;br /&gt;
 1) Web application attacks and security trends.&lt;br /&gt;
 2) OWASP &amp;quot;thinking out of the box&amp;quot;.&lt;br /&gt;
 2) OWASP and application security.&lt;br /&gt;
 4) The relation between OWASP and PCI.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;br /&gt;
[[Category:Saudi Arabia]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Saudi_Arabia&amp;diff=162474</id>
		<title>Saudi Arabia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Saudi_Arabia&amp;diff=162474"/>
				<updated>2013-11-04T22:35:53Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Saudi Arabia|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi]  [mailto:mohannad.shahat@owasp.org Mohannad Shahat] &lt;br /&gt;
&amp;lt;paypal&amp;gt;Saudi Arabia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-SA|emailarchives=http://lists.owasp.org/pipermail/owasp-SA}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
The Saudi Chapter is pleased to announce that we've successfully transalted The Zed Attack Proxy (ZAP) to Arabic - you can now download the ZAP 2.2.2 Language Pack 1 from the following link &lt;br /&gt;
&lt;br /&gt;
https://code.google.com/p/zaproxy/downloads/detail?name=ZAP_2.2.2_language_pack.1.zaplang&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
-------&lt;br /&gt;
December - 10th/2013 (Members gathering)&lt;br /&gt;
&lt;br /&gt;
The agenda for this gathering would be as follows:&lt;br /&gt;
&lt;br /&gt;
*OWASP introduction for new members &lt;br /&gt;
*OWASP Saudi Arabia, event planning for 2014&lt;br /&gt;
*OWASP Top 10 translation initiative and discuss the possibility of translating the new testing guide when released. &lt;br /&gt;
&lt;br /&gt;
Date: 10th of December Time: 18:00 - 19:00&lt;br /&gt;
Venue: Costa Coffee, Olaya Street, Riyadh&lt;br /&gt;
&lt;br /&gt;
Direction: https://maps.google.com.sa/maps?hl=en&amp;amp;sig=BZ4&amp;amp;ie=UTF-8&amp;amp;q=costa+coffee+in+riyadh&amp;amp;fb=1&amp;amp;gl=sacid=0,0,2944591365254196345&amp;amp;ei=OTUeUaOaN8rIswa2x4HYBw&amp;amp;ved=0CAEQ5xgwAA&lt;br /&gt;
&lt;br /&gt;
-------&lt;br /&gt;
'''February - 25th/2013 (Members gathering)'''&lt;br /&gt;
&lt;br /&gt;
''The agenda for this gathering would be as follows:''&lt;br /&gt;
&lt;br /&gt;
- Catch up with new members&lt;br /&gt;
&lt;br /&gt;
- OWASP Saudi Arabia and its involvement with other non-profit organizations&lt;br /&gt;
&lt;br /&gt;
- Planning for our next conference/technical session&lt;br /&gt;
&lt;br /&gt;
''Date: 25th of Feb&lt;br /&gt;
Time: 18:00 - 19:00&lt;br /&gt;
Venue: Costa Coffee, Olaya Street, Riyadh''&lt;br /&gt;
&lt;br /&gt;
Direction: https://maps.google.com.sa/maps?hl=en&amp;amp;sig=BZ4&amp;amp;ie=UTF-8&amp;amp;q=costa+coffee+in+riyadh&amp;amp;fb=1&amp;amp;gl=sacid=0,0,2944591365254196345&amp;amp;ei=OTUeUaOaN8rIswa2x4HYBw&amp;amp;ved=0CAEQ5xgwAA&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
'''Khobar gathering lead by Mohannad Shahat'''&lt;br /&gt;
&lt;br /&gt;
'''Date:''' 24th May 2012, starting at 8:30 PM to 9:30 PM&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
&lt;br /&gt;
1- Welcoming to OWASP Sharqiyah ''Jalsah''#1&lt;br /&gt;
&lt;br /&gt;
2- OWASP?&lt;br /&gt;
&lt;br /&gt;
3- Discussion: How to Start in Web Application Security?&lt;br /&gt;
&lt;br /&gt;
3- Closing&lt;br /&gt;
&lt;br /&gt;
Detailed Agenda document [https://docs.google.com/open?id=0B4eUULYLYNDsLUFOVlJEVkFhRzQ] &lt;br /&gt;
 &lt;br /&gt;
'''Location:'''&lt;br /&gt;
&lt;br /&gt;
Al-Liwan Coffee Shop in Khobar opposite to SAAD Hospital.&lt;br /&gt;
&lt;br /&gt;
= &amp;lt;u&amp;gt;'''Application Security and OWASP top 10 - Jeddah'''&amp;lt;/u&amp;gt;  =&lt;br /&gt;
&lt;br /&gt;
We'll have a technical session to talk about application security and OWASP top 10, as we'll demonstrate the top critical vulnerabilities against web applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''The OWASP Top 10 Web Application Security Risks are:'''&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A1: Injection &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A2: Cross-Site Scripting (XSS) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A3: Broken Authentication and Session Management &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A4: Insecure Direct Object References &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A5: Cross-Site Request Forgery (CSRF) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A6: Security Misconfiguration &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A7: Insecure Cryptographic Storage &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A8: Failure to Restrict URL Access &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A9: Insufficient Transport Layer Protection &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A10: Unvalidated Redirects and Forwards &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''''Date: 21 Jun 2011''''' &lt;br /&gt;
&lt;br /&gt;
'''''Location: Rosewood Corniche - Jeddah''''' &lt;br /&gt;
&lt;br /&gt;
'''''Start: 19:00 End: 21:00''''' &lt;br /&gt;
&lt;br /&gt;
'''''Speaker: Amro AlOlaqi''''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
If you're interested to attend the session please confirm by sending your information to amro at owasp.org.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= &amp;lt;u&amp;gt;'''Jeddah meeting'''&amp;lt;/u&amp;gt;  =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''The agenda of the inaugural meeting will be as follows:'''&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. Introduction to OWASP &lt;br /&gt;
&lt;br /&gt;
2. Discuss local OWASP awareness and image programs for Jeddah members. &lt;br /&gt;
&lt;br /&gt;
Date: Sunday, 3, 2010 &lt;br /&gt;
&lt;br /&gt;
Location: Costa Coffee, alHamrah, Jeddah. &lt;br /&gt;
&lt;br /&gt;
Sponsored by: SAIS technology &lt;br /&gt;
&lt;br /&gt;
Please do not hesitate to contact me at amro (at) owasp.org for any clarification or inquires &lt;br /&gt;
&lt;br /&gt;
= '''Information Security and beyond - Event'''  =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''Location'''&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue: Makarim Hall - Marriott Hotel&lt;br /&gt;
 &lt;br /&gt;
 City&amp;amp;nbsp;: Riyadh - KSA&lt;br /&gt;
 &lt;br /&gt;
 Date: 25 May 2009&lt;br /&gt;
 &lt;br /&gt;
 Time: 08:30 - 15:00&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''''Seminar Agenda''''' &lt;br /&gt;
&lt;br /&gt;
 08:00 – 08:30  Registration&lt;br /&gt;
 08:30 – 09:00  Key note ( SAMA Speaker )&lt;br /&gt;
 09:00 – 10:00  ISO 27001 ( BSI Speaker )&lt;br /&gt;
 10:00 – 10:20  Refreshment&lt;br /&gt;
 10:20 – 11:0   Application Security ( Verizon Business Speaker )&lt;br /&gt;
 11:00 – 12:00  Penetration Testing using OWASP methodology ( OWASP )&lt;br /&gt;
 12:00 – 12:30  Prayer time&lt;br /&gt;
 12:30 - 01:20  Enterprise Security ( F5 Speaker )&lt;br /&gt;
 01:20 – 01:40  Q &amp;amp;amp; A    &lt;br /&gt;
 01:40 – 02:30  Lunch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''''Event Speaker''''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''''Mr. Saqer Al-Orabi Al-Harthi.''' Information System and Control Manager Saudi Arabian Monetary Agency (SAMA) &lt;br /&gt;
&lt;br /&gt;
Mr. Saqer Al-Orabi Al-Harthi is responsible for the Information System and Control at SAMA – Banking Technology Department. Mr. Al-Harthi has been the chairman of various committees at SAMA such as: SAMA and Banks Information Security Managers Committee, Information Security Awareness Committee and Security Training Committee. Mr. Al-Harthi has been instrumental in building Information Security for the Saudi financial industry by initiating and executing major projects such as SARIE Security, SPAN Security, PKI, and he has been the champion in PCI development within Saudi Arabia along with other security related projects. Furthermore, Mr. Al-Harthi has presented in many IT Security seminars and events. Mr. Al-Harthi holds a Masters degree in Computer and Information System from U.S.A. and he is a Certified Information Security Manager (CISM). &lt;br /&gt;
&lt;br /&gt;
''''Amro AlOlaqi''' Information Security Consultant&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Amro has more than 7 years of experience in Information security. He started his professional career at early age, since then, he engaged the field of UNIX/Linux engineering and systems’ security. Throughout his extraordinary achievements and accomplishments, he became amongst the most recognized experts in the field of penetration testing, application security and vulnerability assessment within Saudi Arabia. He carried out penetration tests, application , vulnerability assessments and security audits for prestigious organizations. Moreover, his expertise extends across industry verticals, security technologies plus hacking tools and techniques. Amro is the OWASP chapter leader for Saudi Arabia and United Arab Emirates, also he is specialized at cyber crime investigations and digital forensics. Nevertheles, Amro hold well-recognized international certifications such as GCIH, GHTQ, ECSA/LPT, CEH, CHFI, Security+, RHCE, SCSA, Linux+, LPIC1, LPIC2 and SCSECA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''''Theuns Kotze''' Regional Director BSI – Middle East and Africa &lt;br /&gt;
&lt;br /&gt;
Mr. Kotze holds a B. Comm. Degree from the University of Pretoria. He is currently the Regional Director for BSI – Management Systems in Middle East and Africa. In BSI he was the Sales and Marketing Director for BSI- Management Systems in Europe based in London. He was an Executive Director of Nosa International responsible for Auditing and Certification Globally. During 2002 he developed an Aids management standard now known as AMS 16001. The AMS 16001 is now the South African Standard for Aids management and could become the ISO standard for aids management in future. He gained extensive knowledge and experience in Europe and Middle East in the last 2 years. He conducted more than 2000 assessments on various standards in the last 20 years. Theuns had a private pilot’s license for 20 years and has flown many types of airplanes. He is married to Maria and has a son John 8 and they now live in Dubai. &lt;br /&gt;
&lt;br /&gt;
'''Ali Akl''' Principal Consultant Verizon Business Security Solutions &lt;br /&gt;
&lt;br /&gt;
Ali has over 10 years experience in Information Security, Business Continuity and Disaster Recovery. He has a unique blend of technical expertise along with management consulting experience, which has made him a valuable consultant to many organizations in the public and private sectors. He has contributed to the OPM3 standard development project, he is also CISSP and CISM, and has earned the GIAC Fundamentals of Security Policy certificate and recently has earned the Member Status of the Business Continuity Institute as well Certified in Disaster Recovery and Planning and finally he has been invited into the Fellowship Program of the International Multilateral Partnership Against Cyber-Terrorism (‘IMPACT’). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''''Zakeer Zubair''' Field Systems Engineer &lt;br /&gt;
&lt;br /&gt;
Zakeer Zubair is a senior technical team player in F5’s Middle East operation. Since obtaining his Bachelor degree in Mathematics, Zubair has spent the last 9 years working in networking and security for a variety of systems integrators including Schlumberger and Atos Origin. This role has involved integrating best of breed vendor networking and security devices and necessitated skills in routing, switching, security and application switching. Zubair has technical certifications from F5, Cisco, Juniper, Nortel Networks, Extreme Networks, Microsoft and CISSP. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= '''PCI compliance seminar'''  =&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
 '''Location'''&lt;br /&gt;
 &lt;br /&gt;
 Venue: Makarim Hall - Marriott Hotel&lt;br /&gt;
 &lt;br /&gt;
 City&amp;amp;nbsp;: Riyadh - KSA&lt;br /&gt;
 &lt;br /&gt;
 Date: 2nd March 2009&lt;br /&gt;
 &lt;br /&gt;
 Time: 08:30 - 15:00 &lt;br /&gt;
&lt;br /&gt;
'''Seminar Agenda''' &lt;br /&gt;
&lt;br /&gt;
 08:30 – 09:00    Registration Team&lt;br /&gt;
 09:00 – 09:30    Introduction&lt;br /&gt;
 09:30 – 10:20    PCI (Applications Firewalls/SSL VPN) &lt;br /&gt;
 10:20 – 10:40    Refreshment &lt;br /&gt;
 10:40 – 11:20    OWASP and PCI compliance &lt;br /&gt;
 11:20 – 12:10    Application Delivery Controller&lt;br /&gt;
 12:10 – 12:40    Prayer&lt;br /&gt;
 12:40 – 01:00    Last Session + Questions +Closing Session&lt;br /&gt;
 01:00 – 02:00    Lunch&lt;br /&gt;
&lt;br /&gt;
'''''Speakers''''' &lt;br /&gt;
&lt;br /&gt;
'''Peter Draper''', Security Specialist: has been providing guidance, design and implementation of Info Sec solutions for some 17+ years. The last ten years have been focused on Application delivery and security with the most recent focus following the main hacking attempts into the Web Application Security space. Peter has been instrumental in delivering Web Application Security into a wide and varied range of customers including finance, government, ecommerce and travel industry companies. Within the Middle East region Peter had delivered solutions to Government, Finance and Corporate customers ensuring the best possible protection is in place to secure customer sensitive data. &lt;br /&gt;
&lt;br /&gt;
Peter’s presentation will focus on: &lt;br /&gt;
&lt;br /&gt;
 1) What is the “PCI Journey”?&lt;br /&gt;
 2) What do I need to do and when?&lt;br /&gt;
 3) Is PCI the only reason to deploy security solutions?&lt;br /&gt;
 4) Where should I concentrate my $&lt;br /&gt;
 5) What happens once I have it?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Nigel Ashworth''', F5 MEA Technical Director: has been F5’s Technical Director for Middle East and Africa since September 2005. In that time he has driven the region’s increasing importance to F5’s global business, managing the pre sales engineering team, and investing technical resources in key verticals to drive double-digit sales growth. Nigel has been with F5 for nine years in a number of senior technical roles, including Technical Director responsible for driving EMEA Strategic Alliances with key partners including Microsoft, SAP and Oracle, and Technical Director responsible for pre-sales in Europe. Prior to joining F5, Nigel held technical leadership positions for companies including Reuters and UB Networks. He received his B.S in Electrical Engineering from Portsmouth University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''''Amro AlOlaqi,&amp;amp;nbsp;'''&amp;amp;nbsp;Information Security Consultant &amp;lt;br&amp;gt;Amro has more than 7 years of experience in Information security. He started his professional career at early age, since then, he engaged the field of UNIX/Linux engineering and systems’ security. Throughout his extraordinary achievements and accomplishments, he became amongst the most recognized experts in the field of penetration testing, application security and vulnerability assessment within Saudi Arabia. He carried out penetration tests, application , vulnerability assessments and security audits for prestigious organizations. Moreover, his expertise extends across industry verticals, security technologies plus hacking tools and techniques. Amro is the OWASP chapter leader for Saudi Arabia and United Arab Emirates, also he is specialized at cyber crime investigations and digital forensics. Nevertheles, Amro hold well-recognized international certifications such as GCIH, GHTQ, ECSA/LPT, CEH, CHFI, Security+, RHCE, SCSA, Linux+, LPIC1, LPIC2 and SCSECA.&amp;lt;br&amp;gt;'''&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
Amro’s presentation will focus on: &lt;br /&gt;
&lt;br /&gt;
 1) Web application attacks and security trends.&lt;br /&gt;
 2) OWASP &amp;quot;thinking out of the box&amp;quot;.&lt;br /&gt;
 2) OWASP and application security.&lt;br /&gt;
 4) The relation between OWASP and PCI.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;br /&gt;
[[Category:Saudi Arabia]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Saudi_Arabia&amp;diff=162471</id>
		<title>Saudi Arabia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Saudi_Arabia&amp;diff=162471"/>
				<updated>2013-11-04T22:30:05Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Saudi Arabia|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi]  [mailto:mohannad.shahat@owasp.org Mohannad Shahat] &lt;br /&gt;
&amp;lt;paypal&amp;gt;Saudi Arabia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-SA|emailarchives=http://lists.owasp.org/pipermail/owasp-SA}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
-------&lt;br /&gt;
December - 10th/2013 (Members gathering)&lt;br /&gt;
&lt;br /&gt;
The agenda for this gathering would be as follows:&lt;br /&gt;
&lt;br /&gt;
*OWASP introduction for new members &lt;br /&gt;
*OWASP Saudi Arabia, event planning for 2014&lt;br /&gt;
*OWASP Top 10 translation initiative and discuss the possibility of translating the new testing guide when released. &lt;br /&gt;
&lt;br /&gt;
Date: 10th of December Time: 18:00 - 19:00&lt;br /&gt;
Venue: Costa Coffee, Olaya Street, Riyadh&lt;br /&gt;
&lt;br /&gt;
Direction: https://maps.google.com.sa/maps?hl=en&amp;amp;sig=BZ4&amp;amp;ie=UTF-8&amp;amp;q=costa+coffee+in+riyadh&amp;amp;fb=1&amp;amp;gl=sacid=0,0,2944591365254196345&amp;amp;ei=OTUeUaOaN8rIswa2x4HYBw&amp;amp;ved=0CAEQ5xgwAA&lt;br /&gt;
&lt;br /&gt;
-------&lt;br /&gt;
'''February - 25th/2013 (Members gathering)'''&lt;br /&gt;
&lt;br /&gt;
''The agenda for this gathering would be as follows:''&lt;br /&gt;
&lt;br /&gt;
- Catch up with new members&lt;br /&gt;
&lt;br /&gt;
- OWASP Saudi Arabia and its involvement with other non-profit organizations&lt;br /&gt;
&lt;br /&gt;
- Planning for our next conference/technical session&lt;br /&gt;
&lt;br /&gt;
''Date: 25th of Feb&lt;br /&gt;
Time: 18:00 - 19:00&lt;br /&gt;
Venue: Costa Coffee, Olaya Street, Riyadh''&lt;br /&gt;
&lt;br /&gt;
Direction: https://maps.google.com.sa/maps?hl=en&amp;amp;sig=BZ4&amp;amp;ie=UTF-8&amp;amp;q=costa+coffee+in+riyadh&amp;amp;fb=1&amp;amp;gl=sacid=0,0,2944591365254196345&amp;amp;ei=OTUeUaOaN8rIswa2x4HYBw&amp;amp;ved=0CAEQ5xgwAA&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
'''Khobar gathering lead by Mohannad Shahat'''&lt;br /&gt;
&lt;br /&gt;
'''Date:''' 24th May 2012, starting at 8:30 PM to 9:30 PM&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
&lt;br /&gt;
1- Welcoming to OWASP Sharqiyah ''Jalsah''#1&lt;br /&gt;
&lt;br /&gt;
2- OWASP?&lt;br /&gt;
&lt;br /&gt;
3- Discussion: How to Start in Web Application Security?&lt;br /&gt;
&lt;br /&gt;
3- Closing&lt;br /&gt;
&lt;br /&gt;
Detailed Agenda document [https://docs.google.com/open?id=0B4eUULYLYNDsLUFOVlJEVkFhRzQ] &lt;br /&gt;
 &lt;br /&gt;
'''Location:'''&lt;br /&gt;
&lt;br /&gt;
Al-Liwan Coffee Shop in Khobar opposite to SAAD Hospital.&lt;br /&gt;
&lt;br /&gt;
= &amp;lt;u&amp;gt;'''Application Security and OWASP top 10 - Jeddah'''&amp;lt;/u&amp;gt;  =&lt;br /&gt;
&lt;br /&gt;
We'll have a technical session to talk about application security and OWASP top 10, as we'll demonstrate the top critical vulnerabilities against web applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''The OWASP Top 10 Web Application Security Risks are:'''&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A1: Injection &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A2: Cross-Site Scripting (XSS) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A3: Broken Authentication and Session Management &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A4: Insecure Direct Object References &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A5: Cross-Site Request Forgery (CSRF) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A6: Security Misconfiguration &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A7: Insecure Cryptographic Storage &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A8: Failure to Restrict URL Access &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A9: Insufficient Transport Layer Protection &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A10: Unvalidated Redirects and Forwards &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''''Date: 21 Jun 2011''''' &lt;br /&gt;
&lt;br /&gt;
'''''Location: Rosewood Corniche - Jeddah''''' &lt;br /&gt;
&lt;br /&gt;
'''''Start: 19:00 End: 21:00''''' &lt;br /&gt;
&lt;br /&gt;
'''''Speaker: Amro AlOlaqi''''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
If you're interested to attend the session please confirm by sending your information to amro at owasp.org.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= &amp;lt;u&amp;gt;'''Jeddah meeting'''&amp;lt;/u&amp;gt;  =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''The agenda of the inaugural meeting will be as follows:'''&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. Introduction to OWASP &lt;br /&gt;
&lt;br /&gt;
2. Discuss local OWASP awareness and image programs for Jeddah members. &lt;br /&gt;
&lt;br /&gt;
Date: Sunday, 3, 2010 &lt;br /&gt;
&lt;br /&gt;
Location: Costa Coffee, alHamrah, Jeddah. &lt;br /&gt;
&lt;br /&gt;
Sponsored by: SAIS technology &lt;br /&gt;
&lt;br /&gt;
Please do not hesitate to contact me at amro (at) owasp.org for any clarification or inquires &lt;br /&gt;
&lt;br /&gt;
= '''Information Security and beyond - Event'''  =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''Location'''&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue: Makarim Hall - Marriott Hotel&lt;br /&gt;
 &lt;br /&gt;
 City&amp;amp;nbsp;: Riyadh - KSA&lt;br /&gt;
 &lt;br /&gt;
 Date: 25 May 2009&lt;br /&gt;
 &lt;br /&gt;
 Time: 08:30 - 15:00&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''''Seminar Agenda''''' &lt;br /&gt;
&lt;br /&gt;
 08:00 – 08:30  Registration&lt;br /&gt;
 08:30 – 09:00  Key note ( SAMA Speaker )&lt;br /&gt;
 09:00 – 10:00  ISO 27001 ( BSI Speaker )&lt;br /&gt;
 10:00 – 10:20  Refreshment&lt;br /&gt;
 10:20 – 11:0   Application Security ( Verizon Business Speaker )&lt;br /&gt;
 11:00 – 12:00  Penetration Testing using OWASP methodology ( OWASP )&lt;br /&gt;
 12:00 – 12:30  Prayer time&lt;br /&gt;
 12:30 - 01:20  Enterprise Security ( F5 Speaker )&lt;br /&gt;
 01:20 – 01:40  Q &amp;amp;amp; A    &lt;br /&gt;
 01:40 – 02:30  Lunch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''''Event Speaker''''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''''Mr. Saqer Al-Orabi Al-Harthi.''' Information System and Control Manager Saudi Arabian Monetary Agency (SAMA) &lt;br /&gt;
&lt;br /&gt;
Mr. Saqer Al-Orabi Al-Harthi is responsible for the Information System and Control at SAMA – Banking Technology Department. Mr. Al-Harthi has been the chairman of various committees at SAMA such as: SAMA and Banks Information Security Managers Committee, Information Security Awareness Committee and Security Training Committee. Mr. Al-Harthi has been instrumental in building Information Security for the Saudi financial industry by initiating and executing major projects such as SARIE Security, SPAN Security, PKI, and he has been the champion in PCI development within Saudi Arabia along with other security related projects. Furthermore, Mr. Al-Harthi has presented in many IT Security seminars and events. Mr. Al-Harthi holds a Masters degree in Computer and Information System from U.S.A. and he is a Certified Information Security Manager (CISM). &lt;br /&gt;
&lt;br /&gt;
''''Amro AlOlaqi''' Information Security Consultant&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Amro has more than 7 years of experience in Information security. He started his professional career at early age, since then, he engaged the field of UNIX/Linux engineering and systems’ security. Throughout his extraordinary achievements and accomplishments, he became amongst the most recognized experts in the field of penetration testing, application security and vulnerability assessment within Saudi Arabia. He carried out penetration tests, application , vulnerability assessments and security audits for prestigious organizations. Moreover, his expertise extends across industry verticals, security technologies plus hacking tools and techniques. Amro is the OWASP chapter leader for Saudi Arabia and United Arab Emirates, also he is specialized at cyber crime investigations and digital forensics. Nevertheles, Amro hold well-recognized international certifications such as GCIH, GHTQ, ECSA/LPT, CEH, CHFI, Security+, RHCE, SCSA, Linux+, LPIC1, LPIC2 and SCSECA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''''Theuns Kotze''' Regional Director BSI – Middle East and Africa &lt;br /&gt;
&lt;br /&gt;
Mr. Kotze holds a B. Comm. Degree from the University of Pretoria. He is currently the Regional Director for BSI – Management Systems in Middle East and Africa. In BSI he was the Sales and Marketing Director for BSI- Management Systems in Europe based in London. He was an Executive Director of Nosa International responsible for Auditing and Certification Globally. During 2002 he developed an Aids management standard now known as AMS 16001. The AMS 16001 is now the South African Standard for Aids management and could become the ISO standard for aids management in future. He gained extensive knowledge and experience in Europe and Middle East in the last 2 years. He conducted more than 2000 assessments on various standards in the last 20 years. Theuns had a private pilot’s license for 20 years and has flown many types of airplanes. He is married to Maria and has a son John 8 and they now live in Dubai. &lt;br /&gt;
&lt;br /&gt;
'''Ali Akl''' Principal Consultant Verizon Business Security Solutions &lt;br /&gt;
&lt;br /&gt;
Ali has over 10 years experience in Information Security, Business Continuity and Disaster Recovery. He has a unique blend of technical expertise along with management consulting experience, which has made him a valuable consultant to many organizations in the public and private sectors. He has contributed to the OPM3 standard development project, he is also CISSP and CISM, and has earned the GIAC Fundamentals of Security Policy certificate and recently has earned the Member Status of the Business Continuity Institute as well Certified in Disaster Recovery and Planning and finally he has been invited into the Fellowship Program of the International Multilateral Partnership Against Cyber-Terrorism (‘IMPACT’). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''''Zakeer Zubair''' Field Systems Engineer &lt;br /&gt;
&lt;br /&gt;
Zakeer Zubair is a senior technical team player in F5’s Middle East operation. Since obtaining his Bachelor degree in Mathematics, Zubair has spent the last 9 years working in networking and security for a variety of systems integrators including Schlumberger and Atos Origin. This role has involved integrating best of breed vendor networking and security devices and necessitated skills in routing, switching, security and application switching. Zubair has technical certifications from F5, Cisco, Juniper, Nortel Networks, Extreme Networks, Microsoft and CISSP. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= '''PCI compliance seminar'''  =&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
 '''Location'''&lt;br /&gt;
 &lt;br /&gt;
 Venue: Makarim Hall - Marriott Hotel&lt;br /&gt;
 &lt;br /&gt;
 City&amp;amp;nbsp;: Riyadh - KSA&lt;br /&gt;
 &lt;br /&gt;
 Date: 2nd March 2009&lt;br /&gt;
 &lt;br /&gt;
 Time: 08:30 - 15:00 &lt;br /&gt;
&lt;br /&gt;
'''Seminar Agenda''' &lt;br /&gt;
&lt;br /&gt;
 08:30 – 09:00    Registration Team&lt;br /&gt;
 09:00 – 09:30    Introduction&lt;br /&gt;
 09:30 – 10:20    PCI (Applications Firewalls/SSL VPN) &lt;br /&gt;
 10:20 – 10:40    Refreshment &lt;br /&gt;
 10:40 – 11:20    OWASP and PCI compliance &lt;br /&gt;
 11:20 – 12:10    Application Delivery Controller&lt;br /&gt;
 12:10 – 12:40    Prayer&lt;br /&gt;
 12:40 – 01:00    Last Session + Questions +Closing Session&lt;br /&gt;
 01:00 – 02:00    Lunch&lt;br /&gt;
&lt;br /&gt;
'''''Speakers''''' &lt;br /&gt;
&lt;br /&gt;
'''Peter Draper''', Security Specialist: has been providing guidance, design and implementation of Info Sec solutions for some 17+ years. The last ten years have been focused on Application delivery and security with the most recent focus following the main hacking attempts into the Web Application Security space. Peter has been instrumental in delivering Web Application Security into a wide and varied range of customers including finance, government, ecommerce and travel industry companies. Within the Middle East region Peter had delivered solutions to Government, Finance and Corporate customers ensuring the best possible protection is in place to secure customer sensitive data. &lt;br /&gt;
&lt;br /&gt;
Peter’s presentation will focus on: &lt;br /&gt;
&lt;br /&gt;
 1) What is the “PCI Journey”?&lt;br /&gt;
 2) What do I need to do and when?&lt;br /&gt;
 3) Is PCI the only reason to deploy security solutions?&lt;br /&gt;
 4) Where should I concentrate my $&lt;br /&gt;
 5) What happens once I have it?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Nigel Ashworth''', F5 MEA Technical Director: has been F5’s Technical Director for Middle East and Africa since September 2005. In that time he has driven the region’s increasing importance to F5’s global business, managing the pre sales engineering team, and investing technical resources in key verticals to drive double-digit sales growth. Nigel has been with F5 for nine years in a number of senior technical roles, including Technical Director responsible for driving EMEA Strategic Alliances with key partners including Microsoft, SAP and Oracle, and Technical Director responsible for pre-sales in Europe. Prior to joining F5, Nigel held technical leadership positions for companies including Reuters and UB Networks. He received his B.S in Electrical Engineering from Portsmouth University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''''Amro AlOlaqi,&amp;amp;nbsp;'''&amp;amp;nbsp;Information Security Consultant &amp;lt;br&amp;gt;Amro has more than 7 years of experience in Information security. He started his professional career at early age, since then, he engaged the field of UNIX/Linux engineering and systems’ security. Throughout his extraordinary achievements and accomplishments, he became amongst the most recognized experts in the field of penetration testing, application security and vulnerability assessment within Saudi Arabia. He carried out penetration tests, application , vulnerability assessments and security audits for prestigious organizations. Moreover, his expertise extends across industry verticals, security technologies plus hacking tools and techniques. Amro is the OWASP chapter leader for Saudi Arabia and United Arab Emirates, also he is specialized at cyber crime investigations and digital forensics. Nevertheles, Amro hold well-recognized international certifications such as GCIH, GHTQ, ECSA/LPT, CEH, CHFI, Security+, RHCE, SCSA, Linux+, LPIC1, LPIC2 and SCSECA.&amp;lt;br&amp;gt;'''&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
Amro’s presentation will focus on: &lt;br /&gt;
&lt;br /&gt;
 1) Web application attacks and security trends.&lt;br /&gt;
 2) OWASP &amp;quot;thinking out of the box&amp;quot;.&lt;br /&gt;
 2) OWASP and application security.&lt;br /&gt;
 4) The relation between OWASP and PCI.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;br /&gt;
[[Category:Saudi Arabia]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=162446</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=162446"/>
				<updated>2013-11-04T16:40:45Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek N]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
OWASP is pleased to announce the arrival of OWASP 2.0! &lt;br /&gt;
&lt;br /&gt;
OWASP 2.0 utilizes the MediaWiki portal to manage and provide the latest OWASP related information. Enjoy! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
Date and Time : Wednesday, April 3, 2013&lt;br /&gt;
&lt;br /&gt;
Venue: Mina A' Salam Hotel (Madinat Jumeirah)&lt;br /&gt;
&lt;br /&gt;
Web Application Security &amp;quot;Think like a hacker&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Presented by : Amro Alolaqi&lt;br /&gt;
&lt;br /&gt;
Reference: http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
Date and Time : 2nd &amp;amp; 3rd of October 2012  - 9:00 AM to 4:00 PM&lt;br /&gt;
&lt;br /&gt;
Venue: Grand Hayat - Dubai &lt;br /&gt;
&lt;br /&gt;
Web Application Critical Vulnerabilities (OWASP top ten)&lt;br /&gt;
&lt;br /&gt;
Presented by: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://we-initiative.com/wp-content/uploads/2012/07/Cyber-Security-UAE-2012-EM12.pdf &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
Date and Time : 18th - 9:00 AM to 4:00 PM&lt;br /&gt;
&lt;br /&gt;
Venue: The Address Hotel - Dubai Mall&lt;br /&gt;
&lt;br /&gt;
Web Application Critical Vulnerabilities and Threat Modeling &lt;br /&gt;
&lt;br /&gt;
Presented by: Amro AlOlaqi&lt;br /&gt;
&lt;br /&gt;
http://www.isacauae.org/isafe2011/doc/isafe2011brochure.pdf&lt;br /&gt;
&lt;br /&gt;
https://plus.google.com/photos/117947441088827793360/albums/5712379217298867441?banner=pwa &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
OWASP's session: 11:20 PM  Amro AlOlaqi ( The Ten Web Application Critical Risks )&lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:Middle_East]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dubai&amp;diff=162445</id>
		<title>Dubai</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dubai&amp;diff=162445"/>
				<updated>2013-11-04T16:23:39Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dubai|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi] and [mailto:tarek@owasp.org Tarek N]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dubai|emailarchives=http://lists.owasp.org/pipermail/owasp-dubai}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
 '''OWASP Moves to MediaWiki Portal - 11:15, 20 May 2006 (EDT)'''&lt;br /&gt;
&lt;br /&gt;
OWASP is pleased to announce the arrival of OWASP 2.0! &lt;br /&gt;
&lt;br /&gt;
OWASP 2.0 utilizes the MediaWiki portal to manage and provide the latest OWASP related information. Enjoy! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This will be our first meeting in a while. It will be an opportunity to get introduced to the other members of the OWASP UAE Chapter and discuss the type of events you'd like to see in the future.&lt;br /&gt;
&lt;br /&gt;
This will be a casual meeting at a Caribou Coffee at DIFC&lt;br /&gt;
&lt;br /&gt;
http://www.mealadvisors.com/uae/dubai/restaurant/map/branch_id/1294&lt;br /&gt;
&lt;br /&gt;
Gathering agenda will be:&lt;br /&gt;
&lt;br /&gt;
    Meeting on Saturday the 9th of November 2013 at 6pm.&lt;br /&gt;
    Introductions&lt;br /&gt;
    Intro to OWASP&lt;br /&gt;
    Open discussion about Dubai chapter&lt;br /&gt;
    Networking&lt;br /&gt;
    Conclude at 8pm&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IDC's IT Security Roadshow  2013 - Dubai '''&lt;br /&gt;
&lt;br /&gt;
http://idc-cema.com/eng/events/50679-idc-s-it-security-roadshow-2013/11-speakers &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Cyber Security Summit 2012- DUBAI'''&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''ISACA UAE - ISAFE conference  2011 - Dubai'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''IT For Government 2011- DUBAI'''&lt;br /&gt;
&lt;br /&gt;
''Location:&amp;amp;nbsp;Dusit Thani Hotel - 133, Sheikh Zayed Road &amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''Date: 4/Oct/2011'' &lt;br /&gt;
&lt;br /&gt;
''Registration 8:00 AM''  &lt;br /&gt;
&lt;br /&gt;
''NAUGURAL KEYNOTE PRESENTATION BY His Excellency Salem Khamis Al Shair Al Suwaidi Emirates e-Government Director General''&lt;br /&gt;
&lt;br /&gt;
OWASP's session: 11:20 PM  Amro AlOlaqi ( The Ten Web Application Critical Risks )&lt;br /&gt;
&lt;br /&gt;
For more information about the event, please visit http://www.fleminggulf.com/cms/uploads/conference/downloads/Postshow_report_DBTC15.pdf &lt;br /&gt;
&lt;br /&gt;
[[Category:Middle_East]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Speakers_Project&amp;diff=162437</id>
		<title>Category:OWASP Speakers Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Speakers_Project&amp;diff=162437"/>
				<updated>2013-11-04T14:41:11Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This program lead by [[:user:Knoblochmartin|Martin Knobloch]] helps local chapters or application security conferences to find OWASP related speakers to have OWASP presenters on site.&lt;br /&gt;
&lt;br /&gt;
This program allows two parties to find each other:&lt;br /&gt;
&lt;br /&gt;
* Local chapters or application security events that want to attract an OWASP speaker&lt;br /&gt;
* OWASP speakers to entertain OWASP presentations and that want to see the world&lt;br /&gt;
&lt;br /&gt;
For sponsorship, see the [[:Category:OWASP_on_the_Move_Project|OWASP on the Move Project]] page&lt;br /&gt;
&lt;br /&gt;
== available presentations ==&lt;br /&gt;
&lt;br /&gt;
== available speakers  ==&lt;br /&gt;
&lt;br /&gt;
If you want to (re)do an OWASP related presentation, propose them here with your availability boundaries (timing/geographical) &lt;br /&gt;
&lt;br /&gt;
*Add your name, contact and bio information to become available as OWASP Speaker!&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Introduction &lt;br /&gt;
! Available Area &lt;br /&gt;
! Bios&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:Robert(at)ZakonGroup.com Robert H'obbes' Zakon] &lt;br /&gt;
| Presenter on Web Application Security, OWASP Top 10, PHP Security, and assorted other topics.  Training sessions taught at events such as [http://www.zakongroup.com/technology/services-training.shtml OWASP, ACSAC, and CCS].  Based in New Hampshire, and available for travel worldwide.  Fluent in English, and able to converse in Portuguese.  A developer and consultant for the past decade, formerly a Principal Engineer with MITRE's InfoSec Group. &lt;br /&gt;
| Global (USA/NH-based) &lt;br /&gt;
| [http://www.zakon.org/robert/vitae.html BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:jmcgovern@virtusa.com James McGovern] &lt;br /&gt;
| Presenter on Enterprise Architecture and Web Application Security, SOA Web Services Security and Federated Identity.   &lt;br /&gt;
| Global (USA/CT-based) &lt;br /&gt;
| [http://www.linkedin.com/in/jamesmcgovern BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:chuck(at)McCulloughAssociates.com Chuck McCullough] &lt;br /&gt;
| Chuck provides training sessions to developers on the Top 10. Chuck welcomes speaking opportunities to any group. Chuck is available in the Texas area and at various other locations in the USA. &lt;br /&gt;
| USA/Texas &lt;br /&gt;
| [http://www.linkedin.com/in/chuckmccullough BIO]&lt;br /&gt;
|-&lt;br /&gt;
| Marc Curphey &lt;br /&gt;
| Marc will happily speak about the WebAppSec industry, SDLC etc. around Europe. You can see him in action at [http://video.hitb.org/2006.html HITB with John Viega] (big download) &lt;br /&gt;
| Europe &lt;br /&gt;
| [http://www.linkedin.com/in/curphey BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:tomb(at)owasp.org Tom Brennan] &lt;br /&gt;
| based in NYC Metro Tom is a long time volunteer and OWASP contributor and [http://www.owasp.org/index.php/About_OWASP International Board Member].  He is available for global speaking venues to educate audiences about the OWASP Foundation core mission, how it works and various projects. In addition he also provides regular talks on honeypot research and case-studies about tactical experiences when conducting [http://en.wikipedia.org/wiki/Red_Team Red Team]/Tiger Team assessments involving the application, network, wireless and physical security - [https://www.owasp.org/index.php/User:Brennan BIO]&lt;br /&gt;
| Global &lt;br /&gt;
| [http://www.linkedin.com/in/tombrennan BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:thesp0nge@owasp.org Paolo Perego] &lt;br /&gt;
| Paolo is available to talk about [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project Orizon project], safe coding and code review issues around Europe in the near October-December. &lt;br /&gt;
| Europe &lt;br /&gt;
| [http://www.linkedin.com/in/thesp0nge BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:marc.m.morana@gmail.org Marco Morana] &lt;br /&gt;
| Marco is available to talk about [http://iac.dtic.mil/iatac/download/security.pdf Software Security Frameworks]and Secure Code Reviews [https://www.cmpevents.com/CSI33/a.asp?option=G&amp;amp;V=3&amp;amp;id=443342 see 07 CSI conference as reference] in USA around November-December and in Europe around January-February &lt;br /&gt;
| Europe &lt;br /&gt;
| [http://www.linkedin.com/pub/2/a7a/59b BIO]&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:amro@owasp.org Amro Alolaqi] &lt;br /&gt;
| Amro is leading the OWASP Saudi Arabia and UAE chapters, futhermore a contributor for the OWASP Testing Guide v4, OWASP Zed Attack Proxy (ZAP) and OWASP Web Application Security Testing Cheat Sheet. He is a frequent speaker at various industry conferences and events; topics of interest include Web App Critical Vulnerabilities, OWASP Zed Attack Proxy (ZAP), OWASP Testing Guide, Web Application Security Testing and Threat Modeling.&lt;br /&gt;
| Global (Middle East-based)&lt;br /&gt;
| [https://www.owasp.org/index.php/User:Amro_Ahmed BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:sebastien.gioria@owasp.fr Sébastien Gioria] &lt;br /&gt;
| Sebastien is available to talk about WebAppSec, educational purpose on AppSec in French or at least in english around France/Europe/Canada from middle of March 08. You can find some Talk on the [http://www.owasp.fr Owasp France Chapter] &lt;br /&gt;
| France/Europe/Canada &lt;br /&gt;
| [http://www.linkedin.com/in/gioria BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:mordecai.kraushar@owasp.org Mordecai Kraushar] &lt;br /&gt;
| Mordecai is available to talk about different topics within the Web application security space. Discussions typically involve either the Broken Web Application project or the Vicnum project,  [http://www.owasp.org/index.php/Category:OWASP_Vicnum_Project], a flexible vulnerable web application that can be used in many scenarios including 'capture the flag' exercises. &lt;br /&gt;
| Global &lt;br /&gt;
| [http://www.linkedin.com/in/mkraushar BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:michael.coates@owasp.org Michael Coates] &lt;br /&gt;
| Michael is available to talk on a variety of web application security topics. Talks are interactive and include live demos and code examples. Michael has spoken at multiple OWASP conferences and University security courses on topics such as Introduction to Application Security, Automated Defense Systems in Applications, Real Time Detection and Prevention of Application Worms, and security risks in SSL/TLS.  &lt;br /&gt;
| USA/San Francisco &amp;amp; Virtual Presentations&lt;br /&gt;
| [http://www.linkedin.com/in/mcoates BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:tobias.gondrom@owasp.org Tobias Gondrom] &lt;br /&gt;
| Tobias is on the London chapter board (and previously Germany chapter lead) and currently member of the OWASP Global Industry committee. He is available to talk on a variety of web application and information security and risk management topics. He gives two different types of presentations - preferred in Asia or Europe: &amp;lt;br&amp;gt;- CISO level: information security, risk management from Secure SDLCs, maturity models, standards and security strategy, to change management and managing application security in large organisations and the OWASP CISO Guide. &amp;lt;br&amp;gt;- Deep technical talks: new security standards and research, involving his work in web security research and as the chair of the web security working group at the IETF. Tobias has spoken at multiple OWASP AppSec and other security conferences, given university guest lectures and full training days on topics like CISO training, browser security, web security, new technologies for channel protection with SSL/TLS, electronic signatures, ...&lt;br /&gt;
| Asia and Europe  &amp;lt;br&amp;gt;(dual based in both regions)&lt;br /&gt;
| [http://uk.linkedin.com/in/gondrom BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:dan.cornell@owasp.org Dan Cornell] &lt;br /&gt;
| Dan Cornell has over twelve years of experience architecting, developing and securing web-based software systems. He speaks on a variety of software development and software security topics such as Vulnerability Management, Software Security Remediation, and Code Review/Static Analysis. Dan is based in San Antonio, TX and available to fly/drive as needed to the site. &lt;br /&gt;
| USA/San Antonio &lt;br /&gt;
| [http://www.denimgroup.com/about_team_dan.html BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:John.Steven@owasp.org John Steven] &lt;br /&gt;
| John speaks on a variety of topics including &amp;quot;How to build your own application security group&amp;quot;, &amp;quot;Threat Modeling&amp;quot;, &amp;quot;Code Review and Static analysis&amp;quot;, as well as other topics. John has spoken at and given tutorials for multiple OWASP conferences. John frequents New York, Boston, Washington DC, and Charlotte, but is available for travel elsewhere. &lt;br /&gt;
| Washington, DC/USA &lt;br /&gt;
| [http://www.cigital.com/about/team/management.php#jsteven BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:blake@owasp.org Blake Cornell] &lt;br /&gt;
| Blake is available to speak regarding topics including Security v. HIPPA, Penetration Testing Methodologies, Fuzzing and Blended Threats such as attacking VoIP with the OWASP Top 10. Blake lives in the NY Metro area and is available for speaking at regional, national and world wide events. &lt;br /&gt;
| New York, NY/USA &lt;br /&gt;
| [http://www.linkedin.com/in/blakecornell BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:Nick.Coblentz@gmail.com Nick Coblentz] &lt;br /&gt;
| Nick regularly performs research related to secure software development. He is available to present on topics such as the [http://www.owasp.org/index.php/Category:Software_Assurance_Maturity_Model Software Assurance Maturity Model (SAMM)], the [http://nickcoblentz.blogspot.com/2009/06/samm-inteview-template-version-10.html SAMM Interview Template], [http://nickcoblentz.blogspot.com/2009/05/issa-journal-web-application-security.html Building Web Application Security Portfolios], and [http://nickcoblentz.blogspot.com/2009/11/owasp-presentation-on-dec-10-microsoft.html The Microsoft SDL for Agile Development]. Please email Nick if you see articles on his [http://nickcoblentz.blogspot.com/ blog] that you would like him to present. &lt;br /&gt;
| USA/Kansas, Oklahoma, Missouri &lt;br /&gt;
| [http://www.linkedin.com/in/ncoblentz BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:johnccr@yahoo.com Juan Carlos Calderon] &lt;br /&gt;
| Juan has being part of the Appliction Security industry for 9 years, currently performs research on application and information security arena. He is available to present &amp;quot;Preparing an strategy for application vulnerability detection&amp;quot;, &amp;quot;Owasp Spanish and Internationalization&amp;quot; and &amp;quot;Análisis y efectos del cibercrimen en Mexico&amp;quot;(Analysis and effects of cibercrime in México). He is also open to talk about other topics related to OWASP materials and tools, send him a note to verify the coverage. &lt;br /&gt;
| Aguascalientes/México &lt;br /&gt;
| [http://www.linkedin.com/in/juancarloscalderon BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:edward@owasp.org Edward Bonver] &lt;br /&gt;
| Edward has over a decade of experience in the software security field. He currently works for Symantec's Product Security Team, where he brings all aspects of secure software development to product teams across the company. He is a frequent speaker at various industry conferences and OWASP events; topics of interest include Threat Modeling and Security Testing.&lt;br /&gt;
| Global(USA/Los Angeles-based)&lt;br /&gt;
| [http://www.linkedin.com/in/bonver BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:ludovic.petit@owasp.org Ludovic Petit] &lt;br /&gt;
| Chapter Leader OWASP France and OWASP Global Connections Committee Member,  [https://www.owasp.org/index.php/User:Ludovic_Petit '''Ludovic'''] is living in Paris and is willing to talk about Web Application Security topics with a Corporate dimension, including about Legal and Law Enforcement, the OWASP Foundation approach, and explain why WebApp Security is also linked to Legal and Regulatory aspects, so Corporate responsibility, to protect your business.&lt;br /&gt;
| France, Europe and elsewhere, according to my availabilities and if you pay yourself the travel and accommodation expenses.&lt;br /&gt;
| [http://www.linkedin.com/in/lpetit BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:magno.logan@owasp.org Magno Logan] &lt;br /&gt;
| OWASP Paraiba Chapter Leader and OWASP Portuguese Language Project Member. Magno (Logan) Rodrigues has an MBA in Information Security and studied Computer Forensics for one year in New York. He has done many talks about OWASP and it's main projects at national and international events such as [http://www.ensol.org.br/ ENSOL], [http://gts.nic.br/ GTS] and [https://www.owasp.org/index.php/AppSecLatam2011 App Sec Latam 2011]. Topics of interest include: OWASP Top 10, WebGoat, Java Security, E-commerce Security and Computer Forensics.&lt;br /&gt;
&lt;br /&gt;
| Latin America&lt;br /&gt;
| [https://www.owasp.org/index.php/User:Magno_Logan BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:wagner.elias@owasp.org Wagner Elias] &lt;br /&gt;
| Wagner founded the Brazil chapter is currently Curitiba-Brazil Chapter Leader and available to talk on a variety of web application security topics. Talks are interactive and include live demos and code examples. Wagner has spoken at various conferences in Brazil.&lt;br /&gt;
&lt;br /&gt;
Topics of interest: Mobile Security; SDL Process and Implementation; Code Review and Application Test&lt;br /&gt;
&lt;br /&gt;
| Brazil&lt;br /&gt;
| [https://www.owasp.org/index.php/User:wagner.elias BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:ramiro.pulgar@owasp.org Ramiro Pulgar] &lt;br /&gt;
| Chapter Leader OWASP Ecuador. [https://www.owasp.org/index.php/User:Ramiro_Pulgar '''milovisho'''] OWASP Ecuador Chapter Leader  &lt;br /&gt;
| Ecuador, Latin America, Global&lt;br /&gt;
| [http://ec.linkedin.com/in/ramiropulgar BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:john.vargas@owasp.org John Vargas] &lt;br /&gt;
| Chapter Leader OWASP Perú. [https://www.owasp.org/index.php/User:Jvargas '''John Vargas'''] OWASP Perú Chapter Leader  &lt;br /&gt;
| Perú, Latin America, Global&lt;br /&gt;
| [http://pe.linkedin.com/in/jvargasp BIO]&lt;br /&gt;
|-&lt;br /&gt;
|[mailto:Ahmed.neil@owasp.org Ahmed Neil] &lt;br /&gt;
|Neil is available to speak regarding topics including Digital forensics,Wep Application  threats and security, Medical Information System Security, Wep application Penetration Testing,Always like to discuss OWASP Top 10. I am in Mansoura, Egypt now and available for speaking at regional,and world wide events. &lt;br /&gt;
[https://www.owasp.org/index.php/User:Ahmed_M_Neil '''Ahmed Neil'''] OWASP Mansoura Chapter Leader  &lt;br /&gt;
| Africa,Global &lt;br /&gt;
|}&lt;br /&gt;
*Add your name, contact and bio information to become available as OWASP Speaker!&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Saudi_Arabia&amp;diff=162366</id>
		<title>Saudi Arabia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Saudi_Arabia&amp;diff=162366"/>
				<updated>2013-11-03T19:22:45Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Saudi Arabia|extra=The chapter leaders are [mailto:amro@owasp.org Amro AlOlaqi]  [mailto:mohannad.shahat@owasp.org Mohannad Shahat] &lt;br /&gt;
&amp;lt;paypal&amp;gt;Saudi Arabia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-SA|emailarchives=http://lists.owasp.org/pipermail/owasp-SA}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
'''February - 25th/2013 (Members gathering)'''&lt;br /&gt;
&lt;br /&gt;
''The agenda for this gathering would be as follows:''&lt;br /&gt;
&lt;br /&gt;
- Catch up with new members&lt;br /&gt;
&lt;br /&gt;
- OWASP Saudi Arabia and its involvement with other non-profit organizations&lt;br /&gt;
&lt;br /&gt;
- Planning for our next conference/technical session&lt;br /&gt;
&lt;br /&gt;
''Date: 25th of Feb&lt;br /&gt;
Time: 18:00 - 19:00&lt;br /&gt;
Venue: Costa Coffee, Olaya Street, Riyadh''&lt;br /&gt;
&lt;br /&gt;
Direction: https://maps.google.com.sa/maps?hl=en&amp;amp;sig=BZ4&amp;amp;ie=UTF-8&amp;amp;q=costa+coffee+in+riyadh&amp;amp;fb=1&amp;amp;gl=sacid=0,0,2944591365254196345&amp;amp;ei=OTUeUaOaN8rIswa2x4HYBw&amp;amp;ved=0CAEQ5xgwAA&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Khobar gathering lead by Mohannad Shahat'''&lt;br /&gt;
&lt;br /&gt;
'''Date:''' 24th May 2012, starting at 8:30 PM to 9:30 PM&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
&lt;br /&gt;
1- Welcoming to OWASP Sharqiyah ''Jalsah''#1&lt;br /&gt;
&lt;br /&gt;
2- OWASP?&lt;br /&gt;
&lt;br /&gt;
3- Discussion: How to Start in Web Application Security?&lt;br /&gt;
&lt;br /&gt;
3- Closing&lt;br /&gt;
&lt;br /&gt;
Detailed Agenda document [https://docs.google.com/open?id=0B4eUULYLYNDsLUFOVlJEVkFhRzQ] &lt;br /&gt;
 &lt;br /&gt;
'''Location:'''&lt;br /&gt;
&lt;br /&gt;
Al-Liwan Coffee Shop in Khobar opposite to SAAD Hospital.&lt;br /&gt;
&lt;br /&gt;
= &amp;lt;u&amp;gt;'''Application Security and OWASP top 10 - Jeddah'''&amp;lt;/u&amp;gt;  =&lt;br /&gt;
&lt;br /&gt;
We'll have a technical session to talk about application security and OWASP top 10, as we'll demonstrate the top critical vulnerabilities against web applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''The OWASP Top 10 Web Application Security Risks are:'''&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A1: Injection &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A2: Cross-Site Scripting (XSS) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A3: Broken Authentication and Session Management &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A4: Insecure Direct Object References &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A5: Cross-Site Request Forgery (CSRF) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A6: Security Misconfiguration &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A7: Insecure Cryptographic Storage &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A8: Failure to Restrict URL Access &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A9: Insufficient Transport Layer Protection &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A10: Unvalidated Redirects and Forwards &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''''Date: 21 Jun 2011''''' &lt;br /&gt;
&lt;br /&gt;
'''''Location: Rosewood Corniche - Jeddah''''' &lt;br /&gt;
&lt;br /&gt;
'''''Start: 19:00 End: 21:00''''' &lt;br /&gt;
&lt;br /&gt;
'''''Speaker: Amro AlOlaqi''''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
If you're interested to attend the session please confirm by sending your information to amro at owasp.org.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= &amp;lt;u&amp;gt;'''Jeddah meeting'''&amp;lt;/u&amp;gt;  =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''The agenda of the inaugural meeting will be as follows:'''&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
1. Introduction to OWASP &lt;br /&gt;
&lt;br /&gt;
2. Discuss local OWASP awareness and image programs for Jeddah members. &lt;br /&gt;
&lt;br /&gt;
Date: Sunday, 3, 2010 &lt;br /&gt;
&lt;br /&gt;
Location: Costa Coffee, alHamrah, Jeddah. &lt;br /&gt;
&lt;br /&gt;
Sponsored by: SAIS technology &lt;br /&gt;
&lt;br /&gt;
Please do not hesitate to contact me at amro (at) owasp.org for any clarification or inquires &lt;br /&gt;
&lt;br /&gt;
= '''Information Security and beyond - Event'''  =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''Location'''&amp;lt;/u&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Venue: Makarim Hall - Marriott Hotel&lt;br /&gt;
 &lt;br /&gt;
 City&amp;amp;nbsp;: Riyadh - KSA&lt;br /&gt;
 &lt;br /&gt;
 Date: 25 May 2009&lt;br /&gt;
 &lt;br /&gt;
 Time: 08:30 - 15:00&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''''Seminar Agenda''''' &lt;br /&gt;
&lt;br /&gt;
 08:00 – 08:30  Registration&lt;br /&gt;
 08:30 – 09:00  Key note ( SAMA Speaker )&lt;br /&gt;
 09:00 – 10:00  ISO 27001 ( BSI Speaker )&lt;br /&gt;
 10:00 – 10:20  Refreshment&lt;br /&gt;
 10:20 – 11:0   Application Security ( Verizon Business Speaker )&lt;br /&gt;
 11:00 – 12:00  Penetration Testing using OWASP methodology ( OWASP )&lt;br /&gt;
 12:00 – 12:30  Prayer time&lt;br /&gt;
 12:30 - 01:20  Enterprise Security ( F5 Speaker )&lt;br /&gt;
 01:20 – 01:40  Q &amp;amp;amp; A    &lt;br /&gt;
 01:40 – 02:30  Lunch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''''Event Speaker''''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''''Mr. Saqer Al-Orabi Al-Harthi.''' Information System and Control Manager Saudi Arabian Monetary Agency (SAMA) &lt;br /&gt;
&lt;br /&gt;
Mr. Saqer Al-Orabi Al-Harthi is responsible for the Information System and Control at SAMA – Banking Technology Department. Mr. Al-Harthi has been the chairman of various committees at SAMA such as: SAMA and Banks Information Security Managers Committee, Information Security Awareness Committee and Security Training Committee. Mr. Al-Harthi has been instrumental in building Information Security for the Saudi financial industry by initiating and executing major projects such as SARIE Security, SPAN Security, PKI, and he has been the champion in PCI development within Saudi Arabia along with other security related projects. Furthermore, Mr. Al-Harthi has presented in many IT Security seminars and events. Mr. Al-Harthi holds a Masters degree in Computer and Information System from U.S.A. and he is a Certified Information Security Manager (CISM). &lt;br /&gt;
&lt;br /&gt;
''''Amro AlOlaqi''' Information Security Consultant&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Amro has more than 7 years of experience in Information security. He started his professional career at early age, since then, he engaged the field of UNIX/Linux engineering and systems’ security. Throughout his extraordinary achievements and accomplishments, he became amongst the most recognized experts in the field of penetration testing, application security and vulnerability assessment within Saudi Arabia. He carried out penetration tests, application , vulnerability assessments and security audits for prestigious organizations. Moreover, his expertise extends across industry verticals, security technologies plus hacking tools and techniques. Amro is the OWASP chapter leader for Saudi Arabia and United Arab Emirates, also he is specialized at cyber crime investigations and digital forensics. Nevertheles, Amro hold well-recognized international certifications such as GCIH, GHTQ, ECSA/LPT, CEH, CHFI, Security+, RHCE, SCSA, Linux+, LPIC1, LPIC2 and SCSECA. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''''Theuns Kotze''' Regional Director BSI – Middle East and Africa &lt;br /&gt;
&lt;br /&gt;
Mr. Kotze holds a B. Comm. Degree from the University of Pretoria. He is currently the Regional Director for BSI – Management Systems in Middle East and Africa. In BSI he was the Sales and Marketing Director for BSI- Management Systems in Europe based in London. He was an Executive Director of Nosa International responsible for Auditing and Certification Globally. During 2002 he developed an Aids management standard now known as AMS 16001. The AMS 16001 is now the South African Standard for Aids management and could become the ISO standard for aids management in future. He gained extensive knowledge and experience in Europe and Middle East in the last 2 years. He conducted more than 2000 assessments on various standards in the last 20 years. Theuns had a private pilot’s license for 20 years and has flown many types of airplanes. He is married to Maria and has a son John 8 and they now live in Dubai. &lt;br /&gt;
&lt;br /&gt;
'''Ali Akl''' Principal Consultant Verizon Business Security Solutions &lt;br /&gt;
&lt;br /&gt;
Ali has over 10 years experience in Information Security, Business Continuity and Disaster Recovery. He has a unique blend of technical expertise along with management consulting experience, which has made him a valuable consultant to many organizations in the public and private sectors. He has contributed to the OPM3 standard development project, he is also CISSP and CISM, and has earned the GIAC Fundamentals of Security Policy certificate and recently has earned the Member Status of the Business Continuity Institute as well Certified in Disaster Recovery and Planning and finally he has been invited into the Fellowship Program of the International Multilateral Partnership Against Cyber-Terrorism (‘IMPACT’). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; ''''Zakeer Zubair''' Field Systems Engineer &lt;br /&gt;
&lt;br /&gt;
Zakeer Zubair is a senior technical team player in F5’s Middle East operation. Since obtaining his Bachelor degree in Mathematics, Zubair has spent the last 9 years working in networking and security for a variety of systems integrators including Schlumberger and Atos Origin. This role has involved integrating best of breed vendor networking and security devices and necessitated skills in routing, switching, security and application switching. Zubair has technical certifications from F5, Cisco, Juniper, Nortel Networks, Extreme Networks, Microsoft and CISSP. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= '''PCI compliance seminar'''  =&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
 '''Location'''&lt;br /&gt;
 &lt;br /&gt;
 Venue: Makarim Hall - Marriott Hotel&lt;br /&gt;
 &lt;br /&gt;
 City&amp;amp;nbsp;: Riyadh - KSA&lt;br /&gt;
 &lt;br /&gt;
 Date: 2nd March 2009&lt;br /&gt;
 &lt;br /&gt;
 Time: 08:30 - 15:00 &lt;br /&gt;
&lt;br /&gt;
'''Seminar Agenda''' &lt;br /&gt;
&lt;br /&gt;
 08:30 – 09:00    Registration Team&lt;br /&gt;
 09:00 – 09:30    Introduction&lt;br /&gt;
 09:30 – 10:20    PCI (Applications Firewalls/SSL VPN) &lt;br /&gt;
 10:20 – 10:40    Refreshment &lt;br /&gt;
 10:40 – 11:20    OWASP and PCI compliance &lt;br /&gt;
 11:20 – 12:10    Application Delivery Controller&lt;br /&gt;
 12:10 – 12:40    Prayer&lt;br /&gt;
 12:40 – 01:00    Last Session + Questions +Closing Session&lt;br /&gt;
 01:00 – 02:00    Lunch&lt;br /&gt;
&lt;br /&gt;
'''''Speakers''''' &lt;br /&gt;
&lt;br /&gt;
'''Peter Draper''', Security Specialist: has been providing guidance, design and implementation of Info Sec solutions for some 17+ years. The last ten years have been focused on Application delivery and security with the most recent focus following the main hacking attempts into the Web Application Security space. Peter has been instrumental in delivering Web Application Security into a wide and varied range of customers including finance, government, ecommerce and travel industry companies. Within the Middle East region Peter had delivered solutions to Government, Finance and Corporate customers ensuring the best possible protection is in place to secure customer sensitive data. &lt;br /&gt;
&lt;br /&gt;
Peter’s presentation will focus on: &lt;br /&gt;
&lt;br /&gt;
 1) What is the “PCI Journey”?&lt;br /&gt;
 2) What do I need to do and when?&lt;br /&gt;
 3) Is PCI the only reason to deploy security solutions?&lt;br /&gt;
 4) Where should I concentrate my $&lt;br /&gt;
 5) What happens once I have it?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Nigel Ashworth''', F5 MEA Technical Director: has been F5’s Technical Director for Middle East and Africa since September 2005. In that time he has driven the region’s increasing importance to F5’s global business, managing the pre sales engineering team, and investing technical resources in key verticals to drive double-digit sales growth. Nigel has been with F5 for nine years in a number of senior technical roles, including Technical Director responsible for driving EMEA Strategic Alliances with key partners including Microsoft, SAP and Oracle, and Technical Director responsible for pre-sales in Europe. Prior to joining F5, Nigel held technical leadership positions for companies including Reuters and UB Networks. He received his B.S in Electrical Engineering from Portsmouth University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''''Amro AlOlaqi,&amp;amp;nbsp;'''&amp;amp;nbsp;Information Security Consultant &amp;lt;br&amp;gt;Amro has more than 7 years of experience in Information security. He started his professional career at early age, since then, he engaged the field of UNIX/Linux engineering and systems’ security. Throughout his extraordinary achievements and accomplishments, he became amongst the most recognized experts in the field of penetration testing, application security and vulnerability assessment within Saudi Arabia. He carried out penetration tests, application , vulnerability assessments and security audits for prestigious organizations. Moreover, his expertise extends across industry verticals, security technologies plus hacking tools and techniques. Amro is the OWASP chapter leader for Saudi Arabia and United Arab Emirates, also he is specialized at cyber crime investigations and digital forensics. Nevertheles, Amro hold well-recognized international certifications such as GCIH, GHTQ, ECSA/LPT, CEH, CHFI, Security+, RHCE, SCSA, Linux+, LPIC1, LPIC2 and SCSECA.&amp;lt;br&amp;gt;'''&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
Amro’s presentation will focus on: &lt;br /&gt;
&lt;br /&gt;
 1) Web application attacks and security trends.&lt;br /&gt;
 2) OWASP &amp;quot;thinking out of the box&amp;quot;.&lt;br /&gt;
 2) OWASP and application security.&lt;br /&gt;
 4) The relation between OWASP and PCI.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;br /&gt;
[[Category:Saudi Arabia]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Amro_Ahmed&amp;diff=162294</id>
		<title>User:Amro Ahmed</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Amro_Ahmed&amp;diff=162294"/>
				<updated>2013-11-02T17:48:23Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Amro AlOlaqi joined OWASP back in 2008. ( My old user account: https://www.owasp.org/index.php/User:Amro )&lt;br /&gt;
&lt;br /&gt;
Amro currently works as a Sr. Consultant at Verizon (Threat &amp;amp; Vulnerability). Prior joining Verizon, Amro worked for BAE Systems, Saudi Aramco, IS, and Red Hat, he has more than 8 years of experience in Information security. He started his professional career at early age, since then, he engaged the field of UNIX/Linux engineering and systems’ security.  He carried out penetration tests, application , vulnerability assessments and security audits for prestigious organizations. Moreover, his expertise extends across industry verticals, security technologies plus hacking tools and techniques. Amro hold well-recognized international certifications such as CISSP, GCIH, GHTQ, LPT, CEH, CHFI, RHCE, SCSA, Linux+, LPIC1/2 SCSECA, and Certified ISO 27001 LA/LI&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''OWASP Involvement''''' &lt;br /&gt;
* Chapter leader: Saudi Arabia &lt;br /&gt;
* Chapter leader: Untied Arab Emirates &lt;br /&gt;
* Contributor:  OWASP Testing Guide v4&lt;br /&gt;
* Contributor: OWASP Web Application Security Testing Cheat Sheet&lt;br /&gt;
* Contributor: OWASP Zed Attack Proxy Project&lt;br /&gt;
* Volunteer: OWASP Periodic Table of Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Media Interaction'''''&lt;br /&gt;
&lt;br /&gt;
*Appeared in 13 TV shows, some of which in the biggest news channels in the Middle East.&lt;br /&gt;
*Published +20 newspaper articles to increase the public awareness about Information Security.&lt;br /&gt;
&lt;br /&gt;
After my humble interaction with the Middle East media, I shifted my interest and focus to increase the Application Security awareness among business corporates and GCC governments. Please refer to Public Speaking for more information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Public Speaking'''''&lt;br /&gt;
*Speaker: IDC's IT Security Roadshow - Dubai&lt;br /&gt;
*Speaker: Application Security and OWASP  at i-safe – UAE&lt;br /&gt;
*Speaker: Ethical Hacking at the ‘Compliance and Beyond’ - Saudi.&lt;br /&gt;
*Speaker: Web Application Security at F5 - Saudi.&lt;br /&gt;
*Speaker: OWASP The Power of Code Review,  Netherlands&lt;br /&gt;
*Speaker: Web Application Security and OWASP top 10 at ISACA Jeddah – Saudi&lt;br /&gt;
*Speaker: Web App Critical Vulnerabilities and OWASP's ESAPI at The Cyber Information Security Summit - UAE&lt;br /&gt;
*Speaker: Information Security Awareness at Arabou University - Saudi.&lt;br /&gt;
*Speaker: Threat Modeling and Penetration test at IT for Government - UAE&lt;br /&gt;
*Speaker: Ethical Hacking and penetration testing at Microsoft Open Doors – Saudi.&lt;br /&gt;
*Speaker: Ethical Hacking and penetration testing at Microsoft Open Doors – Saudi.&lt;br /&gt;
*Speaker: OWASP Testing Guide at OWASP - Saudi.&lt;br /&gt;
&lt;br /&gt;
* Speaker: OWASP's introduction and projects at the open university - Saudi&lt;br /&gt;
&lt;br /&gt;
'''Get in touch with me. https://twitter.com/Amro_AlOlaqi LinkedIn: http://www.linkedin.com/in/iamro'''&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Identify_application_entry_points_(OTG-INFO-006)&amp;diff=162057</id>
		<title>Identify application entry points (OTG-INFO-006)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Identify_application_entry_points_(OTG-INFO-006)&amp;diff=162057"/>
				<updated>2013-10-30T21:27:29Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
Enumerating the application and its attack surface is a key precursor before any thorough testing can be undertaken, as it allows the tester to identify likely areas of weakness. This section aims to help identify and map out areas within the application that should be investigated once enumeration and mapping have been completed.&lt;br /&gt;
&lt;br /&gt;
== Test Objectives ==&lt;br /&gt;
&lt;br /&gt;
Understand how requests are formed and typical responses from the application&lt;br /&gt;
&lt;br /&gt;
== How to Test == &lt;br /&gt;
&lt;br /&gt;
Before any testing begins, always get a good understanding of the application and how the user/browser communicates with it.  As you walk through the application, pay special attention to all HTTP requests (GET and POST Methods, also known as Verbs), as well as every parameter and form field that is passed to the application.  In addition, pay attention to when GET requests are used and when POST requests are used to pass parameters to the application.  It is very common that GET requests are used, but when sensitive information is passed, it is often done within the body of a POST request.  Note that to see the parameters sent in a POST request, you will need to use a tool such as an intercepting proxy (for example, OWASP: [[OWASP_Zed_Attack_Proxy_Project| Zed Attack Proxy (ZAP)]]) or a browser plug-in.  Within the POST request, also make special note of any hidden form fields that are being passed to the application, as these usually contain sensitive information, such as state information, quantity of items, the price of items, that the developer never intended for you to see or change.  &lt;br /&gt;
&lt;br /&gt;
In the author's experience, it has been very useful to use an intercepting proxy and a spreadsheet for this stage of the testing.  The proxy will keep track of every request and response between you and the application as you walk through it.  Additionally, at this point, testers usually trap every request and response so that they can see exactly every header, parameter, etc. that is being passed to the application and what is being returned.  This can be quite tedious at times, especially on large interactive sites (think of a banking application). However, experience will teach you what to look for, and, therefore, this phase can be significantly reduced.  As you walk through the application, take note of any interesting parameters in the URL, custom headers, or body of the requests/responses, and save them in your spreadsheet.  The spreadsheet should include the page you requested (it might be good to also add the request number from the proxy, for future reference), the interesting parameters, the type of request (POST/GET), if access is authenticated/unauthenticated, if SSL is used, if it's part of a multi-step process, and any other relevant notes.  Once you have every area of the application mapped out, then you can go through the application and test each of the areas that you have identified and make notes for what worked and what didn't work.  The rest of this guide will identify how to test each of these areas of interest, but this section must be undertaken before any of the actual testing can commence.&lt;br /&gt;
&lt;br /&gt;
Below are some points of interests for all requests and responses.  Within the requests section, focus on the GET and POST methods, as these appear the majority of the requests.  Note that other methods, such as PUT and DELETE, can be used. Often, these more rare requests, if allowed, can expose vulnerabilities.  There is a special section in this guide dedicated for testing these HTTP methods.&lt;br /&gt;
&lt;br /&gt;
'''Requests:'''&lt;br /&gt;
* Identify where GETs are used and where POSTs are used.&lt;br /&gt;
* Identify all parameters used in a POST request (these are in the body of the request).&lt;br /&gt;
* Within the POST request, pay special attention to any hidden parameters.  When a POST is sent all the form fields (including hidden parameters) will be sent in the body of the HTTP message to the application.  These typically aren't seen unless you are using a proxy or view the HTML source code.  In addition, the next page you see, its data, and your access can all be different depending on the value of the hidden parameter(s).&lt;br /&gt;
* Identify all parameters used in a GET request (i.e., URL), in particular the query string (usually after a ? mark).&lt;br /&gt;
* Identify all the parameters of the query string. These usually are in a pair format, such as foo=bar. Also note that many parameters can be in one query string such as separated by a &amp;amp;, ~, :, or any other special character or encoding.&lt;br /&gt;
* A special note when it comes to identifying multiple parameters in one string or within a POST request is that some or all of the parameters will be needed to execute your attacks.  You need to identify all of the parameters (even if encoded or encrypted) and identify which ones are processed by the application.  Later sections of the guide will identify how to test these parameters. At this point, just make sure you identify each one of them.&lt;br /&gt;
* Also pay attention to any additional or custom type headers not typically seen (such as debug=False).&lt;br /&gt;
&lt;br /&gt;
'''Responses:'''&lt;br /&gt;
*Identify where new cookies are set (Set-Cookie header), modified, or added to.&lt;br /&gt;
*Identify where there are any redirects (300 HTTP status code), 400 status codes, in particular 403 Forbidden, and 500 internal server errors during normal responses (i.e., unmodified requests).&lt;br /&gt;
*Also note where any interesting headers are used. For example, &amp;quot;Server: BIG-IP&amp;quot; indicates that the site is load balanced. Thus, if a site is load balanced and one server is incorrectly configured, then you might have to make multiple requests to access the vulnerable server, depending on the type of load balancing used.&lt;br /&gt;
&lt;br /&gt;
=== Black Box testing and example ===&lt;br /&gt;
'''Testing for application entry points:''' &amp;lt;br&amp;gt;&lt;br /&gt;
The following are two examples on how to check for application entry points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====EXAMPLE 1====&lt;br /&gt;
This example shows a GET request that would purchase an item from an online shopping application.&lt;br /&gt;
&lt;br /&gt;
 GET https://x.x.x.x/shoppingApp/buyme.asp?CUSTOMERID=100&amp;amp;ITEM=z101a&amp;amp;PRICE=62.50&amp;amp;IP=x.x.x.x &lt;br /&gt;
 Host: x.x.x.x&lt;br /&gt;
 Cookie: SESSIONID=Z29vZCBqb2IgcGFkYXdhIG15IHVzZXJuYW1lIGlzIGZvbyBhbmQgcGFzc3dvcmQgaXMgYmFy&lt;br /&gt;
&lt;br /&gt;
'''Result Expected:'''&lt;br /&gt;
&lt;br /&gt;
Here you would note all the parameters of the request such as CUSTOMERID, ITEM, PRICE, IP, and the Cookie (which could just be encoded parameters or used for session state).&lt;br /&gt;
&lt;br /&gt;
====EXAMPLE 2====&lt;br /&gt;
This example shows a POST request that would log you into an application.&lt;br /&gt;
&lt;br /&gt;
 POST https://x.x.x.x/KevinNotSoGoodApp/authenticate.asp?service=login&lt;br /&gt;
 Host: x.x.x.x&lt;br /&gt;
 Cookie: SESSIONID=dGhpcyBpcyBhIGJhZCBhcHAgdGhhdCBzZXRzIHByZWRpY3RhYmxlIGNvb2tpZXMgYW5kIG1pbmUgaXMgMTIzNA==&lt;br /&gt;
 CustomCookie=00my00trusted00ip00is00x.x.x.x00&lt;br /&gt;
&lt;br /&gt;
Body of the POST message:&lt;br /&gt;
&lt;br /&gt;
 user=admin&amp;amp;pass=pass123&amp;amp;debug=true&amp;amp;fromtrustIP=true&lt;br /&gt;
&lt;br /&gt;
'''Result Expected:'''&lt;br /&gt;
&lt;br /&gt;
In this example you would note all the parameters as you have before but notice that the parameters are passed in the body of the message and not in the URL.  Additionally, note that there is a custom cookie that is being used.&lt;br /&gt;
&lt;br /&gt;
=== Gray Box testing and example === &lt;br /&gt;
&lt;br /&gt;
Testing for application entry points via a Gray Box methodology would consist of everything already identified above with one caveat.  This would be if there are any external sources from which the application receives data and processes it (such as SNMP traps, syslog messages, SMTP, or SOAP messages from other servers).  If there are any external sources of input into the application then a meeting with the application developers could identify any functions that would accept or expect user input and how it's formatted.  For example, the developer could help in understanding how to formulate a correct SOAP request that the application would accept and where the web service resides (if the web service or any other function hasn't already been identified during the black box testing).&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
&lt;br /&gt;
'''Intercepting Proxy:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*OWASP: [[OWASP_Zed_Attack_Proxy_Project| Zed Attack Proxy (ZAP)]]&lt;br /&gt;
*OWASP: [[OWASP_WebScarab_Project| WebScarab]]&lt;br /&gt;
* [http://www.portswigger.net/burp/ Burp Suite]&lt;br /&gt;
* [http://www.contextis.com/research/tools/cat/ CAT]&lt;br /&gt;
&lt;br /&gt;
'''Browser Plug-in:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[http://www.bayden.com/TamperIE/ TamperIE for Internet Explorer]&lt;br /&gt;
*[https://addons.mozilla.org/en-US/firefox/addon/966 Tamper Data for Firefox]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*RFC 2616 – Hypertext Transfer Protocol – HTTP 1.1 -&lt;br /&gt;
http://tools.ietf.org/html/rfc2616&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Identify_application_entry_points_(OTG-INFO-006)&amp;diff=162056</id>
		<title>Identify application entry points (OTG-INFO-006)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Identify_application_entry_points_(OTG-INFO-006)&amp;diff=162056"/>
				<updated>2013-10-30T21:21:10Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
Enumerating the application and its attack surface is a key precursor before any thorough testing can be undertaken, as it allows the tester to identify likely areas of weakness. This section aims to help identify and map out areas within the application that should be investigated once enumeration and mapping have been completed.&lt;br /&gt;
&lt;br /&gt;
== Test Objectives ==&lt;br /&gt;
&lt;br /&gt;
Understand how requests are formed and typical responses from the application&lt;br /&gt;
&lt;br /&gt;
== How to Test == &lt;br /&gt;
&lt;br /&gt;
Before any testing begins, always get a good understanding of the application and how the user/browser communicates with it.  As you walk through the application, pay special attention to all HTTP requests (GET and POST Methods, also known as Verbs), as well as every parameter and form field that is passed to the application.  In addition, pay attention to when GET requests are used and when POST requests are used to pass parameters to the application.  It is very common that GET requests are used, but when sensitive information is passed, it is often done within the body of a POST request.  Note that to see the parameters sent in a POST request, you will need to use a tool such as an intercepting proxy (for example, [[OWASP WebScarab Project|OWASP's WebScarab]]) or a browser plug-in.  Within the POST request, also make special note of any hidden form fields that are being passed to the application, as these usually contain sensitive information, such as state information, quantity of items, the price of items, that the developer never intended for you to see or change.  &lt;br /&gt;
&lt;br /&gt;
In the author's experience, it has been very useful to use an intercepting proxy and a spreadsheet for this stage of the testing.  The proxy will keep track of every request and response between you and the application as you walk through it.  Additionally, at this point, testers usually trap every request and response so that they can see exactly every header, parameter, etc. that is being passed to the application and what is being returned.  This can be quite tedious at times, especially on large interactive sites (think of a banking application). However, experience will teach you what to look for, and, therefore, this phase can be significantly reduced.  As you walk through the application, take note of any interesting parameters in the URL, custom headers, or body of the requests/responses, and save them in your spreadsheet.  The spreadsheet should include the page you requested (it might be good to also add the request number from the proxy, for future reference), the interesting parameters, the type of request (POST/GET), if access is authenticated/unauthenticated, if SSL is used, if it's part of a multi-step process, and any other relevant notes.  Once you have every area of the application mapped out, then you can go through the application and test each of the areas that you have identified and make notes for what worked and what didn't work.  The rest of this guide will identify how to test each of these areas of interest, but this section must be undertaken before any of the actual testing can commence.&lt;br /&gt;
&lt;br /&gt;
Below are some points of interests for all requests and responses.  Within the requests section, focus on the GET and POST methods, as these appear the majority of the requests.  Note that other methods, such as PUT and DELETE, can be used. Often, these more rare requests, if allowed, can expose vulnerabilities.  There is a special section in this guide dedicated for testing these HTTP methods.&lt;br /&gt;
&lt;br /&gt;
'''Requests:'''&lt;br /&gt;
* Identify where GETs are used and where POSTs are used.&lt;br /&gt;
* Identify all parameters used in a POST request (these are in the body of the request).&lt;br /&gt;
* Within the POST request, pay special attention to any hidden parameters.  When a POST is sent all the form fields (including hidden parameters) will be sent in the body of the HTTP message to the application.  These typically aren't seen unless you are using a proxy or view the HTML source code.  In addition, the next page you see, its data, and your access can all be different depending on the value of the hidden parameter(s).&lt;br /&gt;
* Identify all parameters used in a GET request (i.e., URL), in particular the query string (usually after a ? mark).&lt;br /&gt;
* Identify all the parameters of the query string. These usually are in a pair format, such as foo=bar. Also note that many parameters can be in one query string such as separated by a &amp;amp;, ~, :, or any other special character or encoding.&lt;br /&gt;
* A special note when it comes to identifying multiple parameters in one string or within a POST request is that some or all of the parameters will be needed to execute your attacks.  You need to identify all of the parameters (even if encoded or encrypted) and identify which ones are processed by the application.  Later sections of the guide will identify how to test these parameters. At this point, just make sure you identify each one of them.&lt;br /&gt;
* Also pay attention to any additional or custom type headers not typically seen (such as debug=False).&lt;br /&gt;
&lt;br /&gt;
'''Responses:'''&lt;br /&gt;
*Identify where new cookies are set (Set-Cookie header), modified, or added to.&lt;br /&gt;
*Identify where there are any redirects (300 HTTP status code), 400 status codes, in particular 403 Forbidden, and 500 internal server errors during normal responses (i.e., unmodified requests).&lt;br /&gt;
*Also note where any interesting headers are used. For example, &amp;quot;Server: BIG-IP&amp;quot; indicates that the site is load balanced. Thus, if a site is load balanced and one server is incorrectly configured, then you might have to make multiple requests to access the vulnerable server, depending on the type of load balancing used.&lt;br /&gt;
&lt;br /&gt;
=== Black Box testing and example ===&lt;br /&gt;
'''Testing for application entry points:''' &amp;lt;br&amp;gt;&lt;br /&gt;
The following are two examples on how to check for application entry points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====EXAMPLE 1====&lt;br /&gt;
This example shows a GET request that would purchase an item from an online shopping application.&lt;br /&gt;
&lt;br /&gt;
 GET https://x.x.x.x/shoppingApp/buyme.asp?CUSTOMERID=100&amp;amp;ITEM=z101a&amp;amp;PRICE=62.50&amp;amp;IP=x.x.x.x &lt;br /&gt;
 Host: x.x.x.x&lt;br /&gt;
 Cookie: SESSIONID=Z29vZCBqb2IgcGFkYXdhIG15IHVzZXJuYW1lIGlzIGZvbyBhbmQgcGFzc3dvcmQgaXMgYmFy&lt;br /&gt;
&lt;br /&gt;
'''Result Expected:'''&lt;br /&gt;
&lt;br /&gt;
Here you would note all the parameters of the request such as CUSTOMERID, ITEM, PRICE, IP, and the Cookie (which could just be encoded parameters or used for session state).&lt;br /&gt;
&lt;br /&gt;
====EXAMPLE 2====&lt;br /&gt;
This example shows a POST request that would log you into an application.&lt;br /&gt;
&lt;br /&gt;
 POST https://x.x.x.x/KevinNotSoGoodApp/authenticate.asp?service=login&lt;br /&gt;
 Host: x.x.x.x&lt;br /&gt;
 Cookie: SESSIONID=dGhpcyBpcyBhIGJhZCBhcHAgdGhhdCBzZXRzIHByZWRpY3RhYmxlIGNvb2tpZXMgYW5kIG1pbmUgaXMgMTIzNA==&lt;br /&gt;
 CustomCookie=00my00trusted00ip00is00x.x.x.x00&lt;br /&gt;
&lt;br /&gt;
Body of the POST message:&lt;br /&gt;
&lt;br /&gt;
 user=admin&amp;amp;pass=pass123&amp;amp;debug=true&amp;amp;fromtrustIP=true&lt;br /&gt;
&lt;br /&gt;
'''Result Expected:'''&lt;br /&gt;
&lt;br /&gt;
In this example you would note all the parameters as you have before but notice that the parameters are passed in the body of the message and not in the URL.  Additionally, note that there is a custom cookie that is being used.&lt;br /&gt;
&lt;br /&gt;
=== Gray Box testing and example === &lt;br /&gt;
&lt;br /&gt;
Testing for application entry points via a Gray Box methodology would consist of everything already identified above with one caveat.  This would be if there are any external sources from which the application receives data and processes it (such as SNMP traps, syslog messages, SMTP, or SOAP messages from other servers).  If there are any external sources of input into the application then a meeting with the application developers could identify any functions that would accept or expect user input and how it's formatted.  For example, the developer could help in understanding how to formulate a correct SOAP request that the application would accept and where the web service resides (if the web service or any other function hasn't already been identified during the black box testing).&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
&lt;br /&gt;
'''Intercepting Proxy:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*OWASP: [[OWASP_Zed_Attack_Proxy_Project| Zed Attack Proxy (ZAP)]]&lt;br /&gt;
* [http://www.portswigger.net/burp/ Burp Suite]&lt;br /&gt;
* [http://www.contextis.com/research/tools/cat/ CAT]&lt;br /&gt;
&lt;br /&gt;
'''Browser Plug-in:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[http://www.bayden.com/TamperIE/ TamperIE for Internet Explorer]&lt;br /&gt;
*[https://addons.mozilla.org/en-US/firefox/addon/966 Tamper Data for Firefox]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*RFC 2616 – Hypertext Transfer Protocol – HTTP 1.1 -&lt;br /&gt;
http://tools.ietf.org/html/rfc2616&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Map_execution_paths_through_application_(OTG-INFO-007)&amp;diff=161860</id>
		<title>Map execution paths through application (OTG-INFO-007)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Map_execution_paths_through_application_(OTG-INFO-007)&amp;diff=161860"/>
				<updated>2013-10-28T08:36:35Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
&lt;br /&gt;
Before commencing security testing, understanding the structure of the application is paramount. Without a thorough understanding of the layout of the application, it is unlkely that it will be tested thoroughly.  &lt;br /&gt;
&lt;br /&gt;
== Test Objectives ==&lt;br /&gt;
&lt;br /&gt;
== How to Test ==&lt;br /&gt;
&lt;br /&gt;
In black box testing it is extremely difficult to test the entire code base. Not just because the tester has no view of the code paths through the application, but even if they did, to test all code paths would be very time consuming. One way to reconcile this is to document what code paths were discovered and tested. &lt;br /&gt;
&lt;br /&gt;
There are several ways to approach the testing and measurement of code coverage:&lt;br /&gt;
&lt;br /&gt;
* '''Path''' - test each of the paths through an application which includes combinatorial and boundary value analysis testing for each decision path. While this approach offers thoroughness, the number of testable paths grows exponentially with each decision branch.&lt;br /&gt;
* '''Data flow (or taint analysis)''' - tests the assignment of variables via external interaction (normally users). Focuses on mapping the flow, transformation and use of data throughout an application.&lt;br /&gt;
* '''Race''' - tests multiple concurrent instances of the application manipulating the same data.&lt;br /&gt;
&lt;br /&gt;
The trade off as to what method is used and to what degree each method is used should be negotiated with the application owner. Simpler approaches could also be adopted, including asking the application owner what functions or code sections they are particularly concerned about and how those code segments can be reached.&lt;br /&gt;
&lt;br /&gt;
''' Black Box testing '''&lt;br /&gt;
&lt;br /&gt;
The demonstrate code coverage to the application owner the tester can start with a spreadsheet and documenting the links discovered by spidering the application (either manually or automatically). Then the tester can being looking more closely at decision points in the application and investigating how many significant code paths are discovered, documenting them in the spreadsheet with URLs, prose and screenshot descriptions of the paths discovered.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Gray/White Box testing ''' &lt;br /&gt;
&lt;br /&gt;
Ensuring sufficient code coverage for the application owner is far easier with the gray and white box approach to testing. Information solicited by and provided to the tester will ensure the minimum requirements for code coverage are met. &lt;br /&gt;
&lt;br /&gt;
=== Example ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Automatic Spidering '''&lt;br /&gt;
&lt;br /&gt;
The automatic spider is a tool than is used to automatically discover new resources (URLs) on a particular Site. It begins with a list of URLs to visit, called the seeds, which depends on how the Spider is started. While there are a lot of Spidering tools, we will use the [https://code.google.com/p/zaproxy/ Zed Attack Proxy (ZAP)] in the following example &lt;br /&gt;
&lt;br /&gt;
 [[File:OWASPZAPSP.png |1050px|]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://code.google.com/p/zaproxy/ ZAP] offers the following automatic spidering features, which can be selected based on the tester needs&lt;br /&gt;
&lt;br /&gt;
*Spider Site - The seed list contains all the existing URIs already found for the selected site.&lt;br /&gt;
*Spider Subtree - The seed list contains all the existing URIs already found and present in the subtree of the selected node.&lt;br /&gt;
*Spider URL - The seed list contains only the URI corresponding to the selected node (in the Site Tree).&lt;br /&gt;
*Spider all in Scope - The seed list contains all the URIs the user has selected as being 'In Scope'.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
&lt;br /&gt;
* [https://code.google.com/p/zaproxy/ Zed Attack Proxy (ZAP)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/List_of_spreadsheet_software List of spreadsheet software]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Diagramming_software Diagramming software]&lt;br /&gt;
&lt;br /&gt;
== Vulnerability References ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Whitepapers'''&lt;br /&gt;
&lt;br /&gt;
[1] http://en.wikipedia.org/wiki/Code_coverage&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Remediation ==&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Map_execution_paths_through_application_(OTG-INFO-007)&amp;diff=161857</id>
		<title>Map execution paths through application (OTG-INFO-007)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Map_execution_paths_through_application_(OTG-INFO-007)&amp;diff=161857"/>
				<updated>2013-10-28T08:06:21Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
&lt;br /&gt;
Before commencing security testing, understanding the structure of the application is paramount. Without a thorough understanding of the layout of the application, it is unlkely that it will be tested thoroughly.  &lt;br /&gt;
&lt;br /&gt;
== Test Objectives ==&lt;br /&gt;
&lt;br /&gt;
== How to Test ==&lt;br /&gt;
&lt;br /&gt;
In black box testing it is extremely difficult to test the entire code base. Not just because the tester has no view of the code paths through the application, but even if they did, to test all code paths would be very time consuming. One way to reconcile this is to document what code paths were discovered and tested. &lt;br /&gt;
&lt;br /&gt;
There are several ways to approach the testing and measurement of code coverage:&lt;br /&gt;
&lt;br /&gt;
* '''Path''' - test each of the paths through an application which includes combinatorial and boundary value analysis testing for each decision path. While this approach offers thoroughness, the number of testable paths grows exponentially with each decision branch.&lt;br /&gt;
* '''Data flow (or taint analysis)''' - tests the assignment of variables via external interaction (normally users). Focuses on mapping the flow, transformation and use of data throughout an application.&lt;br /&gt;
* '''Race''' - tests multiple concurrent instances of the application manipulating the same data.&lt;br /&gt;
&lt;br /&gt;
The trade off as to what method is used and to what degree each method is used should be negotiated with the application owner. Simpler approaches could also be adopted, including asking the application owner what functions or code sections they are particularly concerned about and how those code segments can be reached.&lt;br /&gt;
&lt;br /&gt;
''' Black Box testing '''&lt;br /&gt;
&lt;br /&gt;
The demonstrate code coverage to the application owner the tester can start with a spreadsheet and documenting the links discovered by spidering the application (either manually or automatically). Then the tester can being looking more closely at decision points in the application and investigating how many significant code paths are discovered, documenting them in the spreadsheet with URLs, prose and screenshot descriptions of the paths discovered.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Gray/White Box testing ''' &lt;br /&gt;
&lt;br /&gt;
Ensuring sufficient code coverage for the application owner is far easier with the gray and white box approach to testing. Information solicited by and provided to the tester will ensure the minimum requirements for code coverage are met. &lt;br /&gt;
&lt;br /&gt;
=== Example ===&lt;br /&gt;
&lt;br /&gt;
''' Automatic Spidering '''&lt;br /&gt;
&lt;br /&gt;
The automatic spider is a tool than is used to automatically discover new resources (URLs) on a particular Site. It begins with a list of URLs to visit, called the seeds, which depends on how the Spider is started. While there are a lot of Spidering tools, we will use the Zed Attack Proxy (ZAP) in the below screenshot&lt;br /&gt;
&lt;br /&gt;
 [[File:OWASPZAPSP.png |1050px|]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
ZAP offers the following automatic spidering features, which can be selected based on the tester needs&lt;br /&gt;
&lt;br /&gt;
*Spider Site - The seed list contains all the existing URIs already found for the selected site.&lt;br /&gt;
*Spider Subtree - The seed list contains all the existing URIs already found and present in the subtree of the selected node.&lt;br /&gt;
*Spider URL - The seed list contains only the URI corresponding to the selected node (in the Site Tree).&lt;br /&gt;
*Spider all in Scope - The seed list contains all the URIs the user has selected as being 'In Scope'.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
&lt;br /&gt;
* Spidering (either manual or software assisted)&lt;br /&gt;
&lt;br /&gt;
* Spreadsheet software&lt;br /&gt;
&lt;br /&gt;
* Screenshot software&lt;br /&gt;
&lt;br /&gt;
* Diagramming software&lt;br /&gt;
&lt;br /&gt;
== Vulnerability References ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Whitepapers'''&lt;br /&gt;
&lt;br /&gt;
[1] http://en.wikipedia.org/wiki/Code_coverage&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Remediation ==&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPZAPSP.png&amp;diff=161855</id>
		<title>File:OWASPZAPSP.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPZAPSP.png&amp;diff=161855"/>
				<updated>2013-10-28T07:05:37Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Amro_Ahmed&amp;diff=161284</id>
		<title>User:Amro Ahmed</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Amro_Ahmed&amp;diff=161284"/>
				<updated>2013-10-22T12:07:24Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Amro AlOlaqi joined OWASP back in 2008. ( My old user account: https://www.owasp.org/index.php/User:Amro )&lt;br /&gt;
&lt;br /&gt;
Amro currently works as a Sr. Consultant at Verizon (Threat &amp;amp; Vulnerability). Prior joining Verizon, Amro worked for BAE Systems, Saudi Aramco, IS, and Red Hat, he has more than 8 years of experience in Information security. He started his professional career at early age, since then, he engaged the field of UNIX/Linux engineering and systems’ security.  He carried out penetration tests, application , vulnerability assessments and security audits for prestigious organizations. Moreover, his expertise extends across industry verticals, security technologies plus hacking tools and techniques. Amro hold well-recognized international certifications such as CISSP, GCIH, GHTQ, LPT, CEH, CHFI, RHCE, SCSA, Linux+, LPIC1/2 SCSECA, and Certified ISO 27001 LA/LI&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''OWASP Involvement''''' &lt;br /&gt;
* Chapter leader: Saudi Arabia &lt;br /&gt;
* Chapter leader: Untied Arab Emirates &lt;br /&gt;
* Contributor:  OWASP Testing Guide v4&lt;br /&gt;
* Contributor: OWASP Web Application Security Testing Cheat Sheet&lt;br /&gt;
* Contributor: OWASP Zed Attack Proxy Project&lt;br /&gt;
* Volunteer: OWASP Periodic Table of Vulnerabilities&lt;br /&gt;
* Volunteer: OWASP AppSec USA 2013.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Media Interaction'''''&lt;br /&gt;
&lt;br /&gt;
*Appeared in 13 TV shows, some of which in the biggest news channels in the Middle East.&lt;br /&gt;
*Published +20 newspaper articles to increase the public awareness about Information Security.&lt;br /&gt;
&lt;br /&gt;
After my humble interaction with the Middle East media, I shifted my interest and focus to increase the Application Security awareness among business corporates and GCC governments. Please refer to Public Speaking for more information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Public Speaking'''''&lt;br /&gt;
*Speaker: IDC's IT Security Roadshow - Dubai&lt;br /&gt;
*Speaker: Application Security and OWASP  at i-safe – UAE&lt;br /&gt;
*Speaker: Ethical Hacking at the ‘Compliance and Beyond’ - Saudi.&lt;br /&gt;
*Speaker: Web Application Security at F5 - Saudi.&lt;br /&gt;
*Speaker: OWASP The Power of Code Review,  Netherlands&lt;br /&gt;
*Speaker: Web Application Security and OWASP top 10 at ISACA Jeddah – Saudi&lt;br /&gt;
*Speaker: Web App Critical Vulnerabilities and OWASP's ESAPI at The Cyber Information Security Summit - UAE&lt;br /&gt;
*Speaker: Information Security Awareness at Arabou University - Saudi.&lt;br /&gt;
*Speaker: Threat Modeling and Penetration test at IT for Government - UAE&lt;br /&gt;
*Speaker: Ethical Hacking and penetration testing at Microsoft Open Doors – Saudi.&lt;br /&gt;
*Speaker: Ethical Hacking and penetration testing at Microsoft Open Doors – Saudi.&lt;br /&gt;
*Speaker: OWASP Testing Guide at OWASP - Saudi.&lt;br /&gt;
&lt;br /&gt;
* Speaker: OWASP's introduction and projects at the open university - Saudi&lt;br /&gt;
&lt;br /&gt;
'''Get in touch with me. https://twitter.com/Amro_AlOlaqi LinkedIn: http://www.linkedin.com/in/iamro'''&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=161250</id>
		<title>OWASP Testing Guide v4 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=161250"/>
				<updated>2013-10-21T21:44:43Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{OWASP Breakers}}&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
'''This is the DRAFT of the table of content of the New Testing Guide v4.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;You can download the stable version v3 [http://www.owasp.org/images/5/56/OWASP_Testing_Guide_v3.pdf here] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Back to the OWASP Testing Guide Project:&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Testing_Project&lt;br /&gt;
&lt;br /&gt;
'''Updated: 15th February 2013'''&lt;br /&gt;
&lt;br /&gt;
[[ OWTGv4 Contributors list|'''Contributors List]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following is a DRAFT of the Toc based on the feedback already received.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Foreword|Foreword by Eoin Keary]]== &lt;br /&gt;
[To review--&amp;gt; Eoin Keary -&amp;gt; Done!!]&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Frontispiece |1. Frontispiece]]== &lt;br /&gt;
[To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[Testing Guide Frontispiece|1.1 About the OWASP Testing Guide Project]]''' &lt;br /&gt;
[To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[About The Open Web Application Security Project|1.2 About The Open Web Application Security Project]]''' &lt;br /&gt;
[To review--&amp;gt; ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Introduction|2. Introduction]]==&lt;br /&gt;
&lt;br /&gt;
'''2.1 The OWASP Testing Project'''&lt;br /&gt;
&lt;br /&gt;
'''2.2 Principles of Testing'''&lt;br /&gt;
&lt;br /&gt;
'''2.3 Testing Techniques Explained''' &lt;br /&gt;
&lt;br /&gt;
2.4 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Requirements_Test_Derivation Security requirements test derivation],[https://www.owasp.org/index.php/Testing_Guide_Introduction#Functional_and_Non_Functional_Test_Requirements functional and non functional test requirements], and [https://www.owasp.org/index.php/Testing_Guide_Introduction#Test_Cases_Through_Use_and_Misuse_Cases test cases through use and misuse cases]&lt;br /&gt;
&lt;br /&gt;
2.5 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Test_Data_Analysis_and_Reporting Security test data analysis and reporting: root cause identification and business/role case test data reporting]&lt;br /&gt;
&lt;br /&gt;
==[[The OWASP Testing Framework|3. The OWASP Testing Framework]]==&lt;br /&gt;
&lt;br /&gt;
'''3.1. Overview'''&lt;br /&gt;
&lt;br /&gt;
'''3.2. Phase 1: Before Development Begins '''&lt;br /&gt;
&lt;br /&gt;
'''3.3. Phase 2: During Definition and Design'''&lt;br /&gt;
&lt;br /&gt;
'''3.4. Phase 3: During Development'''&lt;br /&gt;
&lt;br /&gt;
'''3.5. Phase 4: During Deployment'''&lt;br /&gt;
&lt;br /&gt;
'''3.6. Phase 5: Maintenance and Operations'''&lt;br /&gt;
&lt;br /&gt;
'''3.7. A Typical SDLC Testing Workflow '''&lt;br /&gt;
&lt;br /&gt;
==[[Web Application Penetration Testing |4. Web Application Penetration Testing ]]==&lt;br /&gt;
&lt;br /&gt;
[[Testing: Introduction and objectives|'''4.1 Introduction and Objectives''']] [To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
[[Testing Checklist| 4.1.1 Testing Checklist]] [To review at the end of brainstorming --&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing Information Gathering|'''4.2 Information Gathering ''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing: Search engine discovery/reconnaissance (OWASP-IG-002)|4.2.1 Conduct Search Engine Discovery and Reconnaissance for Information Leakage (OTG-INFO-001) ]] formerly &amp;quot;Search Engine Discovery/Reconnaissance (OWASP-IG-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Fingerprint Web Server (OTG-INFO-002)|4.2.2 Fingerprint Web Server (OTG-INFO-002) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing: Spiders, Robots, and Crawlers (OWASP-IG-001)|4.2.3 Review Webserver Metafiles for Information Leakage (OTG-INFO-003) ]] formerly &amp;quot;Spiders, Robots and Crawlers (OWASP-IG-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Application Discovery (OWASP-IG-005)|4.2.4 Enumerate Applications on Webserver (OTG-INFO-004) ]] formerly &amp;quot;Application Discovery (OWASP-IG-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Review webpage comments and metadata(OWASP-IG-007)|4.2.5 Review Webpage Comments and Metadata for Information Leakage (OTG-INFO-005) ]] formerly &amp;quot;Review webpage comments and metadata(OWASP-IG-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing: Identify application entry points (OWASP-IG-003)|4.2.6 Identify application entry points (OTG-INFO-006) ]] formerly &amp;quot;Identify application entry points (OWASP-IG-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Identify application exit/handover points (OWASP-IG-008)|4.2.7 Identify application exit/handover points (OTG-INFO-007) ]] formerly &amp;quot;Identify application exit/handover points (OWASP-IG-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Map execution paths through application (OWASP-IG-009)|4.2.8 Map execution paths through application (OTG-INFO-008)]] formerly &amp;quot;Map execution paths through application (OWASP-IG-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Fingerprint Web Application Framework (OTG-INFO-009)|4.2.9 Fingerprint Web Application Framework (OTG-INFO-009) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-010)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Web Application (OTG-INFO-011)|4.2.10 Fingerprint Web Application (OTG-INFO-010) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-010)&amp;quot; [Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[Map Network and Application Architecture (OTG-INFO-012)|4.2.11 Map Network and Application Architecture (OTG-INFO-011) ]] formerly &amp;quot;Testing for Infrastructure Configuration Management Testing weakness (OWASP-CM-001)&amp;quot; [Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for configuration management|'''4.3 Configuration and Deploy Management Testing ''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for infrastructure configuration management (OWASP-CM-003)|4.3.1 Test Network/Infrastructure Configuration (OTG-CONFIG-001) ]] formerly &amp;quot;Testing for Infrastructure Configuration Management Testing weakness (OWASP-CM-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for application configuration management (OWASP-CM-004)|4.3.2 Test Application Platform Configuration (OTG-CONFIG-002) ]] formerly &amp;quot;Testing for Application Configuration Management weakness (OWASP-CM-002)&amp;quot;  [Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[Testing for file extensions handling  (OWASP-CM-005)|4.3.3 Test File Extensions Handling for Sensitive Information (OTG-CONFIG-003) ]] formerly &amp;quot;Testing for File Extensions Handling  (OWASP-CM-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Old, Backup and Unreferenced Files (OWASP-CM-006)|4.3.4 Review Old, Backup and Unreferenced Files for Sensitive Information (OTG-CONFIG-004) ]] formerly &amp;quot;Old, Backup and Unreferenced Files (OWASP-CM-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Admin Interfaces  (OWASP-CM-007)|4.3.5 Enumerate Infrastructure and Application Admin Interfaces (OTG-CONFIG-005) ]] formerly &amp;quot;Infrastructure and Application Admin Interfaces  (OWASP-CM-005)&amp;quot; [Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Methods and XST  (OWASP-CM-008)|4.3.6 Test HTTP Methods (OTG-CONFIG-006) ]] formerly &amp;quot;Testing for Bad HTTP Methods (OWASP-CM-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Database credentials/connection strings available|4.3.7 Testing for Database credentials/connection strings available (OTG-CONFIG-007) ]] formerly &amp;quot;Testing for Database credentials/connection strings available (OWASP-CM-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Content Security Policy weakness|4.3.8 Test Content Security Policy (OTG-CONFIG-008) ]] formerly &amp;quot;Testing for Content Security Policy weakness (OWASP-CM-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Missing HSTS header|4.3.9 Test HTTP Strict Transport Security (OTG-CONFIG-009) ]] formerly &amp;quot;Testing for Missing HSTS header (OWASP-CM-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Frame Options|4.3.10 Test Frame Options (OTG-CONFIG-010) ]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for RIA policy files weakness|4.3.11 Test RIA cross domain policy (OTG-CONFIG-011) ]] formerly &amp;quot;Testing for RIA policy files weakness (OWASP-CM-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Content Type Options|4.3.12 Test Content Type Options (OTG-CONFIG-012) ]] new&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing Identity Management|'''4.4 Identity Management Testing''']]&lt;br /&gt;
&lt;br /&gt;
[[Test Role Definitions (OTG-IDENT-001)|4.4.1 Test Role Definitions (OTG-IDENT-001)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test User Registration Process (OTG-IDENT-002)|4.4.2 Test User Registration Process (OTG-IDENT-002)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Provisioning Process (OTG-IDENT-003)|4.4.3 Test Account Provisioning Process (OTG-IDENT-003)]] New&lt;br /&gt;
&lt;br /&gt;
[[Testing for Account Enumeration and Guessable User Account (OWASP-AT-002)|4.4.4 Testing for Account Enumeration and Guessable User Account (OTG-IDENT-004) ]] formerly &amp;quot;Testing for Account Enumeration and Guessable User Account (OWASP-AT-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak or unenforced username policy (OWASP-AT-009)| 4.4.5 Testing for Weak or unenforced username policy (OTG-IDENT-005)]] formerly &amp;quot;Testing for Weak or unenforced username policy (OWASP-AT-009)&lt;br /&gt;
&lt;br /&gt;
[[Test Permissions of Guest/Training Accounts (OTG-IDENT-006)|4.4.6 Test Permissions of Guest/Training Accounts (OTG-IDENT-006)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Suspension/Resumption Process (OTG-IDENT-007)|4.4.7 Test Account Suspension/Resumption Process (OTG-IDENT-007)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test User Deregistration Process (OTG-IDENT-008)|4.4.8 Test User Deregistration Process (OTG-IDENT-008)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Deregistration Process (OTG-IDENT-009)|4.4.9 Test Account Deregistration Process (OTG-IDENT-009)]] New&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for authentication|'''4.5 Authentication Testing ''']] &lt;br /&gt;
&lt;br /&gt;
[[Testing for Credentials Transported over an Encrypted Channel (OWASP-AT-001)|4.5.1 Testing for Credentials Transported over an Encrypted Channel  (OTG-AUTHN-001)]] formerly &amp;quot;Testing for Credentials Transported over an Encrypted Channel  (OWASP-AT-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for default credentials (OWASP-AT-003)|4.5.2 Testing for default credentials (OTG-AUTHN-002)]] formerly &amp;quot;Testing for default credentials (OWASP-AT-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak lock out mechanism (OWASP-AT-004)|4.5.3 Testing for Weak lock out mechanism (OTG-AUTHN-003)]] formerly &amp;quot;Testing for Weak lock out mechanism (OWASP-AT-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Bypassing Authentication Schema (OWASP-AT-005)|4.5.4 Testing for bypassing authentication schema (OTG-AUTHN-004)]] formerly &amp;quot;Testing for bypassing authentication schema (OWASP-AT-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Vulnerable Remember Password (OWASP-AT-006)|4.5.5 Test remember password functionality (OTG-AUTHN-005)]] formerly &amp;quot;Testing for vulnerable remember password functionality (OWASP-AT-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Browser cache weakness (OWASP-AT-007)|4.5.6 Testing for Browser cache weakness (OTG-AUTHN-006)]] formerly &amp;quot;Testing for Browser cache weakness (OWASP-AT-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak password policy (OWASP-AT-008)|4.5.7 Testing for Weak password policy (OTG-AUTHN-007)]] formerly &amp;quot;Testing for Weak password policy (OWASP-AT-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak security question/answer (OTG-AUTHN-008)|4.5.8 Testing for Weak security question/answer (OTG-AUTHN-008)]] New! - Robert Winkel&lt;br /&gt;
&lt;br /&gt;
[[Testing for weak password change or reset functionalities (OWASP-AT-011)|4.5.9 Testing for weak password change or reset functionalities (OTG-AUTHN-009)]] formerly &amp;quot;Testing for weak password change or reset functionalities (OWASP-AT-011)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weaker authentication in alternative channel (OTG-AUTHN-010)|4.5.10 Testing for Weaker authentication in alternative channel (OTG-AUTHN-010)]] (e.g. mobile app, IVR, help desk)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Authorization|'''4.6 Authorization Testing''']] &lt;br /&gt;
&lt;br /&gt;
[[Test Management of Account Permissions (OTG-AUTHZ-001)|4.6.1 Test Management of Account Permissions (OTG-AUTHZ-001)]] New&lt;br /&gt;
&lt;br /&gt;
[[Testing for Path Traversal  (OWASP-AZ-001)|4.6.2 Testing Directory traversal/file include (OTG-AUTHZ-002)]] formerly &amp;quot;Testing Directory traversal/file include (OWASP-AZ-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Bypassing Authorization Schema  (OWASP-AZ-002)|4.6.3 Testing for bypassing authorization schema (OTG-AUTHZ-003)]] formerly &amp;quot;Testing for bypassing authorization schema  (OWASP-AZ-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Privilege escalation  (OWASP-AZ-003)|4.6.4 Testing for Privilege Escalation (OTG-AUTHZ-004)]] formerly &amp;quot;Testing for Privilege Escalation  (OWASP-AZ-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure Direct Object References (OWASP-AZ-004)|4.6.5 Testing for Insecure Direct Object References (OTG-AUTHZ-005)]] formerly &amp;quot;Testing for Insecure Direct Object References (OWASP-AZ-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Failure to Restrict access to authorized resource (OWASP-AZ-005)|4.6.6 Testing for Failure to Restrict access to authorized resource (OTG-AUTHZ-006)]] formerly &amp;quot;Testing for Failure to Restrict access to authorized resource (OWASP-AZ-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test privileges of server components (OTG-AUTHZ-007)|4.6.7 Test privileges of server components (OTG-AUTHZ-007)]] (e.g. indexing service, reporting interface, file generator)&lt;br /&gt;
&lt;br /&gt;
[[Test enforcement of application entry points (OTG-AUTHZ-008)|4.6.8 Test enforcement of application entry points (OTG-AUTHZ-008)]] (including exposure of objects)&lt;br /&gt;
&lt;br /&gt;
[[Testing for failure to restrict access to authenticated resource(OWASP-AT-010)|4.6.9 Testing for failure to restrict access to authenticated resource (OTG-AUTHZ-009)]] formerly &amp;quot;Testing for failure to restrict access to authenticated resource (OWASP-AT-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session Management|'''4.7 Session Management Testing''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session_Management_Schema (OWASP-SM-001)|4.7.1 Testing for Bypassing Session Management Schema (OTG-SESS-001)]] formerly &amp;quot;Testing for Bypassing Session Management Schema (OWASP-SM-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for cookies attributes  (OWASP-SM-002)|4.7.2 Testing for Cookies attributes (OTG-SESS-002)]] formerly &amp;quot;Testing for Cookies attributes (OWASP-SM-002)&amp;quot; (Cookies are set not ‘HTTP Only’, ‘Secure’,  and no time validity)&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session Fixation  (OWASP-SM-003)|4.7.3 Testing for Session Fixation (OTG-SESS-003)]] formerly &amp;quot;Testing for Session Fixation  (OWASP-SM-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Exposed Session Variables  (OWASP-SM-004)|4.7.4 Testing for Exposed Session Variables (OTG-SESS-004)]] formerly &amp;quot;Testing for Exposed Session Variables (OWASP-SM-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for CSRF  (OWASP-SM-005)|4.7.5 Testing for Cross Site Request Forgery (CSRF) (OTG-SESS-005)]] formerly &amp;quot;Testing for Cross Site Request Forgery (CSRF) (OWASP-SM-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test Session Token Strength (OTG-SESS-006)|4.7.6 Test Session Token Strength (OTG-SESS-006)]]&lt;br /&gt;
 &lt;br /&gt;
[[Testing for logout functionality (OWASP-SM-007)|4.7.7 Testing for logout functionality (OTG-SESS-007)]] formerly &amp;quot;Testing for logout functionality (OWASP-SM-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session puzzling (OWASP-SM-008)|4.7.8 Testing for Session puzzling (OWASP-SM-008)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Session Timeout (OTG-SESS-008)|4.7.8 Test Session Timeout (OTG-SESS-008)]]&lt;br /&gt;
&lt;br /&gt;
[[Test multiple concurrent sessions (OTG-SESS-009)|4.7.9 Test multiple concurrent sessions (OTG-SESS-009)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Data Validation|'''4.8 Data Validation Testing''']] &lt;br /&gt;
&lt;br /&gt;
[[Testing for Reflected Cross site scripting (OWASP-DV-001) |4.8.1 Testing for Reflected Cross Site Scripting (OTG-INPVAL-001)]] formerly &amp;quot;Testing for Reflected Cross Site Scripting (OWASP-DV-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stored Cross site scripting (OWASP-DV-002) |4.8.2 Testing for Stored Cross Site Scripting (OTG-INPVAL-002)]] formerly &amp;quot;Testing for Stored Cross Site Scripting (OWASP-DV-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Verb Tampering (OWASP-DV-003)|4.8.3 Testing for HTTP Verb Tampering (OTG-INPVAL-003)]] formerly &amp;quot;Testing for HTTP Verb Tampering (OWASP-DV-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Parameter pollution (OWASP-DV-004)|4.8.4 Testing for HTTP Parameter pollution (OTG-INPVAL-004) ]] formerly &amp;quot;Testing for HTTP Parameter pollution (OWASP-DV-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Unvalidated Redirects and Forwards (OWASP-DV-004)|4.8.5 Testing for Unvalidated Redirects and Forwards (OTG-INPVAL-005) ]] formerly &amp;quot;Testing for Unvalidated Redirects and Forwards (OWASP-DV-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for SQL Injection (OWASP-DV-005)| 4.8.6 Testing for SQL Injection (OTG-INPVAL-006)]] formerly &amp;quot;Testing for SQL Injection (OWASP-DV-005)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[Testing for Oracle|4.8.6.1 Oracle Testing]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for MySQL|4.8.6.2 MySQL Testing [Ismael Gonçalves]]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for SQL Server|4.8.6.3 SQL Server Testing]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Backend_Security_Project_Testing_PostgreSQL|4.8.6.4 Testing PostgreSQL (from OWASP BSP) ]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for MS Access |4.8.6.5 MS Access Testing]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for NoSQL injection|4.8.6.6 Testing for NoSQL injection [New!]]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for LDAP Injection  (OWASP-DV-006)|4.8.7 Testing for LDAP Injection  (OTG-INPVAL-007)]] formerly &amp;quot;Testing for LDAP Injection  (OWASP-DV-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for ORM Injection   (OWASP-DV-007)|4.8.8 Testing for ORM Injection   (OTG-INPVAL-008)]] formerly &amp;quot;Testing for ORM Injection   (OWASP-DV-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for XML Injection (OWASP-DV-008)|4.8.9 Testing for XML Injection (OTG-INPVAL-009)]] formerly &amp;quot;Testing for XML Injection (OWASP-DV-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for SSI Injection  (OWASP-DV-009)|4.8.10 Testing for SSI Injection  (OTG-INPVAL-010)]] formerly &amp;quot;Testing for SSI Injection  (OWASP-DV-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for XPath Injection  (OWASP-DV-010)|4.8.11 Testing for XPath Injection  (OTG-INPVAL-011)]] formerly &amp;quot;Testing for XPath Injection  (OWASP-DV-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for IMAP/SMTP Injection  (OWASP-DV-011)|4.8.12 IMAP/SMTP Injection  (OTG-INPVAL-012)]] formerly &amp;quot;IMAP/SMTP Injection  (OWASP-DV-011)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Code Injection  (OWASP-DV-012)|4.8.13 Testing for Code Injection  (OTG-INPVAL-013)]] formerly &amp;quot;Testing for Code Injection  (OWASP-DV-012)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Local File Inclusion|4.8.13.1 Testing for Local File Inclusion]] [Alexander Antukh]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Remote File Inclusion|4.8.13.2 Testing for Remote File Inclusion]] [Alexander Antukh]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Command Injection   (OWASP-DV-013)|4.8.14 Testing for Command Injection   (OTG-INPVAL-014)]] formerly &amp;quot;Testing for Command Injection   (OWASP-DV-013)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Buffer Overflow (OWASP-DV-014)|4.8.15 Testing for Buffer overflow (OTG-INPVAL-015)]] formerly &amp;quot;Testing for Buffer overflow (OWASP-DV-014)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Heap Overflow|4.8.15.1 Testing for Heap overflow]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stack Overflow|4.8.15.2 Testing for Stack overflow]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Format String|4.8.15.3 Testing for Format string]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Incubated Vulnerability (OWASP-DV-015)|4.8.16 Testing for incubated vulnerabilities (OTG-INPVAL-016)]] formerly &amp;quot;Testing for incubated vulnerabilities (OWASP-DV-015)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Splitting/Smuggling  (OWASP-DV-016)|4.8.17 Testing for HTTP Splitting/Smuggling  (OTG-INPVAL-017) ]] formerly &amp;quot;Testing for HTTP Splitting/Smuggling  (OWASP-DV-016)&amp;quot; [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Error Handling|'''4.9 Error Handling''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Error Code (OWASP-IG-006)|4.9.1 Analysis of Error Codes (OTG-ERR-001)]] formerly &amp;quot;Analysis of Error Codes (OWASP-IG-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stack Traces (OWASP-IG-XXX)|4.9.2 Analysis of Stack Traces (OTG-ERR-002)]] formerly &amp;quot;Analysis of Stack Traces&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Cryptography|'''4.10 Cryptography''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure encryption usage (OWASP-EN-001)| 4.10.1  Testing for Insecure encryption usage (OTG-CRYPST-001)]] formerly &amp;quot;Testing for Insecure encryption usage (OWASP-EN-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OWASP-EN-002)| 4.10.2 Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OTG-CRYPST-002)]] formerly &amp;quot;Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OWASP-EN-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Padding Oracle (OWASP-EN-003)| 4.10.3 Testing for Padding Oracle (OTG-CRYPST-003)]] formerly &amp;quot;Testing for Padding Oracle (OWASP-EN-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Cacheable HTTPS Response (OTG-CRYPST-004)| 4.10.4 Testing for Cacheable HTTPS Response (OTG-CRYPST-004)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Cache Directives (OTG-CRYPST-005)|4.10.5 Test Cache Directives (OTG-CRYPST-005)]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure Cryptographic Storage (OTG-CRYPST-006)|4.10.6 Testing for Insecure Cryptographic Storage (OTG-CRYPST-006)]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-007)|4.10.7 Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-007)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Cryptographic Key Management (OTG-CRYPST-008)|4.10.8 Test Cryptographic Key Management (OTG-CRYPST-008)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Logging|'''4.11 Logging''']] Not convinced Logging should be included as it requires access to logs to test&lt;br /&gt;
&lt;br /&gt;
[[Test time synchronisation (OTG-LOG-001)|4.11.1 Test time synchronisation (OTG-LOG-001) ]] formerly &amp;quot;Incorrect time&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test user-viewable log of authentication events (OTG-LOG-002)|4.11.2 Test user-viewable log of authentication events (OTG-LOG-002)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for business logic   (OWASP-BL-001)|'''4.12 Business Logic Testing  (OWASP-BL-001)''']] [To review--&amp;gt; David Fern]&lt;br /&gt;
Business Logic&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Test business logic data validation (OTG-BUSLOGIC-001)|4.12.1 Test business logic data validation (OTG-BUSLOGIC-001)]] [New!] NOTE MAT: to discuss this section&lt;br /&gt;
&lt;br /&gt;
[[Test Ability to forge requests (OTG-BUSLOGIC-002)|4.12.2 Test Ability to forge requests (OTG-BUSLOGIC-002)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test integrity checks (OTG-BUSLOGIC-003)|4.12.3 Test integrity checks (OTG-BUSLOGIC-003)]] (e.g. overwriting updates) [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test tamper evidence (OTG-BUSLOGIC-004)|4.12.4 Test tamper evidence (OTG-BUSLOGIC-004)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test excessive rate (speed) of use limits (OTG-BUSLOGIC-005)|4.12.5 Test excessive rate (speed) of use limits (OTG-BUSLOGIC-005)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test size of request limits (OTG-BUSLOGIC-006)|4.12.6 Test size of request limits (OTG-BUSLOGIC-006)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test number of times a function can be used limits (OTG-BUSLOGIC-007)|4.12.7 Test number of times a function can be used limits (OTG-BUSLOGIC-002)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test bypass of correct sequence (OTG-BUSLOGIC-008)|4.12.8 Test bypass of correct sequence (OTG-BUSLOGIC-008)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test self-hosted payment cardholder data processing (OTG-BUSLOGIC-009)|4.12.9 Test self-hosted payment cardholder data processing (OTG-BUSLOGIC-009)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test security incident reporting information (OTG-BUSLOGIC-010)|4.12.10 Test security incident reporting information (OTG-BUSLOGIC-010)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test defenses against application mis-use (OTG-BUSLOGIC-011)|4.12.11 Test defenses against application mis-use (OTG-BUSLOGIC-011)]] [New!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Denial of Service|'''4.13 Denial of Service''']]&lt;br /&gt;
&lt;br /&gt;
[[Test Regular expression DoS (OTG-DOS-001)| 4.13.1 Test Regular expression DoS (OTG-DOS-001)]] [New!] note: to understand better&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Test XML DoS (OTG-DOS-002)| 4.13.2 Test XML DoS (OTG-DOS-002)]] [New! - Andrew Muller]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Captcha (OWASP-AT-012)|4.13.3 Testing for CAPTCHA (OTG-DOS-003)]] formerly &amp;quot;Testing for CAPTCHA (OWASP-AT-012)&amp;quot; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Web Service (XML Interpreter)|'''4.14 Web Service Testing''']] [Tom Eston] &lt;br /&gt;
&lt;br /&gt;
[[Scoping a Web Service Test (OWASP-WS-001)|4.14.1 Scoping a Web Service Test (OTG-WEBSVC-001)]] formerly &amp;quot;Scoping a Web Service Test (OWASP-WS-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Information Gathering (OWASP-WS-002)|4.14.2 WS Information Gathering (OTG-WEBSVC-002)]] formerly &amp;quot;WS Information Gathering (OWASP-WS-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Authentication Testing (OWASP-WS-003)|4.14.3 WS Authentication Testing (OTG-WEBSVC-003)]] formerly &amp;quot;WS Authentication Testing (OWASP-WS-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Management Interface Testing (OWASP-WS-004)|4.14.4 WS Management Interface Testing (OTG-WEBSVC-004)]] formerly &amp;quot;WS Management Interface Testing (OWASP-WS-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Weak XML Structure Testing (OWASP-WS-005)|4.14.5 Weak XML Structure Testing (OTG-WEBSVC-005)]] formerly &amp;quot;Weak XML Structure Testing (OWASP-WS-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[XML Content-Level Testing (OWASP-WS-006)|4.14.6 XML Content-Level Testing (OTG-WEBSVC-006)]] formerly &amp;quot;XML Content-Level Testing (OWASP-WS-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS HTTP GET Parameters/REST Testing (OWASP-WS-007)|4.14.7 WS HTTP GET Parameters/REST Testing (OTG-WEBSVC-007)]] formerly &amp;quot;WS HTTP GET Parameters/REST Testing (OWASP-WS-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Naughty SOAP Attachment Testing (OWASP-WS-008)|4.14.8 WS Naughty SOAP Attachment Testing (OTG-WEBSVC-008)]] formerly &amp;quot;WS Naughty SOAP Attachment Testing (OWASP-WS-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Replay/MiTM Testing (OWASP-WS-009)|4.14.9 WS Replay/MiTM Testing (OTG-WEBSVC-009)]] formerly &amp;quot;WS Replay/MiTM Testing (OWASP-WS-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS BEPL Testing (OWASP-WS-010)|4.14.10 WS BEPL Testing (OTG-WEBSVC-010)]] formerly &amp;quot;WS BEPL Testing (OWASP-WS-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Client Side Testing|'''4.15 Client Side Testing''']] [New!] &lt;br /&gt;
&lt;br /&gt;
[[Testing for DOM-based Cross site scripting  (OWASP-DV-003)|4.15.1 Testing for DOM based Cross Site Scripting  (OTG-CLIENT-001)]] formerly &amp;quot;Testing for DOM based Cross Site Scripting  (OWASP-CS-001)&amp;quot; [Stefano Di Paola]&lt;br /&gt;
&lt;br /&gt;
[[Test Cross Origin Resource Sharing (OTG-CLIENT-002)|4.15.2 Test Cross Origin Resource Sharing (OTG-CLIENT-002)]] formerly &amp;quot;Testing for HTML5 (OWASP CS-002)&amp;quot; [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Cross site flashing (OWASP-DV-004)|4.15.3 Testing for Cross Site Flashing   (OTG-CLIENT-003)]] formerly &amp;quot;Testing for Cross Site Flashing   (OWASP-CS-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Clickjacking (OWASP-CS-004)|4.15.4 Testing for Clickjacking (OTG-CLIENT-004)]] formerly &amp;quot;Testing for Clickjacking (OWASP-CS-004)&amp;quot; [Davide Danelon]&lt;br /&gt;
&lt;br /&gt;
[[Testing WebSockets (OTG-CLIENT-005)|4.15.5 Testing WebSockets (OTG-CLIENT-005)]] [Ryan Dewhurst]&lt;br /&gt;
&lt;br /&gt;
[[Test Web Messaging (OTG-CLIENT-006)|4.15.6 Test Web Messaging (OTG-CLIENT-006)]] [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
[[Test Local Storage (OTG-CLIENT-007)|4.15.7 Test Local Storage (OTG-CLIENT-007)]] [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
==[[Writing Reports: value the real risk |5. Writing Reports: value the real risk ]]== &lt;br /&gt;
&lt;br /&gt;
[[How to value the real risk |5.1 How to value the real risk]] [To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[How to write the report of the testing |5.2 How to write the report of the testing]] [To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
==[[Appendix A: Testing Tools |Appendix A: Testing Tools ]]==&lt;br /&gt;
&lt;br /&gt;
* Black Box Testing Tools [To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix B: Suggested Reading | Appendix B: Suggested Reading]]==&lt;br /&gt;
* Whitepapers [To review--&amp;gt; David Fern]&lt;br /&gt;
* Books [To review--&amp;gt; David Fern]&lt;br /&gt;
* Useful Websites [To review--&amp;gt; David Fern]&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix C: Fuzz Vectors | Appendix C: Fuzz Vectors]]== &lt;br /&gt;
&lt;br /&gt;
* Fuzz Categories [To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix D: Encoded Injection | Appendix D: Encoded Injection]]== &lt;br /&gt;
[To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Testing Project]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=161135</id>
		<title>OWASP Testing Guide v4 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=161135"/>
				<updated>2013-10-19T00:49:46Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{OWASP Breakers}}&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
'''This is the DRAFT of the table of content of the New Testing Guide v4.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;You can download the stable version v3 [http://www.owasp.org/images/5/56/OWASP_Testing_Guide_v3.pdf here] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Back to the OWASP Testing Guide Project:&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Testing_Project&lt;br /&gt;
&lt;br /&gt;
'''Updated: 15th February 2013'''&lt;br /&gt;
&lt;br /&gt;
[[ OWTGv4 Contributors list|'''Contributors List]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following is a DRAFT of the Toc based on the feedback already received.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Foreword|Foreword by Eoin Keary]]== &lt;br /&gt;
[To review--&amp;gt; Eoin Keary -&amp;gt; Done!!]&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Frontispiece |1. Frontispiece]]== &lt;br /&gt;
[To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[Testing Guide Frontispiece|1.1 About the OWASP Testing Guide Project]]''' &lt;br /&gt;
[To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[About The Open Web Application Security Project|1.2 About The Open Web Application Security Project]]''' &lt;br /&gt;
[To review--&amp;gt; ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Introduction|2. Introduction]]==&lt;br /&gt;
&lt;br /&gt;
'''2.1 The OWASP Testing Project'''&lt;br /&gt;
&lt;br /&gt;
'''2.2 Principles of Testing'''&lt;br /&gt;
&lt;br /&gt;
'''2.3 Testing Techniques Explained''' &lt;br /&gt;
&lt;br /&gt;
2.4 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Requirements_Test_Derivation Security requirements test derivation],[https://www.owasp.org/index.php/Testing_Guide_Introduction#Functional_and_Non_Functional_Test_Requirements functional and non functional test requirements], and [https://www.owasp.org/index.php/Testing_Guide_Introduction#Test_Cases_Through_Use_and_Misuse_Cases test cases through use and misuse cases]&lt;br /&gt;
&lt;br /&gt;
2.5 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Test_Data_Analysis_and_Reporting Security test data analysis and reporting: root cause identification and business/role case test data reporting]&lt;br /&gt;
&lt;br /&gt;
==[[The OWASP Testing Framework|3. The OWASP Testing Framework]]==&lt;br /&gt;
&lt;br /&gt;
'''3.1. Overview'''&lt;br /&gt;
&lt;br /&gt;
'''3.2. Phase 1: Before Development Begins '''&lt;br /&gt;
&lt;br /&gt;
'''3.3. Phase 2: During Definition and Design'''&lt;br /&gt;
&lt;br /&gt;
'''3.4. Phase 3: During Development'''&lt;br /&gt;
&lt;br /&gt;
'''3.5. Phase 4: During Deployment'''&lt;br /&gt;
&lt;br /&gt;
'''3.6. Phase 5: Maintenance and Operations'''&lt;br /&gt;
&lt;br /&gt;
'''3.7. A Typical SDLC Testing Workflow '''&lt;br /&gt;
&lt;br /&gt;
==[[Web Application Penetration Testing |4. Web Application Penetration Testing ]]==&lt;br /&gt;
&lt;br /&gt;
[[Testing: Introduction and objectives|'''4.1 Introduction and Objectives''']] [To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
[[Testing Checklist| 4.1.1 Testing Checklist]] [To review at the end of brainstorming --&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing Information Gathering|'''4.2 Information Gathering ''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing: Search engine discovery/reconnaissance (OWASP-IG-002)|4.2.1 Conduct Search Engine Discovery and Reconnaissance for Information Leakage (OTG-INFO-001) ]] formerly &amp;quot;Search Engine Discovery/Reconnaissance (OWASP-IG-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Fingerprint Web Server (OTG-INFO-002)|4.2.2 Fingerprint Web Server (OTG-INFO-002) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing: Spiders, Robots, and Crawlers (OWASP-IG-001)|4.2.3 Review Webserver Metafiles for Information Leakage (OTG-INFO-003) ]] formerly &amp;quot;Spiders, Robots and Crawlers (OWASP-IG-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Application Discovery (OWASP-IG-005)|4.2.4 Enumerate Applications on Webserver (OTG-INFO-004) ]] formerly &amp;quot;Application Discovery (OWASP-IG-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Review webpage comments and metadata(OWASP-IG-007)|4.2.5 Review Webpage Comments and Metadata for Information Leakage (OTG-INFO-005) ]] formerly &amp;quot;Review webpage comments and metadata(OWASP-IG-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing: Identify application entry points (OWASP-IG-003)|4.2.6 Identify application entry points (OTG-INFO-006) ]] formerly &amp;quot;Identify application entry points (OWASP-IG-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Identify application exit/handover points (OWASP-IG-008)|4.2.7 Identify application exit/handover points (OTG-INFO-007) ]] formerly &amp;quot;Identify application exit/handover points (OWASP-IG-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Map execution paths through application (OWASP-IG-009)|4.2.8 Map execution paths through application (OTG-INFO-008)]] formerly &amp;quot;Map execution paths through application (OWASP-IG-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Fingerprint Web Application Framework (OTG-INFO-009)|4.2.9 Fingerprint Web Application Framework (OTG-INFO-009) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-010)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Web Application (OTG-INFO-011)|4.2.10 Fingerprint Web Application (OTG-INFO-010) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-010)&amp;quot; [Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[Map Network and Application Architecture (OTG-INFO-012)|4.2.11 Map Network and Application Architecture (OTG-INFO-011) ]] formerly &amp;quot;Testing for Infrastructure Configuration Management Testing weakness (OWASP-CM-001)&amp;quot; [Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for configuration management|'''4.3 Configuration and Deploy Management Testing ''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for infrastructure configuration management (OWASP-CM-003)|4.3.1 Test Network/Infrastructure Configuration (OTG-CONFIG-001) ]] formerly &amp;quot;Testing for Infrastructure Configuration Management Testing weakness (OWASP-CM-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for application configuration management (OWASP-CM-004)|4.3.2 Test Application Platform Configuration (OTG-CONFIG-002) ]] formerly &amp;quot;Testing for Application Configuration Management weakness (OWASP-CM-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for file extensions handling  (OWASP-CM-005)|4.3.3 Test File Extensions Handling for Sensitive Information (OTG-CONFIG-003) ]] formerly &amp;quot;Testing for File Extensions Handling  (OWASP-CM-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Old, Backup and Unreferenced Files (OWASP-CM-006)|4.3.4 Review Old, Backup and Unreferenced Files for Sensitive Information (OTG-CONFIG-004) ]] formerly &amp;quot;Old, Backup and Unreferenced Files (OWASP-CM-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Admin Interfaces  (OWASP-CM-007)|4.3.5 Enumerate Infrastructure and Application Admin Interfaces (OTG-CONFIG-005) ]] formerly &amp;quot;Infrastructure and Application Admin Interfaces  (OWASP-CM-005)&amp;quot; [Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Methods and XST  (OWASP-CM-008)|4.3.6 Test HTTP Methods (OTG-CONFIG-006) ]] formerly &amp;quot;Testing for Bad HTTP Methods (OWASP-CM-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Database credentials/connection strings available|4.3.7 Testing for Database credentials/connection strings available (OTG-CONFIG-007) ]] formerly &amp;quot;Testing for Database credentials/connection strings available (OWASP-CM-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Content Security Policy weakness|4.3.8 Test Content Security Policy (OTG-CONFIG-008) ]] formerly &amp;quot;Testing for Content Security Policy weakness (OWASP-CM-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Missing HSTS header|4.3.9 Test HTTP Strict Transport Security (OTG-CONFIG-009) ]] formerly &amp;quot;Testing for Missing HSTS header (OWASP-CM-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Frame Options|4.3.10 Test Frame Options (OTG-CONFIG-010) ]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for RIA policy files weakness|4.3.11 Test RIA cross domain policy (OTG-CONFIG-011) ]] formerly &amp;quot;Testing for RIA policy files weakness (OWASP-CM-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Content Type Options|4.3.12 Test Content Type Options (OTG-CONFIG-012) ]] new&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing Identity Management|'''4.4 Identity Management Testing''']]&lt;br /&gt;
&lt;br /&gt;
[[Test Role Definitions (OTG-IDENT-001)|4.4.1 Test Role Definitions (OTG-IDENT-001)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test User Registration Process (OTG-IDENT-002)|4.4.2 Test User Registration Process (OTG-IDENT-002)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Provisioning Process (OTG-IDENT-003)|4.4.3 Test Account Provisioning Process (OTG-IDENT-003)]] New&lt;br /&gt;
&lt;br /&gt;
[[Testing for Account Enumeration and Guessable User Account (OWASP-AT-002)|4.4.4 Testing for Account Enumeration and Guessable User Account (OTG-IDENT-004) ]] formerly &amp;quot;Testing for Account Enumeration and Guessable User Account (OWASP-AT-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak or unenforced username policy (OWASP-AT-009)| 4.4.5 Testing for Weak or unenforced username policy (OTG-IDENT-005)]] formerly &amp;quot;Testing for Weak or unenforced username policy (OWASP-AT-009)&lt;br /&gt;
&lt;br /&gt;
[[Test Permissions of Guest/Training Accounts (OTG-IDENT-006)|4.4.6 Test Permissions of Guest/Training Accounts (OTG-IDENT-006)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Suspension/Resumption Process (OTG-IDENT-007)|4.4.7 Test Account Suspension/Resumption Process (OTG-IDENT-007)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test User Deregistration Process (OTG-IDENT-008)|4.4.8 Test User Deregistration Process (OTG-IDENT-008)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Deregistration Process (OTG-IDENT-009)|4.4.9 Test Account Deregistration Process (OTG-IDENT-009)]] New&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for authentication|'''4.5 Authentication Testing ''']] &lt;br /&gt;
&lt;br /&gt;
[[Testing for Credentials Transported over an Encrypted Channel (OWASP-AT-001)|4.5.1 Testing for Credentials Transported over an Encrypted Channel  (OTG-AUTHN-001)]] formerly &amp;quot;Testing for Credentials Transported over an Encrypted Channel  (OWASP-AT-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for default credentials (OWASP-AT-003)|4.5.2 Testing for default credentials (OTG-AUTHN-002)]] formerly &amp;quot;Testing for default credentials (OWASP-AT-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak lock out mechanism (OWASP-AT-004)|4.5.3 Testing for Weak lock out mechanism (OTG-AUTHN-003)]] formerly &amp;quot;Testing for Weak lock out mechanism (OWASP-AT-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Bypassing Authentication Schema (OWASP-AT-005)|4.5.4 Testing for bypassing authentication schema (OTG-AUTHN-004)]] formerly &amp;quot;Testing for bypassing authentication schema (OWASP-AT-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Vulnerable Remember Password (OWASP-AT-006)|4.5.5 Test remember password functionality (OTG-AUTHN-005)]] formerly &amp;quot;Testing for vulnerable remember password functionality (OWASP-AT-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Browser cache weakness (OWASP-AT-007)|4.5.6 Testing for Browser cache weakness (OTG-AUTHN-006)]] formerly &amp;quot;Testing for Browser cache weakness (OWASP-AT-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak password policy (OWASP-AT-008)|4.5.7 Testing for Weak password policy (OTG-AUTHN-007)]] formerly &amp;quot;Testing for Weak password policy (OWASP-AT-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak security question/answer (OTG-AUTHN-008)|4.5.8 Testing for Weak security question/answer (OTG-AUTHN-008)]] New! - Robert Winkel&lt;br /&gt;
&lt;br /&gt;
[[Testing for weak password change or reset functionalities (OWASP-AT-011)|4.5.9 Testing for weak password change or reset functionalities (OTG-AUTHN-009)]] formerly &amp;quot;Testing for weak password change or reset functionalities (OWASP-AT-011)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weaker authentication in alternative channel (OTG-AUTHN-010)|4.5.10 Testing for Weaker authentication in alternative channel (OTG-AUTHN-010)]] (e.g. mobile app, IVR, help desk)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Authorization|'''4.6 Authorization Testing''']] &lt;br /&gt;
&lt;br /&gt;
[[Test Management of Account Permissions (OTG-AUTHZ-001)|4.6.1 Test Management of Account Permissions (OTG-AUTHZ-001)]] New&lt;br /&gt;
&lt;br /&gt;
[[Testing for Path Traversal  (OWASP-AZ-001)|4.6.2 Testing Directory traversal/file include (OTG-AUTHZ-002)]] formerly &amp;quot;Testing Directory traversal/file include (OWASP-AZ-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Bypassing Authorization Schema  (OWASP-AZ-002)|4.6.3 Testing for bypassing authorization schema (OTG-AUTHZ-003)]] formerly &amp;quot;Testing for bypassing authorization schema  (OWASP-AZ-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Privilege escalation  (OWASP-AZ-003)|4.6.4 Testing for Privilege Escalation (OTG-AUTHZ-004)]] formerly &amp;quot;Testing for Privilege Escalation  (OWASP-AZ-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure Direct Object References (OWASP-AZ-004)|4.6.5 Testing for Insecure Direct Object References (OTG-AUTHZ-005)]] formerly &amp;quot;Testing for Insecure Direct Object References (OWASP-AZ-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Failure to Restrict access to authorized resource (OWASP-AZ-005)|4.6.6 Testing for Failure to Restrict access to authorized resource (OTG-AUTHZ-006)]] formerly &amp;quot;Testing for Failure to Restrict access to authorized resource (OWASP-AZ-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test privileges of server components (OTG-AUTHZ-007)|4.6.7 Test privileges of server components (OTG-AUTHZ-007)]] (e.g. indexing service, reporting interface, file generator)&lt;br /&gt;
&lt;br /&gt;
[[Test enforcement of application entry points (OTG-AUTHZ-008)|4.6.8 Test enforcement of application entry points (OTG-AUTHZ-008)]] (including exposure of objects)&lt;br /&gt;
&lt;br /&gt;
[[Testing for failure to restrict access to authenticated resource(OWASP-AT-010)|4.6.9 Testing for failure to restrict access to authenticated resource (OTG-AUTHZ-009)]] formerly &amp;quot;Testing for failure to restrict access to authenticated resource (OWASP-AT-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session Management|'''4.7 Session Management Testing''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session_Management_Schema (OWASP-SM-001)|4.7.1 Testing for Bypassing Session Management Schema (OTG-SESS-001)]] formerly &amp;quot;Testing for Bypassing Session Management Schema (OWASP-SM-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for cookies attributes  (OWASP-SM-002)|4.7.2 Testing for Cookies attributes (OTG-SESS-002)]] formerly &amp;quot;Testing for Cookies attributes (OWASP-SM-002)&amp;quot; (Cookies are set not ‘HTTP Only’, ‘Secure’,  and no time validity)&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session Fixation  (OWASP-SM-003)|4.7.3 Testing for Session Fixation (OTG-SESS-003)]] formerly &amp;quot;Testing for Session Fixation  (OWASP-SM-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Exposed Session Variables  (OWASP-SM-004)|4.7.4 Testing for Exposed Session Variables (OTG-SESS-004)]] formerly &amp;quot;Testing for Exposed Session Variables (OWASP-SM-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for CSRF  (OWASP-SM-005)|4.7.5 Testing for Cross Site Request Forgery (CSRF) (OTG-SESS-005)]] formerly &amp;quot;Testing for Cross Site Request Forgery (CSRF) (OWASP-SM-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test Session Token Strength (OTG-SESS-006)|4.7.6 Test Session Token Strength (OTG-SESS-006)]]&lt;br /&gt;
 &lt;br /&gt;
[[Testing for logout functionality (OWASP-SM-007)|4.7.7 Testing for logout functionality (OTG-SESS-007)]] formerly &amp;quot;Testing for logout functionality (OWASP-SM-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session puzzling (OWASP-SM-008)|4.7.8 Testing for Session puzzling (OWASP-SM-008)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Session Timeout (OTG-SESS-008)|4.7.8 Test Session Timeout (OTG-SESS-008)]]&lt;br /&gt;
&lt;br /&gt;
[[Test multiple concurrent sessions (OTG-SESS-009)|4.7.9 Test multiple concurrent sessions (OTG-SESS-009)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Data Validation|'''4.8 Data Validation Testing''']] &lt;br /&gt;
&lt;br /&gt;
[[Testing for Reflected Cross site scripting (OWASP-DV-001) |4.8.1 Testing for Reflected Cross Site Scripting (OTG-INPVAL-001)]] formerly &amp;quot;Testing for Reflected Cross Site Scripting (OWASP-DV-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stored Cross site scripting (OWASP-DV-002) |4.8.2 Testing for Stored Cross Site Scripting (OTG-INPVAL-002)]] formerly &amp;quot;Testing for Stored Cross Site Scripting (OWASP-DV-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Verb Tampering (OWASP-DV-003)|4.8.3 Testing for HTTP Verb Tampering (OTG-INPVAL-003)]] formerly &amp;quot;Testing for HTTP Verb Tampering (OWASP-DV-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Parameter pollution (OWASP-DV-004)|4.8.4 Testing for HTTP Parameter pollution (OTG-INPVAL-004) ]] formerly &amp;quot;Testing for HTTP Parameter pollution (OWASP-DV-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Unvalidated Redirects and Forwards (OWASP-DV-004)|4.8.5 Testing for Unvalidated Redirects and Forwards (OTG-INPVAL-005) ]] formerly &amp;quot;Testing for Unvalidated Redirects and Forwards (OWASP-DV-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for SQL Injection (OWASP-DV-005)| 4.8.6 Testing for SQL Injection (OTG-INPVAL-006)]] formerly &amp;quot;Testing for SQL Injection (OWASP-DV-005)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[Testing for Oracle|4.8.6.1 Oracle Testing]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for MySQL|4.8.6.2 MySQL Testing [Ismael Gonçalves]]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for SQL Server|4.8.6.3 SQL Server Testing]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Backend_Security_Project_Testing_PostgreSQL|4.8.6.4 Testing PostgreSQL (from OWASP BSP) ]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for MS Access |4.8.6.5 MS Access Testing]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for NoSQL injection|4.8.6.6 Testing for NoSQL injection [New!]]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for LDAP Injection  (OWASP-DV-006)|4.8.7 Testing for LDAP Injection  (OTG-INPVAL-007)]] formerly &amp;quot;Testing for LDAP Injection  (OWASP-DV-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for ORM Injection   (OWASP-DV-007)|4.8.8 Testing for ORM Injection   (OTG-INPVAL-008)]] formerly &amp;quot;Testing for ORM Injection   (OWASP-DV-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for XML Injection (OWASP-DV-008)|4.8.9 Testing for XML Injection (OTG-INPVAL-009)]] formerly &amp;quot;Testing for XML Injection (OWASP-DV-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for SSI Injection  (OWASP-DV-009)|4.8.10 Testing for SSI Injection  (OTG-INPVAL-010)]] formerly &amp;quot;Testing for SSI Injection  (OWASP-DV-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for XPath Injection  (OWASP-DV-010)|4.8.11 Testing for XPath Injection  (OTG-INPVAL-011)]] formerly &amp;quot;Testing for XPath Injection  (OWASP-DV-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for IMAP/SMTP Injection  (OWASP-DV-011)|4.8.12 IMAP/SMTP Injection  (OTG-INPVAL-012)]] formerly &amp;quot;IMAP/SMTP Injection  (OWASP-DV-011)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Code Injection  (OWASP-DV-012)|4.8.13 Testing for Code Injection  (OTG-INPVAL-013)]] formerly &amp;quot;Testing for Code Injection  (OWASP-DV-012)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Local File Inclusion|4.8.13.1 Testing for Local File Inclusion]] [Alexander Antukh]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Remote File Inclusion|4.8.13.2 Testing for Remote File Inclusion]] [Alexander Antukh]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Command Injection   (OWASP-DV-013)|4.8.14 Testing for Command Injection   (OTG-INPVAL-014)]] formerly &amp;quot;Testing for Command Injection   (OWASP-DV-013)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Buffer Overflow (OWASP-DV-014)|4.8.15 Testing for Buffer overflow (OTG-INPVAL-015)]] formerly &amp;quot;Testing for Buffer overflow (OWASP-DV-014)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Heap Overflow|4.8.15.1 Testing for Heap overflow]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stack Overflow|4.8.15.2 Testing for Stack overflow]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Format String|4.8.15.3 Testing for Format string]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Incubated Vulnerability (OWASP-DV-015)|4.8.16 Testing for incubated vulnerabilities (OTG-INPVAL-016)]] formerly &amp;quot;Testing for incubated vulnerabilities (OWASP-DV-015)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Splitting/Smuggling  (OWASP-DV-016)|4.8.17 Testing for HTTP Splitting/Smuggling  (OTG-INPVAL-017) ]] formerly &amp;quot;Testing for HTTP Splitting/Smuggling  (OWASP-DV-016)&amp;quot; [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Error Handling|'''4.9 Error Handling''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Error Code (OWASP-IG-006)|4.9.1 Analysis of Error Codes (OTG-ERR-001)]] formerly &amp;quot;Analysis of Error Codes (OWASP-IG-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stack Traces (OWASP-IG-XXX)|4.9.2 Analysis of Stack Traces (OTG-ERR-002)]] formerly &amp;quot;Analysis of Stack Traces&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Cryptography|'''4.10 Cryptography''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure encryption usage (OWASP-EN-001)| 4.10.1  Testing for Insecure encryption usage (OTG-CRYPST-001)]] formerly &amp;quot;Testing for Insecure encryption usage (OWASP-EN-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OWASP-EN-002)| 4.10.2 Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OTG-CRYPST-002)]] formerly &amp;quot;Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OWASP-EN-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Padding Oracle (OWASP-EN-003)| 4.10.3 Testing for Padding Oracle (OTG-CRYPST-003)]] formerly &amp;quot;Testing for Padding Oracle (OWASP-EN-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Cacheable HTTPS Response (OTG-CRYPST-004)| 4.10.4 Testing for Cacheable HTTPS Response (OTG-CRYPST-004)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Cache Directives (OTG-CRYPST-005)|4.10.5 Test Cache Directives (OTG-CRYPST-005)]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure Cryptographic Storage (OTG-CRYPST-006)|4.10.6 Testing for Insecure Cryptographic Storage (OTG-CRYPST-006)]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-007)|4.10.7 Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-007)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Cryptographic Key Management (OTG-CRYPST-008)|4.10.8 Test Cryptographic Key Management (OTG-CRYPST-008)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Logging|'''4.11 Logging''']] Not convinced Logging should be included as it requires access to logs to test&lt;br /&gt;
&lt;br /&gt;
[[Test time synchronisation (OTG-LOG-001)|4.11.1 Test time synchronisation (OTG-LOG-001) ]] formerly &amp;quot;Incorrect time&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test user-viewable log of authentication events (OTG-LOG-002)|4.11.2 Test user-viewable log of authentication events (OTG-LOG-002)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for business logic   (OWASP-BL-001)|'''4.12 Business Logic Testing  (OWASP-BL-001)''']] [To review--&amp;gt; David Fern]&lt;br /&gt;
Business Logic&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Test business logic data validation (OTG-BUSLOGIC-001)|4.12.1 Test business logic data validation (OTG-BUSLOGIC-001)]] [New!] NOTE MAT: to discuss this section&lt;br /&gt;
&lt;br /&gt;
[[Test Ability to forge requests (OTG-BUSLOGIC-002)|4.12.2 Test Ability to forge requests (OTG-BUSLOGIC-002)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test integrity checks (OTG-BUSLOGIC-003)|4.12.3 Test integrity checks (OTG-BUSLOGIC-003)]] (e.g. overwriting updates) [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test tamper evidence (OTG-BUSLOGIC-004)|4.12.4 Test tamper evidence (OTG-BUSLOGIC-004)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test excessive rate (speed) of use limits (OTG-BUSLOGIC-005)|4.12.5 Test excessive rate (speed) of use limits (OTG-BUSLOGIC-005)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test size of request limits (OTG-BUSLOGIC-006)|4.12.6 Test size of request limits (OTG-BUSLOGIC-006)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test number of times a function can be used limits (OTG-BUSLOGIC-007)|4.12.7 Test number of times a function can be used limits (OTG-BUSLOGIC-002)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test bypass of correct sequence (OTG-BUSLOGIC-008)|4.12.8 Test bypass of correct sequence (OTG-BUSLOGIC-008)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test self-hosted payment cardholder data processing (OTG-BUSLOGIC-009)|4.12.9 Test self-hosted payment cardholder data processing (OTG-BUSLOGIC-009)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test security incident reporting information (OTG-BUSLOGIC-010)|4.12.10 Test security incident reporting information (OTG-BUSLOGIC-010)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test defenses against application mis-use (OTG-BUSLOGIC-011)|4.12.11 Test defenses against application mis-use (OTG-BUSLOGIC-011)]] [New!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Denial of Service|'''4.13 Denial of Service''']]&lt;br /&gt;
&lt;br /&gt;
[[Test Regular expression DoS (OTG-DOS-001)| 4.13.1 Test Regular expression DoS (OTG-DOS-001)]] [New!] note: to understand better&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Test XML DoS (OTG-DOS-002)| 4.13.2 Test XML DoS (OTG-DOS-002)]] [New! - Andrew Muller]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Captcha (OWASP-AT-012)|4.13.3 Testing for CAPTCHA (OTG-DOS-003)]] formerly &amp;quot;Testing for CAPTCHA (OWASP-AT-012)&amp;quot; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Web Service (XML Interpreter)|'''4.14 Web Service Testing''']] [Tom Eston] &lt;br /&gt;
&lt;br /&gt;
[[Scoping a Web Service Test (OWASP-WS-001)|4.14.1 Scoping a Web Service Test (OTG-WEBSVC-001)]] formerly &amp;quot;Scoping a Web Service Test (OWASP-WS-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Information Gathering (OWASP-WS-002)|4.14.2 WS Information Gathering (OTG-WEBSVC-002)]] formerly &amp;quot;WS Information Gathering (OWASP-WS-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Authentication Testing (OWASP-WS-003)|4.14.3 WS Authentication Testing (OTG-WEBSVC-003)]] formerly &amp;quot;WS Authentication Testing (OWASP-WS-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Management Interface Testing (OWASP-WS-004)|4.14.4 WS Management Interface Testing (OTG-WEBSVC-004)]] formerly &amp;quot;WS Management Interface Testing (OWASP-WS-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Weak XML Structure Testing (OWASP-WS-005)|4.14.5 Weak XML Structure Testing (OTG-WEBSVC-005)]] formerly &amp;quot;Weak XML Structure Testing (OWASP-WS-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[XML Content-Level Testing (OWASP-WS-006)|4.14.6 XML Content-Level Testing (OTG-WEBSVC-006)]] formerly &amp;quot;XML Content-Level Testing (OWASP-WS-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS HTTP GET Parameters/REST Testing (OWASP-WS-007)|4.14.7 WS HTTP GET Parameters/REST Testing (OTG-WEBSVC-007)]] formerly &amp;quot;WS HTTP GET Parameters/REST Testing (OWASP-WS-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Naughty SOAP Attachment Testing (OWASP-WS-008)|4.14.8 WS Naughty SOAP Attachment Testing (OTG-WEBSVC-008)]] formerly &amp;quot;WS Naughty SOAP Attachment Testing (OWASP-WS-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Replay/MiTM Testing (OWASP-WS-009)|4.14.9 WS Replay/MiTM Testing (OTG-WEBSVC-009)]] formerly &amp;quot;WS Replay/MiTM Testing (OWASP-WS-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS BEPL Testing (OWASP-WS-010)|4.14.10 WS BEPL Testing (OTG-WEBSVC-010)]] formerly &amp;quot;WS BEPL Testing (OWASP-WS-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Client Side Testing|'''4.15 Client Side Testing''']] [New!] &lt;br /&gt;
&lt;br /&gt;
[[Testing for DOM-based Cross site scripting  (OWASP-DV-003)|4.15.1 Testing for DOM based Cross Site Scripting  (OTG-CLIENT-001)]] formerly &amp;quot;Testing for DOM based Cross Site Scripting  (OWASP-CS-001)&amp;quot; [Stefano Di Paola]&lt;br /&gt;
&lt;br /&gt;
[[Test Cross Origin Resource Sharing (OTG-CLIENT-002)|4.15.2 Test Cross Origin Resource Sharing (OTG-CLIENT-002)]] formerly &amp;quot;Testing for HTML5 (OWASP CS-002)&amp;quot; [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Cross site flashing (OWASP-DV-004)|4.15.3 Testing for Cross Site Flashing   (OTG-CLIENT-003)]] formerly &amp;quot;Testing for Cross Site Flashing   (OWASP-CS-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Clickjacking (OWASP-CS-004)|4.15.4 Testing for Clickjacking (OTG-CLIENT-004)]] formerly &amp;quot;Testing for Clickjacking (OWASP-CS-004)&amp;quot; [Davide Danelon]&lt;br /&gt;
&lt;br /&gt;
[[Testing WebSockets (OTG-CLIENT-005)|4.15.5 Testing WebSockets (OTG-CLIENT-005)]] [Ryan Dewhurst]&lt;br /&gt;
&lt;br /&gt;
[[Test Web Messaging (OTG-CLIENT-006)|4.15.6 Test Web Messaging (OTG-CLIENT-006)]] [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
[[Test Local Storage (OTG-CLIENT-007)|4.15.7 Test Local Storage (OTG-CLIENT-007)]] [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
==[[Writing Reports: value the real risk |5. Writing Reports: value the real risk ]]== &lt;br /&gt;
&lt;br /&gt;
[[How to value the real risk |5.1 How to value the real risk]] [To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[How to write the report of the testing |5.2 How to write the report of the testing]] [To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
==[[Appendix A: Testing Tools |Appendix A: Testing Tools ]]==&lt;br /&gt;
&lt;br /&gt;
* Black Box Testing Tools [To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix B: Suggested Reading | Appendix B: Suggested Reading]]==&lt;br /&gt;
* Whitepapers [To review--&amp;gt; David Fern]&lt;br /&gt;
* Books [To review--&amp;gt; David Fern]&lt;br /&gt;
* Useful Websites [To review--&amp;gt; David Fern]&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix C: Fuzz Vectors | Appendix C: Fuzz Vectors]]== &lt;br /&gt;
&lt;br /&gt;
* Fuzz Categories [To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix D: Encoded Injection | Appendix D: Encoded Injection]]== &lt;br /&gt;
[To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Testing Project]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=161134</id>
		<title>OWASP Testing Guide v4 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=161134"/>
				<updated>2013-10-19T00:40:51Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{OWASP Breakers}}&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
'''This is the DRAFT of the table of content of the New Testing Guide v4.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;You can download the stable version v3 [http://www.owasp.org/images/5/56/OWASP_Testing_Guide_v3.pdf here] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Back to the OWASP Testing Guide Project:&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Testing_Project&lt;br /&gt;
&lt;br /&gt;
'''Updated: 15th February 2013'''&lt;br /&gt;
&lt;br /&gt;
[[ OWTGv4 Contributors list|'''Contributors List]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following is a DRAFT of the Toc based on the feedback already received.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Foreword|Foreword by Eoin Keary]]== &lt;br /&gt;
[To review--&amp;gt; Eoin Keary -&amp;gt; Done!!]&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Frontispiece |1. Frontispiece]]== &lt;br /&gt;
[To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[Testing Guide Frontispiece|1.1 About the OWASP Testing Guide Project]]''' &lt;br /&gt;
[To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[About The Open Web Application Security Project|1.2 About The Open Web Application Security Project]]''' &lt;br /&gt;
[To review--&amp;gt; ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Introduction|2. Introduction]]==&lt;br /&gt;
&lt;br /&gt;
'''2.1 The OWASP Testing Project'''&lt;br /&gt;
&lt;br /&gt;
'''2.2 Principles of Testing'''&lt;br /&gt;
&lt;br /&gt;
'''2.3 Testing Techniques Explained''' &lt;br /&gt;
&lt;br /&gt;
2.4 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Requirements_Test_Derivation Security requirements test derivation],[https://www.owasp.org/index.php/Testing_Guide_Introduction#Functional_and_Non_Functional_Test_Requirements functional and non functional test requirements], and [https://www.owasp.org/index.php/Testing_Guide_Introduction#Test_Cases_Through_Use_and_Misuse_Cases test cases through use and misuse cases]&lt;br /&gt;
&lt;br /&gt;
2.5 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Test_Data_Analysis_and_Reporting Security test data analysis and reporting: root cause identification and business/role case test data reporting]&lt;br /&gt;
&lt;br /&gt;
==[[The OWASP Testing Framework|3. The OWASP Testing Framework]]==&lt;br /&gt;
&lt;br /&gt;
'''3.1. Overview'''&lt;br /&gt;
&lt;br /&gt;
'''3.2. Phase 1: Before Development Begins '''&lt;br /&gt;
&lt;br /&gt;
'''3.3. Phase 2: During Definition and Design'''&lt;br /&gt;
&lt;br /&gt;
'''3.4. Phase 3: During Development'''&lt;br /&gt;
&lt;br /&gt;
'''3.5. Phase 4: During Deployment'''&lt;br /&gt;
&lt;br /&gt;
'''3.6. Phase 5: Maintenance and Operations'''&lt;br /&gt;
&lt;br /&gt;
'''3.7. A Typical SDLC Testing Workflow '''&lt;br /&gt;
&lt;br /&gt;
==[[Web Application Penetration Testing |4. Web Application Penetration Testing ]]==&lt;br /&gt;
&lt;br /&gt;
[[Testing: Introduction and objectives|'''4.1 Introduction and Objectives''']] [To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
[[Testing Checklist| 4.1.1 Testing Checklist]] [To review at the end of brainstorming --&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing Information Gathering|'''4.2 Information Gathering ''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing: Search engine discovery/reconnaissance (OWASP-IG-002)|4.2.1 Conduct Search Engine Discovery and Reconnaissance for Information Leakage (OTG-INFO-001) ]] formerly &amp;quot;Search Engine Discovery/Reconnaissance (OWASP-IG-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Fingerprint Web Server (OTG-INFO-002)|4.2.2 Fingerprint Web Server (OTG-INFO-002) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing: Spiders, Robots, and Crawlers (OWASP-IG-001)|4.2.3 Review Webserver Metafiles for Information Leakage (OTG-INFO-003) ]] formerly &amp;quot;Spiders, Robots and Crawlers (OWASP-IG-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Application Discovery (OWASP-IG-005)|4.2.4 Enumerate Applications on Webserver (OTG-INFO-004) ]] formerly &amp;quot;Application Discovery (OWASP-IG-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Review webpage comments and metadata(OWASP-IG-007)|4.2.5 Review Webpage Comments and Metadata for Information Leakage (OTG-INFO-005) ]] formerly &amp;quot;Review webpage comments and metadata(OWASP-IG-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing: Identify application entry points (OWASP-IG-003)|4.2.6 Identify application entry points (OTG-INFO-006) ]] formerly &amp;quot;Identify application entry points (OWASP-IG-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Identify application exit/handover points (OWASP-IG-008)|4.2.7 Identify application exit/handover points (OTG-INFO-007) ]] formerly &amp;quot;Identify application exit/handover points (OWASP-IG-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Map execution paths through application (OWASP-IG-009)|4.2.8 Map execution paths through application (OTG-INFO-008)]] formerly &amp;quot;Map execution paths through application (OWASP-IG-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Fingerprint Web Application Framework (OTG-INFO-009)|4.2.9 Fingerprint Web Application Framework (OTG-INFO-009) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-010)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Web Application (OTG-INFO-011)|4.2.10 Fingerprint Web Application (OTG-INFO-010) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-010)&amp;quot; [Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[Map Network and Application Architecture (OTG-INFO-012)|4.2.11 Map Network and Application Architecture (OTG-INFO-011) ]] formerly &amp;quot;Testing for Infrastructure Configuration Management Testing weakness (OWASP-CM-001)&amp;quot; [Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for configuration management|'''4.3 Configuration and Deploy Management Testing ''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for infrastructure configuration management (OWASP-CM-003)|4.3.1 Test Network/Infrastructure Configuration (OTG-CONFIG-001) ]] formerly &amp;quot;Testing for Infrastructure Configuration Management Testing weakness (OWASP-CM-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for application configuration management (OWASP-CM-004)|4.3.2 Test Application Platform Configuration (OTG-CONFIG-002) ]] formerly &amp;quot;Testing for Application Configuration Management weakness (OWASP-CM-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for file extensions handling  (OWASP-CM-005)|4.3.3 Test File Extensions Handling for Sensitive Information (OTG-CONFIG-003) ]] formerly &amp;quot;Testing for File Extensions Handling  (OWASP-CM-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Old, Backup and Unreferenced Files (OWASP-CM-006)|4.3.4 Review Old, Backup and Unreferenced Files for Sensitive Information (OTG-CONFIG-004) ]] formerly &amp;quot;Old, Backup and Unreferenced Files (OWASP-CM-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Admin Interfaces  (OWASP-CM-007)|4.3.5 Enumerate Infrastructure and Application Admin Interfaces (OTG-CONFIG-005) ]] formerly &amp;quot;Infrastructure and Application Admin Interfaces  (OWASP-CM-005)&amp;quot; [Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Methods and XST  (OWASP-CM-008)|4.3.6 Test HTTP Methods (OTG-CONFIG-006) ]] formerly &amp;quot;Testing for Bad HTTP Methods (OWASP-CM-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Database credentials/connection strings available|4.3.7 Testing for Database credentials/connection strings available (OTG-CONFIG-007) ]] formerly &amp;quot;Testing for Database credentials/connection strings available (OWASP-CM-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Content Security Policy weakness|4.3.8 Test Content Security Policy (OTG-CONFIG-008) ]] formerly &amp;quot;Testing for Content Security Policy weakness (OWASP-CM-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Missing HSTS header|4.3.9 Test HTTP Strict Transport Security (OTG-CONFIG-009) ]] formerly &amp;quot;Testing for Missing HSTS header (OWASP-CM-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Frame Options|4.3.10 Test Frame Options (OTG-CONFIG-010) ]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for RIA policy files weakness|4.3.11 Test RIA cross domain policy (OTG-CONFIG-011) ]] formerly &amp;quot;Testing for RIA policy files weakness (OWASP-CM-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Content Type Options|4.3.12 Test Content Type Options (OTG-CONFIG-012) ]] new&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing Identity Management|'''4.4 Identity Management Testing''']]&lt;br /&gt;
&lt;br /&gt;
[[Test Role Definitions (OTG-IDENT-001)|4.4.1 Test Role Definitions (OTG-IDENT-001)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test User Registration Process (OTG-IDENT-002)|4.4.2 Test User Registration Process (OTG-IDENT-002)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Provisioning Process (OTG-IDENT-003)|4.4.3 Test Account Provisioning Process (OTG-IDENT-003)]] New&lt;br /&gt;
&lt;br /&gt;
[[Testing for Account Enumeration and Guessable User Account (OWASP-AT-002)|4.4.4 Testing for Account Enumeration and Guessable User Account (OTG-IDENT-004) ]] formerly &amp;quot;Testing for Account Enumeration and Guessable User Account (OWASP-AT-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak or unenforced username policy (OWASP-AT-009)| 4.4.5 Testing for Weak or unenforced username policy (OTG-IDENT-005)]] formerly &amp;quot;Testing for Weak or unenforced username policy (OWASP-AT-009)&lt;br /&gt;
&lt;br /&gt;
[[Test Permissions of Guest/Training Accounts (OTG-IDENT-006)|4.4.6 Test Permissions of Guest/Training Accounts (OTG-IDENT-006)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Suspension/Resumption Process (OTG-IDENT-007)|4.4.7 Test Account Suspension/Resumption Process (OTG-IDENT-007)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test User Deregistration Process (OTG-IDENT-008)|4.4.8 Test User Deregistration Process (OTG-IDENT-008)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Deregistration Process (OTG-IDENT-009)|4.4.9 Test Account Deregistration Process (OTG-IDENT-009)]] New&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for authentication|'''4.5 Authentication Testing ''']] &lt;br /&gt;
&lt;br /&gt;
[[Testing for Credentials Transported over an Encrypted Channel (OWASP-AT-001)|4.5.1 Testing for Credentials Transported over an Encrypted Channel  (OTG-AUTHN-001)]] formerly &amp;quot;Testing for Credentials Transported over an Encrypted Channel  (OWASP-AT-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for default credentials (OWASP-AT-003)|4.5.2 Testing for default credentials (OTG-AUTHN-002)]] formerly &amp;quot;Testing for default credentials (OWASP-AT-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak lock out mechanism (OWASP-AT-004)|4.5.3 Testing for Weak lock out mechanism (OTG-AUTHN-003)]] formerly &amp;quot;Testing for Weak lock out mechanism (OWASP-AT-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Bypassing Authentication Schema (OWASP-AT-005)|4.5.4 Testing for bypassing authentication schema (OTG-AUTHN-004)]] formerly &amp;quot;Testing for bypassing authentication schema (OWASP-AT-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Vulnerable Remember Password (OWASP-AT-006)|4.5.5 Test remember password functionality (OTG-AUTHN-005)]] formerly &amp;quot;Testing for vulnerable remember password functionality (OWASP-AT-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Browser cache weakness (OWASP-AT-007)|4.5.6 Testing for Browser cache weakness (OTG-AUTHN-006)]] formerly &amp;quot;Testing for Browser cache weakness (OWASP-AT-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak password policy (OWASP-AT-008)|4.5.7 Testing for Weak password policy (OTG-AUTHN-007)]] formerly &amp;quot;Testing for Weak password policy (OWASP-AT-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak security question/answer (OTG-AUTHN-008)|4.5.8 Testing for Weak security question/answer (OTG-AUTHN-008)]] New! - Robert Winkel&lt;br /&gt;
&lt;br /&gt;
[[Testing for weak password change or reset functionalities (OWASP-AT-011)|4.5.9 Testing for weak password change or reset functionalities (OTG-AUTHN-009)]] formerly &amp;quot;Testing for weak password change or reset functionalities (OWASP-AT-011)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weaker authentication in alternative channel (OTG-AUTHN-010)|4.5.10 Testing for Weaker authentication in alternative channel (OTG-AUTHN-010)]] (e.g. mobile app, IVR, help desk)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Authorization|'''4.6 Authorization Testing''']] &lt;br /&gt;
&lt;br /&gt;
[[Test Management of Account Permissions (OTG-AUTHZ-001)|4.6.1 Test Management of Account Permissions (OTG-AUTHZ-001)]] New&lt;br /&gt;
&lt;br /&gt;
[[Testing for Path Traversal  (OWASP-AZ-001)|4.6.2 Testing Directory traversal/file include (OTG-AUTHZ-002)]] formerly &amp;quot;Testing Directory traversal/file include (OWASP-AZ-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Bypassing Authorization Schema  (OWASP-AZ-002)|4.6.3 Testing for bypassing authorization schema (OTG-AUTHZ-003)]] formerly &amp;quot;Testing for bypassing authorization schema  (OWASP-AZ-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Privilege escalation  (OWASP-AZ-003)|4.6.4 Testing for Privilege Escalation (OTG-AUTHZ-004)]] formerly &amp;quot;Testing for Privilege Escalation  (OWASP-AZ-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure Direct Object References (OWASP-AZ-004)|4.6.5 Testing for Insecure Direct Object References (OTG-AUTHZ-005)]] formerly &amp;quot;Testing for Insecure Direct Object References (OWASP-AZ-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Failure to Restrict access to authorized resource (OWASP-AZ-005)|4.6.6 Testing for Failure to Restrict access to authorized resource (OTG-AUTHZ-006)]] formerly &amp;quot;Testing for Failure to Restrict access to authorized resource (OWASP-AZ-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test privileges of server components (OTG-AUTHZ-007)|4.6.7 Test privileges of server components (OTG-AUTHZ-007)]] (e.g. indexing service, reporting interface, file generator)&lt;br /&gt;
&lt;br /&gt;
[[Test enforcement of application entry points (OTG-AUTHZ-008)|4.6.8 Test enforcement of application entry points (OTG-AUTHZ-008)]] (including exposure of objects)&lt;br /&gt;
&lt;br /&gt;
[[Testing for failure to restrict access to authenticated resource(OWASP-AT-010)|4.6.9 Testing for failure to restrict access to authenticated resource (OTG-AUTHZ-009)]] formerly &amp;quot;Testing for failure to restrict access to authenticated resource (OWASP-AT-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session Management|'''4.7 Session Management Testing''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session_Management_Schema (OWASP-SM-001)|4.7.1 Testing for Bypassing Session Management Schema (OTG-SESS-001)]] formerly &amp;quot;Testing for Bypassing Session Management Schema (OWASP-SM-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for cookies attributes  (OWASP-SM-002)|4.7.2 Testing for Cookies attributes (OTG-SESS-002)]] formerly &amp;quot;Testing for Cookies attributes (OWASP-SM-002)&amp;quot; (Cookies are set not ‘HTTP Only’, ‘Secure’,  and no time validity)&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session Fixation  (OWASP-SM-003)|4.7.3 Testing for Session Fixation (OTG-SESS-003)]] formerly &amp;quot;Testing for Session Fixation  (OWASP-SM-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Exposed Session Variables  (OWASP-SM-004)|4.7.4 Testing for Exposed Session Variables (OTG-SESS-004)]] formerly &amp;quot;Testing for Exposed Session Variables (OWASP-SM-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for CSRF  (OWASP-SM-005)|4.7.5 Testing for Cross Site Request Forgery (CSRF) (OTG-SESS-005)]] formerly &amp;quot;Testing for Cross Site Request Forgery (CSRF) (OWASP-SM-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test Session Token Strength (OTG-SESS-006)|4.7.6 Test Session Token Strength (OTG-SESS-006)]]&lt;br /&gt;
 &lt;br /&gt;
[[Testing for logout functionality (OWASP-SM-007)|4.7.7 Testing for logout functionality (OTG-SESS-007)]] formerly &amp;quot;Testing for logout functionality (OWASP-SM-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session puzzling (OWASP-SM-008)|4.7.8 Testing for Session puzzling (OWASP-SM-008)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Session Timeout (OTG-SESS-008)|4.7.8 Test Session Timeout (OTG-SESS-008)]]&lt;br /&gt;
&lt;br /&gt;
[[Test multiple concurrent sessions (OTG-SESS-009)|4.7.9 Test multiple concurrent sessions (OTG-SESS-009)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Data Validation|'''4.8 Data Validation Testing''']] &lt;br /&gt;
&lt;br /&gt;
[[Testing for Reflected Cross site scripting (OWASP-DV-001) |4.8.1 Testing for Reflected Cross Site Scripting (OTG-INPVAL-001)]] formerly &amp;quot;Testing for Reflected Cross Site Scripting (OWASP-DV-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stored Cross site scripting (OWASP-DV-002) |4.8.2 Testing for Stored Cross Site Scripting (OTG-INPVAL-002)]] formerly &amp;quot;Testing for Stored Cross Site Scripting (OWASP-DV-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Verb Tampering (OWASP-DV-003)|4.8.3 Testing for HTTP Verb Tampering (OTG-INPVAL-003)]] formerly &amp;quot;Testing for HTTP Verb Tampering (OWASP-DV-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Parameter pollution (OWASP-DV-004)|4.8.4 Testing for HTTP Parameter pollution (OTG-INPVAL-004) ]] formerly &amp;quot;Testing for HTTP Parameter pollution (OWASP-DV-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Unvalidated Redirects and Forwards (OWASP-DV-004)|4.8.5 Testing for Unvalidated Redirects and Forwards (OTG-INPVAL-005) ]] formerly &amp;quot;Testing for Unvalidated Redirects and Forwards (OWASP-DV-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for SQL Injection (OWASP-DV-005)| 4.8.6 Testing for SQL Injection (OTG-INPVAL-006)]] formerly &amp;quot;Testing for SQL Injection (OWASP-DV-005)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[Testing for Oracle|4.8.6.1 Oracle Testing]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for MySQL|4.8.6.2 MySQL Testing [Ismael Gonçalves]]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for SQL Server|4.8.6.3 SQL Server Testing]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Backend_Security_Project_Testing_PostgreSQL|4.8.6.4 Testing PostgreSQL (from OWASP BSP) ]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for MS Access |4.8.6.5 MS Access Testing]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for NoSQL injection|4.8.6.6 Testing for NoSQL injection [New!]]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for LDAP Injection  (OWASP-DV-006)|4.8.7 Testing for LDAP Injection  (OTG-INPVAL-007)]] formerly &amp;quot;Testing for LDAP Injection  (OWASP-DV-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for ORM Injection   (OWASP-DV-007)|4.8.8 Testing for ORM Injection   (OTG-INPVAL-008)]] formerly &amp;quot;Testing for ORM Injection   (OWASP-DV-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for XML Injection (OWASP-DV-008)|4.8.9 Testing for XML Injection (OTG-INPVAL-009)]] formerly &amp;quot;Testing for XML Injection (OWASP-DV-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for SSI Injection  (OWASP-DV-009)|4.8.10 Testing for SSI Injection  (OTG-INPVAL-010)]] formerly &amp;quot;Testing for SSI Injection  (OWASP-DV-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for XPath Injection  (OWASP-DV-010)|4.8.11 Testing for XPath Injection  (OTG-INPVAL-011)]] formerly &amp;quot;Testing for XPath Injection  (OWASP-DV-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for IMAP/SMTP Injection  (OWASP-DV-011)|4.8.12 IMAP/SMTP Injection  (OTG-INPVAL-012)]] formerly &amp;quot;IMAP/SMTP Injection  (OWASP-DV-011)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Code Injection  (OWASP-DV-012)|4.8.13 Testing for Code Injection  (OTG-INPVAL-013)]] formerly &amp;quot;Testing for Code Injection  (OWASP-DV-012)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Local File Inclusion|4.8.13.1 Testing for Local File Inclusion]] [Alexander Antukh]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Remote File Inclusion|4.8.13.2 Testing for Remote File Inclusion]] [Alexander Antukh]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Command Injection   (OWASP-DV-013)|4.8.14 Testing for Command Injection   (OTG-INPVAL-014)]] formerly &amp;quot;Testing for Command Injection   (OWASP-DV-013)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Buffer Overflow (OWASP-DV-014)|4.8.15 Testing for Buffer overflow (OTG-INPVAL-015)]] formerly &amp;quot;Testing for Buffer overflow (OWASP-DV-014)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Heap Overflow|4.8.15.1 Testing for Heap overflow]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stack Overflow|4.8.15.2 Testing for Stack overflow]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Format String|4.8.15.3 Testing for Format string]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Incubated Vulnerability (OWASP-DV-015)|4.8.16 Testing for incubated vulnerabilities (OTG-INPVAL-016)]] formerly &amp;quot;Testing for incubated vulnerabilities (OWASP-DV-015)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Splitting/Smuggling  (OWASP-DV-016)|4.8.17 Testing for HTTP Splitting/Smuggling  (OTG-INPVAL-017) ]] formerly &amp;quot;Testing for HTTP Splitting/Smuggling  (OWASP-DV-016)&amp;quot; [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Error Handling|'''4.9 Error Handling''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Error Code (OWASP-IG-006)|4.9.1 Analysis of Error Codes (OTG-ERR-001)]] formerly &amp;quot;Analysis of Error Codes (OWASP-IG-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stack Traces (OWASP-IG-XXX)|4.9.2 Analysis of Stack Traces (OTG-ERR-002)]] formerly &amp;quot;Analysis of Stack Traces&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Cryptography|'''4.10 Cryptography''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure encryption usage (OWASP-EN-001)| 4.10.1  Testing for Insecure encryption usage (OTG-CRYPST-001)]] formerly &amp;quot;Testing for Insecure encryption usage (OWASP-EN-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OWASP-EN-002)| 4.10.2 Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OTG-CRYPST-002)]] formerly &amp;quot;Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OWASP-EN-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Padding Oracle (OWASP-EN-003)| 4.10.3 Testing for Padding Oracle (OTG-CRYPST-003)]] formerly &amp;quot;Testing for Padding Oracle (OWASP-EN-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Cacheable HTTPS Response (OTG-CRYPST-004)| 4.10.4 Testing for Cacheable HTTPS Response (OTG-CRYPST-004)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Cache Directives (OTG-CRYPST-005)|4.10.5 Test Cache Directives (OTG-CRYPST-005)]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure Cryptographic Storage (OTG-CRYPST-006)|4.10.6 Testing for Insecure Cryptographic Storage (OTG-CRYPST-006)]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-007)|4.10.7 Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-007)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Cryptographic Key Management (OTG-CRYPST-008)|4.10.8 Test Cryptographic Key Management (OTG-CRYPST-008)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Logging|'''4.11 Logging''']] Not convinced Logging should be included as it requires access to logs to test&lt;br /&gt;
&lt;br /&gt;
[[Test time synchronisation (OTG-LOG-001)|4.11.1 Test time synchronisation (OTG-LOG-001) ]] formerly &amp;quot;Incorrect time&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test user-viewable log of authentication events (OTG-LOG-002)|4.11.2 Test user-viewable log of authentication events (OTG-LOG-002)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for business logic   (OWASP-BL-001)|'''4.12 Business Logic Testing  (OWASP-BL-001)''']] [To review--&amp;gt; David Fern]&lt;br /&gt;
Business Logic&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Test business logic data validation (OTG-BUSLOGIC-001)|4.12.1 Test business logic data validation (OTG-BUSLOGIC-001)]] [New!] NOTE MAT: to discuss this section&lt;br /&gt;
&lt;br /&gt;
[[Test Ability to forge requests (OTG-BUSLOGIC-002)|4.12.2 Test Ability to forge requests (OTG-BUSLOGIC-002)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test integrity checks (OTG-BUSLOGIC-003)|4.12.3 Test integrity checks (OTG-BUSLOGIC-003)]] (e.g. overwriting updates) [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test tamper evidence (OTG-BUSLOGIC-004)|4.12.4 Test tamper evidence (OTG-BUSLOGIC-004)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test excessive rate (speed) of use limits (OTG-BUSLOGIC-005)|4.12.5 Test excessive rate (speed) of use limits (OTG-BUSLOGIC-005)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test size of request limits (OTG-BUSLOGIC-006)|4.12.6 Test size of request limits (OTG-BUSLOGIC-006)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test number of times a function can be used limits (OTG-BUSLOGIC-007)|4.12.7 Test number of times a function can be used limits (OTG-BUSLOGIC-002)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test bypass of correct sequence (OTG-BUSLOGIC-008)|4.12.8 Test bypass of correct sequence (OTG-BUSLOGIC-008)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test self-hosted payment cardholder data processing (OTG-BUSLOGIC-009)|4.12.9 Test self-hosted payment cardholder data processing (OTG-BUSLOGIC-009)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test security incident reporting information (OTG-BUSLOGIC-010)|4.12.10 Test security incident reporting information (OTG-BUSLOGIC-010)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test defenses against application mis-use (OTG-BUSLOGIC-011)|4.12.11 Test defenses against application mis-use (OTG-BUSLOGIC-011)]] [New!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Denial of Service|'''4.13 Denial of Service''']]&lt;br /&gt;
&lt;br /&gt;
[[Test Regular expression DoS (OTG-DOS-001)| 4.13.1 Test Regular expression DoS (OTG-DOS-001)]] [New!] note: to understand better&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Test XML DoS (OTG-DOS-002)| 4.13.2 Test XML DoS (OTG-DOS-002)]] [New! - Andrew Muller]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Captcha (OWASP-AT-012)|4.13.3 Testing for CAPTCHA (OTG-DOS-003)]] formerly &amp;quot;Testing for CAPTCHA (OWASP-AT-012)&amp;quot; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Web Service (XML Interpreter)|'''4.14 Web Service Testing''']] [Tom Eston] &lt;br /&gt;
&lt;br /&gt;
[[Scoping a Web Service Test (OWASP-WS-001)|4.14.1 Scoping a Web Service Test (OTG-WEBSVC-001)]] formerly &amp;quot;Scoping a Web Service Test (OWASP-WS-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Information Gathering (OWASP-WS-002)|4.14.2 WS Information Gathering (OTG-WEBSVC-002)]] formerly &amp;quot;WS Information Gathering (OWASP-WS-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Authentication Testing (OWASP-WS-003)|4.14.3 WS Authentication Testing (OTG-WEBSVC-003)]] formerly &amp;quot;WS Authentication Testing (OWASP-WS-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Management Interface Testing (OWASP-WS-004)|4.14.4 WS Management Interface Testing (OTG-WEBSVC-004)]] formerly &amp;quot;WS Management Interface Testing (OWASP-WS-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Weak XML Structure Testing (OWASP-WS-005)|4.14.5 Weak XML Structure Testing (OTG-WEBSVC-005)]] formerly &amp;quot;Weak XML Structure Testing (OWASP-WS-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[XML Content-Level Testing (OWASP-WS-006)|4.14.6 XML Content-Level Testing (OTG-WEBSVC-006)]] formerly &amp;quot;XML Content-Level Testing (OWASP-WS-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS HTTP GET Parameters/REST Testing (OWASP-WS-007)|4.14.7 WS HTTP GET Parameters/REST Testing (OTG-WEBSVC-007)]] formerly &amp;quot;WS HTTP GET Parameters/REST Testing (OWASP-WS-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Naughty SOAP Attachment Testing (OWASP-WS-008)|4.14.8 WS Naughty SOAP Attachment Testing (OTG-WEBSVC-008)]] formerly &amp;quot;WS Naughty SOAP Attachment Testing (OWASP-WS-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Replay/MiTM Testing (OWASP-WS-009)|4.14.9 WS Replay/MiTM Testing (OTG-WEBSVC-009)]] formerly &amp;quot;WS Replay/MiTM Testing (OWASP-WS-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS BEPL Testing (OWASP-WS-010)|4.14.10 WS BEPL Testing (OTG-WEBSVC-010)]] formerly &amp;quot;WS BEPL Testing (OWASP-WS-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Client Side Testing|'''4.15 Client Side Testing''']] [New!] &lt;br /&gt;
&lt;br /&gt;
[[Testing for DOM-based Cross site scripting  (OWASP-DV-003)|4.15.1 Testing for DOM based Cross Site Scripting  (OTG-CLIENT-001)]] formerly &amp;quot;Testing for DOM based Cross Site Scripting  (OWASP-CS-001)&amp;quot; [Stefano Di Paola]&lt;br /&gt;
&lt;br /&gt;
[[Test Cross Origin Resource Sharing (OTG-CLIENT-002)|4.15.2 Test Cross Origin Resource Sharing (OTG-CLIENT-002)]] formerly &amp;quot;Testing for HTML5 (OWASP CS-002)&amp;quot; [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Cross site flashing (OWASP-DV-004)|4.15.3 Testing for Cross Site Flashing   (OTG-CLIENT-003)]] formerly &amp;quot;Testing for Cross Site Flashing   (OWASP-CS-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Clickjacking (OWASP-CS-004)|4.15.4 Testing for Clickjacking (OTG-CLIENT-004)]] formerly &amp;quot;Testing for Clickjacking (OWASP-CS-004)&amp;quot; [Davide Danelon]&lt;br /&gt;
&lt;br /&gt;
[[Testing WebSockets (OTG-CLIENT-005)|4.15.5 Testing WebSockets (OTG-CLIENT-005)]] [Ryan Dewhurst]&lt;br /&gt;
&lt;br /&gt;
[[Test Web Messaging (OTG-CLIENT-006)|4.15.6 Test Web Messaging (OTG-CLIENT-006)]] [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
[[Test Local Storage (OTG-CLIENT-007)|4.15.7 Test Local Storage (OTG-CLIENT-007)]] [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
==[[Writing Reports: value the real risk |5. Writing Reports: value the real risk ]]== &lt;br /&gt;
&lt;br /&gt;
[[How to value the real risk |5.1 How to value the real risk]] [To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[How to write the report of the testing |5.2 How to write the report of the testing]] [To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
==[[Appendix A: Testing Tools |Appendix A: Testing Tools ]]==&lt;br /&gt;
&lt;br /&gt;
* Black Box Testing Tools [To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix B: Suggested Reading | Appendix B: Suggested Reading]]==&lt;br /&gt;
* Whitepapers [To review--&amp;gt; David Fern]&lt;br /&gt;
* Books [To review--&amp;gt; David Fern]&lt;br /&gt;
* Useful Websites [To review--&amp;gt; David Fern]&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix C: Fuzz Vectors | Appendix C: Fuzz Vectors]]== &lt;br /&gt;
&lt;br /&gt;
* Fuzz Categories [To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix D: Encoded Injection | Appendix D: Encoded Injection]]==  [To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Testing Project]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Risk_Rating_Methodology&amp;diff=161133</id>
		<title>OWASP Risk Rating Methodology</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Risk_Rating_Methodology&amp;diff=161133"/>
				<updated>2013-10-19T00:32:22Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The OWASP Risk Rating Methodology== &lt;br /&gt;
&lt;br /&gt;
Discovering vulnerabilities is important, but just as important is being able to estimate the associated risk to the business. Early in the lifecycle, you may identify security concerns in the architecture or design by using [[threat modeling]].  Later, you may find security issues using [[code review]] or [[penetration testing]].  Or you may not discover a problem until the application is in production and is actually compromised.&lt;br /&gt;
&lt;br /&gt;
By following the approach here, you'll be able to estimate the severity of all of these risks to your business, and make an informed decision about what to do about them. Having a system in place for rating risks will save time and eliminate arguing about priorities. This system will help to ensure that you don't get distracted by minor risks while ignoring more serious risks that are less well understood.&lt;br /&gt;
&lt;br /&gt;
Ideally, there would be a universal risk rating system that would accurately estimate all risks for all organizations. But a vulnerability that is critical to one organization may not be very important to another. So a basic framework is presented here that you ''should customize'' for your organization.&lt;br /&gt;
&lt;br /&gt;
The authors have tried hard to make this model simple enough to use, while keeping enough detail for accurate risk estimates to be made. Please reference the section below on customization for more information about tailoring the model for use in your organization.&lt;br /&gt;
&lt;br /&gt;
==Approach==&lt;br /&gt;
&lt;br /&gt;
There are many different approaches to risk analysis. See the reference section below for some of the most common ones. The OWASP approach presented here is based on these standard methodologies and is customized for application security.&lt;br /&gt;
&lt;br /&gt;
Let's start with the standard risk model:&lt;br /&gt;
&lt;br /&gt;
       '''Risk = Likelihood * Impact'''&lt;br /&gt;
&lt;br /&gt;
In the sections below, we break down the factors that make up &amp;quot;likelihood&amp;quot; and &amp;quot;impact&amp;quot; for application security and show how to combine them to determine the overall severity for the risk.&lt;br /&gt;
&lt;br /&gt;
* [[#Step 1: Identifying a Risk]]&lt;br /&gt;
* [[#Step 2: Factors for Estimating Likelihood]]&lt;br /&gt;
* [[#Step 3: Factors for Estimating Impact]]&lt;br /&gt;
* [[#Step 4: Determining Severity of the Risk]]&lt;br /&gt;
* [[#Step 5: Deciding What to Fix]]&lt;br /&gt;
* [[#Step 6: Customizing Your Risk Rating Model]]&lt;br /&gt;
&lt;br /&gt;
==Step 1: Identifying a Risk==&lt;br /&gt;
&lt;br /&gt;
The first step is to identify a security risk that needs to be rated. You'll need to gather information about the [[threat agent]] involved, the [[attack]] they're using, the [[vulnerability]] involved, and the [[impact]] of a successful exploit on your business. There may be multiple possible groups of attackers, or even multiple possible business impacts.  In general, it's best to err on the side of caution by using the worst-case option, as that will result in the highest overall risk.&lt;br /&gt;
&lt;br /&gt;
==Step 2: Factors for Estimating Likelihood==&lt;br /&gt;
&lt;br /&gt;
Once you've identified a potential risk, and want to figure out how serious it is, the first step is to estimate the &amp;quot;likelihood&amp;quot;. At the highest level, this is a rough measure of how likely this particular vulnerability is to be uncovered and exploited by an attacker. We do not need to be over-precise in this estimate. Generally, identifying whether the likelihood is low, medium, or high is sufficient.&lt;br /&gt;
&lt;br /&gt;
There are a number of factors that can help us figure this out. The first set of factors are related to the [[threat agent]] involved. The goal is to estimate the likelihood of a successful attack from a group of possible attackers. Note that there may be multiple threat agents that can exploit a particular vulnerability, so it's usually best to use the worst-case scenario. For example, an insider may be a much more likely attacker than an anonymous outsider - but it depends on a number of factors.&lt;br /&gt;
&lt;br /&gt;
Note that each factor has a set of options, and each option has a likelihood rating from 0 to 9 associated with it. We'll use these numbers later to estimate the overall likelihood.&lt;br /&gt;
&lt;br /&gt;
===[[Threat Agent]] Factors===&lt;br /&gt;
&lt;br /&gt;
The first set of factors are related to the [[threat agent]] involved. The goal here is to estimate the likelihood of a successful attack by this group of threat agents. Use the worst-case threat agent.&lt;br /&gt;
&lt;br /&gt;
; Skill level&lt;br /&gt;
: How technically skilled is this group of threat agents? Security penetration skills (9), network and programming skills (6), advanced computer user (4), some technical skills (3), no technical skills (1)&lt;br /&gt;
&lt;br /&gt;
; Motive&lt;br /&gt;
: How motivated is this group of threat agents to find and exploit this vulnerability? Low or no reward (1), possible reward (4), high reward (9)&lt;br /&gt;
&lt;br /&gt;
; Opportunity&lt;br /&gt;
: What resources and opportunity are required for this group of threat agents to find and exploit this vulnerability? full access or expensive resources required (0), special access or resources required (4), some access or resources required (7), no access or resources required (9)&lt;br /&gt;
&lt;br /&gt;
; Size&lt;br /&gt;
: How large is this group of threat agents? Developers (2), system administrators (2), intranet users (4), partners (5), authenticated users (6), anonymous Internet users (9)&lt;br /&gt;
&lt;br /&gt;
===[[Vulnerability]] Factors===&lt;br /&gt;
&lt;br /&gt;
The next set of factors are related to the [[vulnerability]] involved. The goal here is to estimate the likelihood of the particular vulnerability involved being discovered and exploited. Assume the threat agent selected above.&lt;br /&gt;
&lt;br /&gt;
; Ease of discovery&lt;br /&gt;
: How easy is it for this group of threat agents to discover this vulnerability? Practically impossible (1), difficult (3), easy (7), automated tools available (9)&lt;br /&gt;
&lt;br /&gt;
; Ease of exploit&lt;br /&gt;
: How easy is it for this group of threat agents to actually exploit this vulnerability? Theoretical (1), difficult (3), easy (5), automated tools available (9)&lt;br /&gt;
&lt;br /&gt;
; Awareness&lt;br /&gt;
: How well known is this vulnerability to this group of threat agents? Unknown (1), hidden (4), obvious (6), public knowledge (9)&lt;br /&gt;
&lt;br /&gt;
; Intrusion detection&lt;br /&gt;
: How likely is an exploit to be detected? Active detection in application (1), logged and reviewed (3), logged without review (8), not logged (9)&lt;br /&gt;
&lt;br /&gt;
==Step 3: Factors for Estimating Impact==&lt;br /&gt;
&lt;br /&gt;
When considering the impact of a successful attack, it's important to realize that there are two kinds of impacts. The first is the &amp;quot;technical impact&amp;quot; on the application, the data it uses, and the functions it provides.  The other is the &amp;quot;business impact&amp;quot; on the business and company operating the application.&lt;br /&gt;
&lt;br /&gt;
Ultimately, the business impact is more important. However, you may not have access to all the information required to figure out the business consequences of a successful exploit. In this case, providing as much detail about the technical risk will enable the appropriate business representative to make a decision about the business risk.&lt;br /&gt;
&lt;br /&gt;
Again, each factor has a set of options, and each option has an impact rating from 0 to 9 associated with it. We'll use these numbers later to estimate the overall impact.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Technical Impact Factors===&lt;br /&gt;
&lt;br /&gt;
Technical impact can be broken down into factors aligned with the traditional security areas of concern: confidentiality, integrity, availability, and accountability. The goal is to estimate the magnitude of the impact on the system if the vulnerability were to be exploited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Loss of confidentiality&lt;br /&gt;
: How much data could be disclosed and how sensitive is it? Minimal non-sensitive data disclosed (2), minimal critical data disclosed (6), extensive non-sensitive data disclosed (6), extensive critical data disclosed (7), all data disclosed (9)&lt;br /&gt;
&lt;br /&gt;
; Loss of integrity&lt;br /&gt;
: How much data could be corrupted and how damaged is it? Minimal slightly corrupt data (1), minimal seriously corrupt data (3), extensive slightly corrupt data (5), extensive seriously corrupt data (7), all data totally corrupt (9)&lt;br /&gt;
&lt;br /&gt;
; Loss of availability&lt;br /&gt;
: How much service could be lost and how vital is it? Minimal secondary services interrupted (1), minimal primary services interrupted (5), extensive secondary services interrupted (5), extensive primary services interrupted (7), all services completely lost (9)&lt;br /&gt;
&lt;br /&gt;
; Loss of accountability&lt;br /&gt;
: Are the threat agents' actions traceable to an individual? Fully traceable (1), possibly traceable (7), completely anonymous (9)&lt;br /&gt;
&lt;br /&gt;
===Business Impact Factors===&lt;br /&gt;
&lt;br /&gt;
The business impact stems from the technical impact, but requires a deep understanding of what is important to the company running the application. In general, you should be aiming to support your risks with business impact, particularly if your audience is executive level. The business risk is what justifies investment in fixing security problems.&lt;br /&gt;
&lt;br /&gt;
Many companies have an asset classification guide and/or a business impact reference to help formalize what is important to their business. These standards can help you focus on what's truly important for security. If these aren't available, then talk with people who understand the business to get their take on what's important.&lt;br /&gt;
&lt;br /&gt;
The factors below are common areas for many businesses, but this area is even more unique to a company than the factors related to threat agent, vulnerability, and technical impact.&lt;br /&gt;
&lt;br /&gt;
; Financial damage&lt;br /&gt;
: How much financial damage will result from an exploit? Less than the cost to fix the vulnerability (1), minor effect on annual profit (3), significant effect on annual profit (7), bankruptcy (9)&lt;br /&gt;
&lt;br /&gt;
; Reputation damage&lt;br /&gt;
: Would an exploit result in reputation damage that would harm the business? Minimal damage (1), Loss of major accounts (4), loss of goodwill (5), brand damage (9)&lt;br /&gt;
&lt;br /&gt;
; Non-compliance&lt;br /&gt;
: How much exposure does non-compliance introduce? Minor violation (2), clear violation (5), high profile violation (7)&lt;br /&gt;
&lt;br /&gt;
; Privacy violation&lt;br /&gt;
: How much personally identifiable information could be disclosed? One individual (3), hundreds of people (5), thousands of people (7), millions of people (9)&lt;br /&gt;
&lt;br /&gt;
==Step 4: Determining the Severity of the Risk== &lt;br /&gt;
&lt;br /&gt;
In this step we're going to put together the likelihood estimate and the impact estimate to calculate an overall severity for this risk.  All you need to do here is figure out whether the likelihood is LOW, MEDIUM, or HIGH and then do the same for impact. We'll just split our 0 to 9 scale into three parts.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; width=&amp;quot;40%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Likelihood and Impact Levels&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;0 to &amp;amp;lt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; bgcolor=&amp;quot;lightgreen&amp;quot;&amp;gt;LOW&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;3 to &amp;amp;lt;6&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;MEDIUM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;6 to 9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;red&amp;quot;&amp;gt;HIGH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Informal Method===&lt;br /&gt;
&lt;br /&gt;
In many environments, there is nothing wrong with &amp;quot;eyeballing&amp;quot; the factors and simply capturing the answers. You should think through the factors and identify the key &amp;quot;driving&amp;quot; factors that are controlling the result. You may discover that your initial impression was wrong by considering aspects of the risk that weren't obvious.&lt;br /&gt;
&lt;br /&gt;
===Repeatable Method===&lt;br /&gt;
&lt;br /&gt;
If you need to defend your ratings or make them repeatable, then you may want to go through a more formal process of rating the factors and calculating the result. Remember that there is quite a lot of uncertainty in these estimates, and that these factors are intended to help you arrive at a sensible result. This process can be supported by automated tools to make the calculation easier. &lt;br /&gt;
&lt;br /&gt;
The first step is to select one of the options associated with each factor and enter the associated number in the table. Then you simply take the average of the scores to calculate the overall likelihood. For example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Threat agent factors&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td  colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Vulnerability factors&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Skill level&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Motive&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Opportunity&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Size&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;2%&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Ease of discovery&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Ease of exploit&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Awareness&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Intrusion detection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;7&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;6&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;9&amp;quot; align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;lightblue&amp;quot;&amp;gt;Overall likelihood=4.375 (MEDIUM)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Next, we need to figure out the overall impact. The process is similar here. In many cases the answer will be obvious, but you can make an estimate based on the factors, or you can average the scores for each of the factors. Again, less than 3 is LOW, 3 to less than 6 is MEDIUM, and 6 to 9 is HIGH.  For example:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Technical Impact&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td  colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Business Impact&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Loss of confidentiality&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Loss of integrity&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Loss of availability&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Loss of accountability&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;2%&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Financial damage&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Reputation damage&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Non-compliance&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Privacy violation&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;7&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;8&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;lightblue&amp;quot;&amp;gt;Overall technical impact=7.25 (HIGH)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;lightblue&amp;quot;&amp;gt;Overall business impact=2.25 (LOW)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Determining Severity===&lt;br /&gt;
&lt;br /&gt;
However we arrived at the likelihood and impact estimates, we can now combine them to get a final severity rating for this risk. Note that if you have good business impact information, you should use that instead of the technical impact information.  But if you have no information about the business, then technical impact is the next best thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Overall Risk Severity&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;15%&amp;quot; rowspan=&amp;quot;4&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Impact&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;15%&amp;quot;&amp;gt;HIGH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;15%&amp;quot; bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;15%&amp;quot; bgcolor=&amp;quot;red&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;15%&amp;quot; bgcolor=&amp;quot;pink&amp;quot;&amp;gt;Critical&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;MEDIUM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Low&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;red&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;LOW&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;lightgreen&amp;quot;&amp;gt;Note&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Low&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;LOW&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;MEDIUM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;HIGH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Likelihood&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the example above, the likelihood is MEDIUM, and the technical impact is HIGH, so from a purely technical perspective, it appears that the overall severity is HIGH.  However, note that the business impact is actually LOW, so the overall severity is best described as LOW as well. This is why understanding the business context of the vulnerabilities you are evaluating is so critical to making good risk decisions. Failure to understand this context can lead to the lack of trust between the business and security teams that is present in many organizations.&lt;br /&gt;
&lt;br /&gt;
==Step 5: Deciding What to Fix==&lt;br /&gt;
&lt;br /&gt;
After you've classified the risks to your application, you'll have a prioritized list of what to fix. As a general rule, you should fix the most severe risks first. It simply doesn't help your overall risk profile to fix less important risks, even if they're easy or cheap to fix.&lt;br /&gt;
&lt;br /&gt;
Remember, not all risks are worth fixing, and some loss is not only expected, but justifiable based upon the cost of fixing the issue. For example, if it would cost $100,000 to implement controls to stem $2,000 of fraud per year, it would take 50 years return on investment to stamp out the loss. But remember there may be reputation damage from the fraud that could cost the organization much more.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Step 6: Customizing Your Risk Rating Model==&lt;br /&gt;
&lt;br /&gt;
Having a risk ranking framework that's customizable for a business is critical for adoption.  A tailored model is much more likely to produce results that match people's perceptions about what is a serious risk. You can waste lots of time arguing about the risk ratings if they're not supported by a model like this. There are several ways to tailor this model for your organization.&lt;br /&gt;
&lt;br /&gt;
===Adding factors===&lt;br /&gt;
&lt;br /&gt;
You can choose different factors that better represent what's important for your organization. For example, a military application might add impact factors related to loss of human life or classified information. You might also add likelihood factors, such as the window of opportunity for an attacker or encryption algorithm strength.&lt;br /&gt;
&lt;br /&gt;
===Customizing options===&lt;br /&gt;
&lt;br /&gt;
There are some sample options associated with each factor, but the model will be much more effective if you customize these options to your business. For example, use the names of the different teams and your names for different classifications of information. You can also change the scores associated with the options. The best way to identify the right scores is to compare the ratings produced by the model with ratings produced by a team of experts. You can tune the model by carefully adjusting the scores to match.&lt;br /&gt;
&lt;br /&gt;
===Weighting factors===&lt;br /&gt;
&lt;br /&gt;
The model above assumes that all the factors are equally important. You can weight the factors to emphasize the factors that are more significant for your business. This makes the model a bit more complex, as you'll need to use a weighted average. But otherwise everything works the same. Again, you can tune the model by matching it against risk ratings you agree are accurate.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
* Managing Information Security Risk: Organization, Mission, and Information System View [http://csrc.nist.gov/publications/nistpubs/800-39/SP800-39-final.pdf]&lt;br /&gt;
&lt;br /&gt;
* Industry standard vulnerability severity and risk rankings (CVSS) [http://www.first.org/cvss/]&lt;br /&gt;
&lt;br /&gt;
* Security-enhancing process models (CLASP) [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project]&lt;br /&gt;
&lt;br /&gt;
* Cheat Sheet: Web Application Security Frame - MSDN - Microsoft [http://msdn.microsoft.com/en-us/library/ff649461.aspx]&lt;br /&gt;
&lt;br /&gt;
* [[Threat_Risk_Modeling|Threat Risk Modeling]]&lt;br /&gt;
&lt;br /&gt;
* Pratical Threat Analysis [http://www.ptatechnologies.com/]&lt;br /&gt;
&lt;br /&gt;
* Application Security Risk Assessment Guidelines [http://kb.wisc.edu/page.php?id=20262]&lt;br /&gt;
&lt;br /&gt;
* A Platform for Risk Analysis of Security Critical Systems [http://sourceforge.net/projects/coras/]&lt;br /&gt;
&lt;br /&gt;
* Model-driven Development and Analysis of Secure Information Systems [http://heim.ifi.uio.no/~ketils/securis/]&lt;br /&gt;
&lt;br /&gt;
* Value Driven Security Threat Modeling Based on Attack Path Analysis [http://origin-www.computer.org/csdl/proceedings/hicss/2007/2755/00/27550280a.pdf]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Risk_Rating_Methodology&amp;diff=161132</id>
		<title>OWASP Risk Rating Methodology</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Risk_Rating_Methodology&amp;diff=161132"/>
				<updated>2013-10-19T00:29:42Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The OWASP Risk Rating Methodology== &lt;br /&gt;
&lt;br /&gt;
Discovering vulnerabilities is important, but just as important is being able to estimate the associated risk to the business. Early in the lifecycle, you may identify security concerns in the architecture or design by using [[threat modeling]].  Later, you may find security issues using [[code review]] or [[penetration testing]].  Or you may not discover a problem until the application is in production and is actually compromised.&lt;br /&gt;
&lt;br /&gt;
By following the approach here, you'll be able to estimate the severity of all of these risks to your business, and make an informed decision about what to do about them. Having a system in place for rating risks will save time and eliminate arguing about priorities. This system will help to ensure that you don't get distracted by minor risks while ignoring more serious risks that are less well understood.&lt;br /&gt;
&lt;br /&gt;
Ideally, there would be a universal risk rating system that would accurately estimate all risks for all organizations. But a vulnerability that is critical to one organization may not be very important to another. So a basic framework is presented here that you ''should customize'' for your organization.&lt;br /&gt;
&lt;br /&gt;
The authors have tried hard to make this model simple enough to use, while keeping enough detail for accurate risk estimates to be made. Please reference the section below on customization for more information about tailoring the model for use in your organization.&lt;br /&gt;
&lt;br /&gt;
==Approach==&lt;br /&gt;
&lt;br /&gt;
There are many different approaches to risk analysis. See the reference section below for some of the most common ones. The OWASP approach presented here is based on these standard methodologies and is customized for application security.&lt;br /&gt;
&lt;br /&gt;
Let's start with the standard risk model:&lt;br /&gt;
&lt;br /&gt;
       '''Risk = Likelihood * Impact'''&lt;br /&gt;
&lt;br /&gt;
In the sections below, we break down the factors that make up &amp;quot;likelihood&amp;quot; and &amp;quot;impact&amp;quot; for application security and show how to combine them to determine the overall severity for the risk.&lt;br /&gt;
&lt;br /&gt;
* [[#Step 1: Identifying a Risk]]&lt;br /&gt;
* [[#Step 2: Factors for Estimating Likelihood]]&lt;br /&gt;
* [[#Step 3: Factors for Estimating Impact]]&lt;br /&gt;
* [[#Step 4: Determining Severity of the Risk]]&lt;br /&gt;
* [[#Step 5: Deciding What to Fix]]&lt;br /&gt;
* [[#Step 6: Customizing Your Risk Rating Model]]&lt;br /&gt;
&lt;br /&gt;
==Step 1: Identifying a Risk==&lt;br /&gt;
&lt;br /&gt;
The first step is to identify a security risk that needs to be rated. You'll need to gather information about the [[threat agent]] involved, the [[attack]] they're using, the [[vulnerability]] involved, and the [[impact]] of a successful exploit on your business. There may be multiple possible groups of attackers, or even multiple possible business impacts.  In general, it's best to err on the side of caution by using the worst-case option, as that will result in the highest overall risk.&lt;br /&gt;
&lt;br /&gt;
==Step 2: Factors for Estimating Likelihood==&lt;br /&gt;
&lt;br /&gt;
Once you've identified a potential risk, and want to figure out how serious it is, the first step is to estimate the &amp;quot;likelihood&amp;quot;. At the highest level, this is a rough measure of how likely this particular vulnerability is to be uncovered and exploited by an attacker. We do not need to be over-precise in this estimate. Generally, identifying whether the likelihood is low, medium, or high is sufficient.&lt;br /&gt;
&lt;br /&gt;
There are a number of factors that can help us figure this out. The first set of factors are related to the [[threat agent]] involved. The goal is to estimate the likelihood of a successful attack from a group of possible attackers. Note that there may be multiple threat agents that can exploit a particular vulnerability, so it's usually best to use the worst-case scenario. For example, an insider may be a much more likely attacker than an anonymous outsider - but it depends on a number of factors.&lt;br /&gt;
&lt;br /&gt;
Note that each factor has a set of options, and each option has a likelihood rating from 0 to 9 associated with it. We'll use these numbers later to estimate the overall likelihood.&lt;br /&gt;
&lt;br /&gt;
===[[Threat Agent]] Factors===&lt;br /&gt;
&lt;br /&gt;
The first set of factors are related to the [[threat agent]] involved. The goal here is to estimate the likelihood of a successful attack by this group of threat agents. Use the worst-case threat agent.&lt;br /&gt;
&lt;br /&gt;
; Skill level&lt;br /&gt;
: How technically skilled is this group of threat agents? Security penetration skills (9), network and programming skills (6), advanced computer user (4), some technical skills (3), no technical skills (1)&lt;br /&gt;
&lt;br /&gt;
; Motive&lt;br /&gt;
: How motivated is this group of threat agents to find and exploit this vulnerability? Low or no reward (1), possible reward (4), high reward (9)&lt;br /&gt;
&lt;br /&gt;
; Opportunity&lt;br /&gt;
: What resources and opportunity are required for this group of threat agents to find and exploit this vulnerability? full access or expensive resources required (0), special access or resources required (4), some access or resources required (7), no access or resources required (9)&lt;br /&gt;
&lt;br /&gt;
; Size&lt;br /&gt;
: How large is this group of threat agents? Developers (2), system administrators (2), intranet users (4), partners (5), authenticated users (6), anonymous Internet users (9)&lt;br /&gt;
&lt;br /&gt;
===[[Vulnerability]] Factors===&lt;br /&gt;
&lt;br /&gt;
The next set of factors are related to the [[vulnerability]] involved. The goal here is to estimate the likelihood of the particular vulnerability involved being discovered and exploited. Assume the threat agent selected above.&lt;br /&gt;
&lt;br /&gt;
; Ease of discovery&lt;br /&gt;
: How easy is it for this group of threat agents to discover this vulnerability? Practically impossible (1), difficult (3), easy (7), automated tools available (9)&lt;br /&gt;
&lt;br /&gt;
; Ease of exploit&lt;br /&gt;
: How easy is it for this group of threat agents to actually exploit this vulnerability? Theoretical (1), difficult (3), easy (5), automated tools available (9)&lt;br /&gt;
&lt;br /&gt;
; Awareness&lt;br /&gt;
: How well known is this vulnerability to this group of threat agents? Unknown (1), hidden (4), obvious (6), public knowledge (9)&lt;br /&gt;
&lt;br /&gt;
; Intrusion detection&lt;br /&gt;
: How likely is an exploit to be detected? Active detection in application (1), logged and reviewed (3), logged without review (8), not logged (9)&lt;br /&gt;
&lt;br /&gt;
==Step 3: Factors for Estimating Impact==&lt;br /&gt;
&lt;br /&gt;
When considering the impact of a successful attack, it's important to realize that there are two kinds of impacts. The first is the &amp;quot;technical impact&amp;quot; on the application, the data it uses, and the functions it provides.  The other is the &amp;quot;business impact&amp;quot; on the business and company operating the application.&lt;br /&gt;
&lt;br /&gt;
Ultimately, the business impact is more important. However, you may not have access to all the information required to figure out the business consequences of a successful exploit. In this case, providing as much detail about the technical risk will enable the appropriate business representative to make a decision about the business risk.&lt;br /&gt;
&lt;br /&gt;
Again, each factor has a set of options, and each option has an impact rating from 0 to 9 associated with it. We'll use these numbers later to estimate the overall impact.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Technical Impact Factors===&lt;br /&gt;
&lt;br /&gt;
Technical impact can be broken down into factors aligned with the traditional security areas of concern: confidentiality, integrity, availability, and accountability. The goal is to estimate the magnitude of the impact on the system if the vulnerability were to be exploited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Loss of confidentiality&lt;br /&gt;
: How much data could be disclosed and how sensitive is it? Minimal non-sensitive data disclosed (2), minimal critical data disclosed (6), extensive non-sensitive data disclosed (6), extensive critical data disclosed (7), all data disclosed (9)&lt;br /&gt;
&lt;br /&gt;
; Loss of integrity&lt;br /&gt;
: How much data could be corrupted and how damaged is it? Minimal slightly corrupt data (1), minimal seriously corrupt data (3), extensive slightly corrupt data (5), extensive seriously corrupt data (7), all data totally corrupt (9)&lt;br /&gt;
&lt;br /&gt;
; Loss of availability&lt;br /&gt;
: How much service could be lost and how vital is it? Minimal secondary services interrupted (1), minimal primary services interrupted (5), extensive secondary services interrupted (5), extensive primary services interrupted (7), all services completely lost (9)&lt;br /&gt;
&lt;br /&gt;
; Loss of accountability&lt;br /&gt;
: Are the threat agents' actions traceable to an individual? Fully traceable (1), possibly traceable (7), completely anonymous (9)&lt;br /&gt;
&lt;br /&gt;
===Business Impact Factors===&lt;br /&gt;
&lt;br /&gt;
The business impact stems from the technical impact, but requires a deep understanding of what is important to the company running the application. In general, you should be aiming to support your risks with business impact, particularly if your audience is executive level. The business risk is what justifies investment in fixing security problems.&lt;br /&gt;
&lt;br /&gt;
Many companies have an asset classification guide and/or a business impact reference to help formalize what is important to their business. These standards can help you focus on what's truly important for security. If these aren't available, then talk with people who understand the business to get their take on what's important.&lt;br /&gt;
&lt;br /&gt;
The factors below are common areas for many businesses, but this area is even more unique to a company than the factors related to threat agent, vulnerability, and technical impact.&lt;br /&gt;
&lt;br /&gt;
; Financial damage&lt;br /&gt;
: How much financial damage will result from an exploit? Less than the cost to fix the vulnerability (1), minor effect on annual profit (3), significant effect on annual profit (7), bankruptcy (9)&lt;br /&gt;
&lt;br /&gt;
; Reputation damage&lt;br /&gt;
: Would an exploit result in reputation damage that would harm the business? Minimal damage (1), Loss of major accounts (4), loss of goodwill (5), brand damage (9)&lt;br /&gt;
&lt;br /&gt;
; Non-compliance&lt;br /&gt;
: How much exposure does non-compliance introduce? Minor violation (2), clear violation (5), high profile violation (7)&lt;br /&gt;
&lt;br /&gt;
; Privacy violation&lt;br /&gt;
: How much personally identifiable information could be disclosed? One individual (3), hundreds of people (5), thousands of people (7), millions of people (9)&lt;br /&gt;
&lt;br /&gt;
==Step 4: Determining the Severity of the Risk== &lt;br /&gt;
&lt;br /&gt;
In this step we're going to put together the likelihood estimate and the impact estimate to calculate an overall severity for this risk.  All you need to do here is figure out whether the likelihood is LOW, MEDIUM, or HIGH and then do the same for impact. We'll just split our 0 to 9 scale into three parts.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; width=&amp;quot;40%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Likelihood and Impact Levels&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;0 to &amp;amp;lt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; bgcolor=&amp;quot;lightgreen&amp;quot;&amp;gt;LOW&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;3 to &amp;amp;lt;6&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;MEDIUM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;6 to 9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;red&amp;quot;&amp;gt;HIGH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Informal Method===&lt;br /&gt;
&lt;br /&gt;
In many environments, there is nothing wrong with &amp;quot;eyeballing&amp;quot; the factors and simply capturing the answers. You should think through the factors and identify the key &amp;quot;driving&amp;quot; factors that are controlling the result. You may discover that your initial impression was wrong by considering aspects of the risk that weren't obvious.&lt;br /&gt;
&lt;br /&gt;
===Repeatable Method===&lt;br /&gt;
&lt;br /&gt;
If you need to defend your ratings or make them repeatable, then you may want to go through a more formal process of rating the factors and calculating the result. Remember that there is quite a lot of uncertainty in these estimates, and that these factors are intended to help you arrive at a sensible result. This process can be supported by automated tools to make the calculation easier. &lt;br /&gt;
&lt;br /&gt;
The first step is to select one of the options associated with each factor and enter the associated number in the table. Then you simply take the average of the scores to calculate the overall likelihood. For example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Threat agent factors&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td  colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Vulnerability factors&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Skill level&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Motive&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Opportunity&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Size&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;2%&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Ease of discovery&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Ease of exploit&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Awareness&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Intrusion detection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;7&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;6&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;9&amp;quot; align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;lightblue&amp;quot;&amp;gt;Overall likelihood=4.375 (MEDIUM)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Next, we need to figure out the overall impact. The process is similar here. In many cases the answer will be obvious, but you can make an estimate based on the factors, or you can average the scores for each of the factors. Again, less than 3 is LOW, 3 to less than 6 is MEDIUM, and 6 to 9 is HIGH.  For example:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Technical Impact&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td  colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Business Impact&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Loss of confidentiality&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Loss of integrity&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Loss of availability&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Loss of accountability&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;2%&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Financial damage&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Reputation damage&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Non-compliance&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Privacy violation&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;7&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;8&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;lightblue&amp;quot;&amp;gt;Overall technical impact=7.25 (HIGH)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;lightblue&amp;quot;&amp;gt;Overall business impact=2.25 (LOW)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Determining Severity===&lt;br /&gt;
&lt;br /&gt;
However we arrived at the likelihood and impact estimates, we can now combine them to get a final severity rating for this risk. Note that if you have good business impact information, you should use that instead of the technical impact information.  But if you have no information about the business, then technical impact is the next best thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Overall Risk Severity&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;15%&amp;quot; rowspan=&amp;quot;4&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Impact&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;15%&amp;quot;&amp;gt;HIGH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;15%&amp;quot; bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;15%&amp;quot; bgcolor=&amp;quot;red&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;15%&amp;quot; bgcolor=&amp;quot;pink&amp;quot;&amp;gt;Critical&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;MEDIUM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Low&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;red&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;LOW&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;lightgreen&amp;quot;&amp;gt;Note&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Low&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;LOW&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;MEDIUM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;HIGH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Likelihood&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the example above, the likelihood is MEDIUM, and the technical impact is HIGH, so from a purely technical perspective, it appears that the overall severity is HIGH.  However, note that the business impact is actually LOW, so the overall severity is best described as LOW as well. This is why understanding the business context of the vulnerabilities you are evaluating is so critical to making good risk decisions. Failure to understand this context can lead to the lack of trust between the business and security teams that is present in many organizations.&lt;br /&gt;
&lt;br /&gt;
==Step 5: Deciding What to Fix==&lt;br /&gt;
&lt;br /&gt;
After you've classified the risks to your application, you'll have a prioritized list of what to fix. As a general rule, you should fix the most severe risks first. It simply doesn't help your overall risk profile to fix less important risks, even if they're easy or cheap to fix.&lt;br /&gt;
&lt;br /&gt;
Remember, not all risks are worth fixing, and some loss is not only expected, but justifiable based upon the cost of fixing the issue. For example, if it would cost $100,000 to implement controls to stem $2,000 of fraud per year, it would take 50 years return on investment to stamp out the loss. But remember there may be reputation damage from the fraud that could cost the organization much more.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Step 6: Customizing Your Risk Rating Model==&lt;br /&gt;
&lt;br /&gt;
Having a risk ranking framework that's customizable for a business is critical for adoption.  A tailored model is much more likely to produce results that match people's perceptions about what is a serious risk. You can waste lots of time arguing about the risk ratings if they're not supported by a model like this. There are several ways to tailor this model for your organization.&lt;br /&gt;
&lt;br /&gt;
===Adding factors===&lt;br /&gt;
&lt;br /&gt;
You can choose different factors that better represent what's important for your organization. For example, a military application might add impact factors related to loss of human life or classified information. You might also add likelihood factors, such as the window of opportunity for an attacker or encryption algorithm strength.&lt;br /&gt;
&lt;br /&gt;
===Customizing options===&lt;br /&gt;
&lt;br /&gt;
There are some sample options associated with each factor, but the model will be much more effective if you customize these options to your business. For example, use the names of the different teams and your names for different classifications of information. You can also change the scores associated with the options. The best way to identify the right scores is to compare the ratings produced by the model with ratings produced by a team of experts. You can tune the model by carefully adjusting the scores to match.&lt;br /&gt;
&lt;br /&gt;
===Weighting factors===&lt;br /&gt;
&lt;br /&gt;
The model above assumes that all the factors are equally important. You can weight the factors to emphasize the factors that are more significant for your business. This makes the model a bit more complex, as you'll need to use a weighted average. But otherwise everything works the same. Again, you can tune the model by matching it against risk ratings you agree are accurate.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
* Managing Information Security Risk: Organization, Mission, and Information System View [http://csrc.nist.gov/publications/nistpubs/800-39/SP800-39-final.pdf]&lt;br /&gt;
&lt;br /&gt;
* Industry standard vulnerability severity and risk rankings (CVSS) [http://www.first.org/cvss/]&lt;br /&gt;
&lt;br /&gt;
* Security-enhancing process models (CLASP) [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project]&lt;br /&gt;
&lt;br /&gt;
* Cheat Sheet: Web Application Security Frame - MSDN - Microsoft [http://msdn.microsoft.com/en-us/library/ff649461.aspx]&lt;br /&gt;
&lt;br /&gt;
* Security In The Software Lifecycle from DHS [https://buildsecurityin.us-cert.gov/daisy/bsi/87/version/12/part/4/data/Draft+Security+in+the+Software+Lifcycle+v1.2.pdf?branch=main&amp;amp;language=default]&lt;br /&gt;
&lt;br /&gt;
* [[Threat_Risk_Modeling|Threat Risk Modeling]]&lt;br /&gt;
&lt;br /&gt;
* Pratical Threat Analysis [http://www.ptatechnologies.com/]&lt;br /&gt;
&lt;br /&gt;
* Application Security Risk Assessment Guidelines [http://kb.wisc.edu/page.php?id=20262]&lt;br /&gt;
&lt;br /&gt;
* A Platform for Risk Analysis of Security Critical Systems [http://sourceforge.net/projects/coras/]&lt;br /&gt;
&lt;br /&gt;
* Model-driven Development and Analysis of Secure Information Systems [http://heim.ifi.uio.no/~ketils/securis/]&lt;br /&gt;
&lt;br /&gt;
* Value Driven Security Threat Modeling Based on Attack Path Analysis [http://origin-www.computer.org/csdl/proceedings/hicss/2007/2755/00/27550280a.pdf]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Risk_Rating_Methodology&amp;diff=161131</id>
		<title>OWASP Risk Rating Methodology</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Risk_Rating_Methodology&amp;diff=161131"/>
				<updated>2013-10-19T00:24:57Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The OWASP Risk Rating Methodology== &lt;br /&gt;
&lt;br /&gt;
Discovering vulnerabilities is important, but just as important is being able to estimate the associated risk to the business. Early in the lifecycle, you may identify security concerns in the architecture or design by using [[threat modeling]].  Later, you may find security issues using [[code review]] or [[penetration testing]].  Or you may not discover a problem until the application is in production and is actually compromised.&lt;br /&gt;
&lt;br /&gt;
By following the approach here, you'll be able to estimate the severity of all of these risks to your business, and make an informed decision about what to do about them. Having a system in place for rating risks will save time and eliminate arguing about priorities. This system will help to ensure that you don't get distracted by minor risks while ignoring more serious risks that are less well understood.&lt;br /&gt;
&lt;br /&gt;
Ideally, there would be a universal risk rating system that would accurately estimate all risks for all organizations. But a vulnerability that is critical to one organization may not be very important to another. So a basic framework is presented here that you ''should customize'' for your organization.&lt;br /&gt;
&lt;br /&gt;
The authors have tried hard to make this model simple enough to use, while keeping enough detail for accurate risk estimates to be made. Please reference the section below on customization for more information about tailoring the model for use in your organization.&lt;br /&gt;
&lt;br /&gt;
==Approach==&lt;br /&gt;
&lt;br /&gt;
There are many different approaches to risk analysis. See the reference section below for some of the most common ones. The OWASP approach presented here is based on these standard methodologies and is customized for application security.&lt;br /&gt;
&lt;br /&gt;
Let's start with the standard risk model:&lt;br /&gt;
&lt;br /&gt;
       '''Risk = Likelihood * Impact'''&lt;br /&gt;
&lt;br /&gt;
In the sections below, we break down the factors that make up &amp;quot;likelihood&amp;quot; and &amp;quot;impact&amp;quot; for application security and show how to combine them to determine the overall severity for the risk.&lt;br /&gt;
&lt;br /&gt;
* [[#Step 1: Identifying a Risk]]&lt;br /&gt;
* [[#Step 2: Factors for Estimating Likelihood]]&lt;br /&gt;
* [[#Step 3: Factors for Estimating Impact]]&lt;br /&gt;
* [[#Step 4: Determining Severity of the Risk]]&lt;br /&gt;
* [[#Step 5: Deciding What to Fix]]&lt;br /&gt;
* [[#Step 6: Customizing Your Risk Rating Model]]&lt;br /&gt;
&lt;br /&gt;
==Step 1: Identifying a Risk==&lt;br /&gt;
&lt;br /&gt;
The first step is to identify a security risk that needs to be rated. You'll need to gather information about the [[threat agent]] involved, the [[attack]] they're using, the [[vulnerability]] involved, and the [[impact]] of a successful exploit on your business. There may be multiple possible groups of attackers, or even multiple possible business impacts.  In general, it's best to err on the side of caution by using the worst-case option, as that will result in the highest overall risk.&lt;br /&gt;
&lt;br /&gt;
==Step 2: Factors for Estimating Likelihood==&lt;br /&gt;
&lt;br /&gt;
Once you've identified a potential risk, and want to figure out how serious it is, the first step is to estimate the &amp;quot;likelihood&amp;quot;. At the highest level, this is a rough measure of how likely this particular vulnerability is to be uncovered and exploited by an attacker. We do not need to be over-precise in this estimate. Generally, identifying whether the likelihood is low, medium, or high is sufficient.&lt;br /&gt;
&lt;br /&gt;
There are a number of factors that can help us figure this out. The first set of factors are related to the [[threat agent]] involved. The goal is to estimate the likelihood of a successful attack from a group of possible attackers. Note that there may be multiple threat agents that can exploit a particular vulnerability, so it's usually best to use the worst-case scenario. For example, an insider may be a much more likely attacker than an anonymous outsider - but it depends on a number of factors.&lt;br /&gt;
&lt;br /&gt;
Note that each factor has a set of options, and each option has a likelihood rating from 0 to 9 associated with it. We'll use these numbers later to estimate the overall likelihood.&lt;br /&gt;
&lt;br /&gt;
===[[Threat Agent]] Factors===&lt;br /&gt;
&lt;br /&gt;
The first set of factors are related to the [[threat agent]] involved. The goal here is to estimate the likelihood of a successful attack by this group of threat agents. Use the worst-case threat agent.&lt;br /&gt;
&lt;br /&gt;
; Skill level&lt;br /&gt;
: How technically skilled is this group of threat agents? Security penetration skills (9), network and programming skills (6), advanced computer user (4), some technical skills (3), no technical skills (1)&lt;br /&gt;
&lt;br /&gt;
; Motive&lt;br /&gt;
: How motivated is this group of threat agents to find and exploit this vulnerability? Low or no reward (1), possible reward (4), high reward (9)&lt;br /&gt;
&lt;br /&gt;
; Opportunity&lt;br /&gt;
: What resources and opportunity are required for this group of threat agents to find and exploit this vulnerability? full access or expensive resources required (0), special access or resources required (4), some access or resources required (7), no access or resources required (9)&lt;br /&gt;
&lt;br /&gt;
; Size&lt;br /&gt;
: How large is this group of threat agents? Developers (2), system administrators (2), intranet users (4), partners (5), authenticated users (6), anonymous Internet users (9)&lt;br /&gt;
&lt;br /&gt;
===[[Vulnerability]] Factors===&lt;br /&gt;
&lt;br /&gt;
The next set of factors are related to the [[vulnerability]] involved. The goal here is to estimate the likelihood of the particular vulnerability involved being discovered and exploited. Assume the threat agent selected above.&lt;br /&gt;
&lt;br /&gt;
; Ease of discovery&lt;br /&gt;
: How easy is it for this group of threat agents to discover this vulnerability? Practically impossible (1), difficult (3), easy (7), automated tools available (9)&lt;br /&gt;
&lt;br /&gt;
; Ease of exploit&lt;br /&gt;
: How easy is it for this group of threat agents to actually exploit this vulnerability? Theoretical (1), difficult (3), easy (5), automated tools available (9)&lt;br /&gt;
&lt;br /&gt;
; Awareness&lt;br /&gt;
: How well known is this vulnerability to this group of threat agents? Unknown (1), hidden (4), obvious (6), public knowledge (9)&lt;br /&gt;
&lt;br /&gt;
; Intrusion detection&lt;br /&gt;
: How likely is an exploit to be detected? Active detection in application (1), logged and reviewed (3), logged without review (8), not logged (9)&lt;br /&gt;
&lt;br /&gt;
==Step 3: Factors for Estimating Impact==&lt;br /&gt;
&lt;br /&gt;
When considering the impact of a successful attack, it's important to realize that there are two kinds of impacts. The first is the &amp;quot;technical impact&amp;quot; on the application, the data it uses, and the functions it provides.  The other is the &amp;quot;business impact&amp;quot; on the business and company operating the application.&lt;br /&gt;
&lt;br /&gt;
Ultimately, the business impact is more important. However, you may not have access to all the information required to figure out the business consequences of a successful exploit. In this case, providing as much detail about the technical risk will enable the appropriate business representative to make a decision about the business risk.&lt;br /&gt;
&lt;br /&gt;
Again, each factor has a set of options, and each option has an impact rating from 0 to 9 associated with it. We'll use these numbers later to estimate the overall impact.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Technical Impact Factors===&lt;br /&gt;
&lt;br /&gt;
Technical impact can be broken down into factors aligned with the traditional security areas of concern: confidentiality, integrity, availability, and accountability. The goal is to estimate the magnitude of the impact on the system if the vulnerability were to be exploited.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Loss of confidentiality&lt;br /&gt;
: How much data could be disclosed and how sensitive is it? Minimal non-sensitive data disclosed (2), minimal critical data disclosed (6), extensive non-sensitive data disclosed (6), extensive critical data disclosed (7), all data disclosed (9)&lt;br /&gt;
&lt;br /&gt;
; Loss of integrity&lt;br /&gt;
: How much data could be corrupted and how damaged is it? Minimal slightly corrupt data (1), minimal seriously corrupt data (3), extensive slightly corrupt data (5), extensive seriously corrupt data (7), all data totally corrupt (9)&lt;br /&gt;
&lt;br /&gt;
; Loss of availability&lt;br /&gt;
: How much service could be lost and how vital is it? Minimal secondary services interrupted (1), minimal primary services interrupted (5), extensive secondary services interrupted (5), extensive primary services interrupted (7), all services completely lost (9)&lt;br /&gt;
&lt;br /&gt;
; Loss of accountability&lt;br /&gt;
: Are the threat agents' actions traceable to an individual? Fully traceable (1), possibly traceable (7), completely anonymous (9)&lt;br /&gt;
&lt;br /&gt;
===Business Impact Factors===&lt;br /&gt;
&lt;br /&gt;
The business impact stems from the technical impact, but requires a deep understanding of what is important to the company running the application. In general, you should be aiming to support your risks with business impact, particularly if your audience is executive level. The business risk is what justifies investment in fixing security problems.&lt;br /&gt;
&lt;br /&gt;
Many companies have an asset classification guide and/or a business impact reference to help formalize what is important to their business. These standards can help you focus on what's truly important for security. If these aren't available, then talk with people who understand the business to get their take on what's important.&lt;br /&gt;
&lt;br /&gt;
The factors below are common areas for many businesses, but this area is even more unique to a company than the factors related to threat agent, vulnerability, and technical impact.&lt;br /&gt;
&lt;br /&gt;
; Financial damage&lt;br /&gt;
: How much financial damage will result from an exploit? Less than the cost to fix the vulnerability (1), minor effect on annual profit (3), significant effect on annual profit (7), bankruptcy (9)&lt;br /&gt;
&lt;br /&gt;
; Reputation damage&lt;br /&gt;
: Would an exploit result in reputation damage that would harm the business? Minimal damage (1), Loss of major accounts (4), loss of goodwill (5), brand damage (9)&lt;br /&gt;
&lt;br /&gt;
; Non-compliance&lt;br /&gt;
: How much exposure does non-compliance introduce? Minor violation (2), clear violation (5), high profile violation (7)&lt;br /&gt;
&lt;br /&gt;
; Privacy violation&lt;br /&gt;
: How much personally identifiable information could be disclosed? One individual (3), hundreds of people (5), thousands of people (7), millions of people (9)&lt;br /&gt;
&lt;br /&gt;
==Step 4: Determining the Severity of the Risk== &lt;br /&gt;
&lt;br /&gt;
In this step we're going to put together the likelihood estimate and the impact estimate to calculate an overall severity for this risk.  All you need to do here is figure out whether the likelihood is LOW, MEDIUM, or HIGH and then do the same for impact. We'll just split our 0 to 9 scale into three parts.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; width=&amp;quot;40%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Likelihood and Impact Levels&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot;&amp;gt;0 to &amp;amp;lt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; bgcolor=&amp;quot;lightgreen&amp;quot;&amp;gt;LOW&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;3 to &amp;amp;lt;6&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;MEDIUM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;6 to 9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;red&amp;quot;&amp;gt;HIGH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Informal Method===&lt;br /&gt;
&lt;br /&gt;
In many environments, there is nothing wrong with &amp;quot;eyeballing&amp;quot; the factors and simply capturing the answers. You should think through the factors and identify the key &amp;quot;driving&amp;quot; factors that are controlling the result. You may discover that your initial impression was wrong by considering aspects of the risk that weren't obvious.&lt;br /&gt;
&lt;br /&gt;
===Repeatable Method===&lt;br /&gt;
&lt;br /&gt;
If you need to defend your ratings or make them repeatable, then you may want to go through a more formal process of rating the factors and calculating the result. Remember that there is quite a lot of uncertainty in these estimates, and that these factors are intended to help you arrive at a sensible result. This process can be supported by automated tools to make the calculation easier. &lt;br /&gt;
&lt;br /&gt;
The first step is to select one of the options associated with each factor and enter the associated number in the table. Then you simply take the average of the scores to calculate the overall likelihood. For example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Threat agent factors&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td  colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Vulnerability factors&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Skill level&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Motive&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Opportunity&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Size&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;2%&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Ease of discovery&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Ease of exploit&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Awareness&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Intrusion detection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;7&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;6&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;9&amp;quot; align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;lightblue&amp;quot;&amp;gt;Overall likelihood=4.375 (MEDIUM)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Next, we need to figure out the overall impact. The process is similar here. In many cases the answer will be obvious, but you can make an estimate based on the factors, or you can average the scores for each of the factors. Again, less than 3 is LOW, 3 to less than 6 is MEDIUM, and 6 to 9 is HIGH.  For example:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Technical Impact&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td  colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Business Impact&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Loss of confidentiality&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Loss of integrity&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Loss of availability&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Loss of accountability&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;2%&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Financial damage&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Reputation damage&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Non-compliance&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;10%&amp;quot;&amp;gt;Privacy violation&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;7&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;8&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;lightblue&amp;quot;&amp;gt;Overall technical impact=7.25 (HIGH)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;lightblue&amp;quot;&amp;gt;Overall business impact=2.25 (LOW)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Determining Severity===&lt;br /&gt;
&lt;br /&gt;
However we arrived at the likelihood and impact estimates, we can now combine them to get a final severity rating for this risk. Note that if you have good business impact information, you should use that instead of the technical impact information.  But if you have no information about the business, then technical impact is the next best thing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Overall Risk Severity&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;15%&amp;quot; rowspan=&amp;quot;4&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Impact&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;15%&amp;quot;&amp;gt;HIGH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;15%&amp;quot; bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;15%&amp;quot; bgcolor=&amp;quot;red&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; width=&amp;quot;15%&amp;quot; bgcolor=&amp;quot;pink&amp;quot;&amp;gt;Critical&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;MEDIUM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Low&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;red&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;LOW&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;lightgreen&amp;quot;&amp;gt;Note&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;yellow&amp;quot;&amp;gt;Low&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;orange&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;LOW&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;MEDIUM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;HIGH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot;&amp;gt;&amp;lt;b&amp;gt;Likelihood&amp;lt;/b&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the example above, the likelihood is MEDIUM, and the technical impact is HIGH, so from a purely technical perspective, it appears that the overall severity is HIGH.  However, note that the business impact is actually LOW, so the overall severity is best described as LOW as well. This is why understanding the business context of the vulnerabilities you are evaluating is so critical to making good risk decisions. Failure to understand this context can lead to the lack of trust between the business and security teams that is present in many organizations.&lt;br /&gt;
&lt;br /&gt;
==Step 5: Deciding What to Fix==&lt;br /&gt;
&lt;br /&gt;
After you've classified the risks to your application, you'll have a prioritized list of what to fix. As a general rule, you should fix the most severe risks first. It simply doesn't help your overall risk profile to fix less important risks, even if they're easy or cheap to fix.&lt;br /&gt;
&lt;br /&gt;
Remember, not all risks are worth fixing, and some loss is not only expected, but justifiable based upon the cost of fixing the issue. For example, if it would cost $100,000 to implement controls to stem $2,000 of fraud per year, it would take 50 years return on investment to stamp out the loss. But remember there may be reputation damage from the fraud that could cost the organization much more.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Step 6: Customizing Your Risk Rating Model==&lt;br /&gt;
&lt;br /&gt;
Having a risk ranking framework that's customizable for a business is critical for adoption.  A tailored model is much more likely to produce results that match people's perceptions about what is a serious risk. You can waste lots of time arguing about the risk ratings if they're not supported by a model like this. There are several ways to tailor this model for your organization.&lt;br /&gt;
&lt;br /&gt;
===Adding factors===&lt;br /&gt;
&lt;br /&gt;
You can choose different factors that better represent what's important for your organization. For example, a military application might add impact factors related to loss of human life or classified information. You might also add likelihood factors, such as the window of opportunity for an attacker or encryption algorithm strength.&lt;br /&gt;
&lt;br /&gt;
===Customizing options===&lt;br /&gt;
&lt;br /&gt;
There are some sample options associated with each factor, but the model will be much more effective if you customize these options to your business. For example, use the names of the different teams and your names for different classifications of information. You can also change the scores associated with the options. The best way to identify the right scores is to compare the ratings produced by the model with ratings produced by a team of experts. You can tune the model by carefully adjusting the scores to match.&lt;br /&gt;
&lt;br /&gt;
===Weighting factors===&lt;br /&gt;
&lt;br /&gt;
The model above assumes that all the factors are equally important. You can weight the factors to emphasize the factors that are more significant for your business. This makes the model a bit more complex, as you'll need to use a weighted average. But otherwise everything works the same. Again, you can tune the model by matching it against risk ratings you agree are accurate.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
* Managing Information Security Risk: Organization, Mission, and Information System View [http://csrc.nist.gov/publications/nistpubs/800-39/SP800-39-final.pdf]&lt;br /&gt;
&lt;br /&gt;
* AS/NZS 4360 Risk Management [http://www.saiglobal.com/shop/script/Details.asp?docn=AS564557616854]&lt;br /&gt;
&lt;br /&gt;
* Industry standard vulnerability severity and risk rankings (CVSS) [http://www.first.org/cvss/]&lt;br /&gt;
&lt;br /&gt;
* Security-enhancing process models (CLASP) [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project]&lt;br /&gt;
&lt;br /&gt;
* Cheat Sheet: Web Application Security Frame - MSDN - Microsoft [http://msdn.microsoft.com/en-us/library/ff649461.aspx]&lt;br /&gt;
&lt;br /&gt;
* Security In The Software Lifecycle from DHS [https://buildsecurityin.us-cert.gov/daisy/bsi/87/version/12/part/4/data/Draft+Security+in+the+Software+Lifcycle+v1.2.pdf?branch=main&amp;amp;language=default]&lt;br /&gt;
&lt;br /&gt;
* [[Threat_Risk_Modeling|Threat Risk Modeling]]&lt;br /&gt;
&lt;br /&gt;
* Pratical Threat Analysis [http://www.ptatechnologies.com/]&lt;br /&gt;
&lt;br /&gt;
* A Platform for Risk Analysis of Security Critical Systems [http://sourceforge.net/projects/coras/]&lt;br /&gt;
&lt;br /&gt;
* Model-driven Development and Analysis of Secure Information Systems [http://heim.ifi.uio.no/~ketils/securis/]&lt;br /&gt;
&lt;br /&gt;
* Value Driven Security Threat Modeling Based on Attack Path Analysis [http://origin-www.computer.org/csdl/proceedings/hicss/2007/2755/00/27550280a.pdf]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Reporting&amp;diff=161130</id>
		<title>Reporting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Reporting&amp;diff=161130"/>
				<updated>2013-10-19T00:16:44Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
Performing the technical side of the assessment is only half of the overall assessment process; the final product is the production of a well-written, and informative, report. &lt;br /&gt;
A report should be easy to understand and highlight all the risks found during the assessment phase and appeal to both executive management and technical staff. &lt;br /&gt;
&lt;br /&gt;
The report needs to have three major sections and be created in a manner that allows each section to be split off and printed and given to the appropriate teams, such as the developers or system managers.&lt;br /&gt;
&lt;br /&gt;
The sections generally recommended are:&lt;br /&gt;
 &lt;br /&gt;
'''1.0 Executive Summary'''&lt;br /&gt;
&lt;br /&gt;
The executive summary sums up the overall findings of the assessment and gives managers, or system owners, an idea of the overall risk faced. &lt;br /&gt;
&lt;br /&gt;
The language used should be more suited to people who are not technically aware and should include graphs or other charts which show the risk level. It is recommended that a summary be included, which details when the testing commenced and when it was completed.&lt;br /&gt;
&lt;br /&gt;
Another section, which is often overlooked, is a paragraph on implications and actions. This allows the system owners to understand what is required to be done in order to ensure the system remains secure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1.1  Project Objective:&lt;br /&gt;
In this section you will need to outline the project objectives and what is expected as an outcome of the assessment.&lt;br /&gt;
&lt;br /&gt;
1.2 Project Scope: &lt;br /&gt;
In this section you will need to outline the agreed scope.&lt;br /&gt;
&lt;br /&gt;
1.3 Limitations:&lt;br /&gt;
This section is dedicated for every and each limitation which you faced throughout the assessment, for instance, limitations of project-focused tests, limitation in your security testing methods, performance or technical issues that you come across during the course of assessment etc ....&lt;br /&gt;
&lt;br /&gt;
1.4 Targets: &lt;br /&gt;
In this section you will need to list the number of applications and/or targeted systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''2.0 Technical Management Overview'''&lt;br /&gt;
&lt;br /&gt;
The technical management overview section often appeals to technical managers who require more technical detail than found in the executive summary. This section should include details about the scope of the assessment, the targets included and any caveats, such as system availability etc. &lt;br /&gt;
This section also needs to include an introduction on the risk rating used throughout the report and then finally a technical summary of the findings.&lt;br /&gt;
&lt;br /&gt;
'''3.0 Assessment Findings''' &lt;br /&gt;
&lt;br /&gt;
The last section of the report is the section, which includes detailed technical detail about the vulnerabilities found, and the approaches needed to ensure they are resolved. This section is aimed at a technical level and should include all the necessary information for the technical teams to understand the issue and be able to solve it. &lt;br /&gt;
&lt;br /&gt;
The findings section should include:&lt;br /&gt;
&lt;br /&gt;
* A reference number for easy reference with screenshots &lt;br /&gt;
* The affected item&lt;br /&gt;
* A technical description of the issue &lt;br /&gt;
* A section on resolving the issue &lt;br /&gt;
* The risk rating and impact value&lt;br /&gt;
&lt;br /&gt;
Each finding should be clear and concise and give the reader of the report a full understanding of the issue at hand.&lt;br /&gt;
&lt;br /&gt;
Here is the report (see https://www.owasp.org/index.php/Testing_Checklist for the complete list of tests):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:tablerep.PNG]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:tablerep2.PNG]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[Image:tablerep3.PNG]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Appendix'''  &lt;br /&gt;
&lt;br /&gt;
This section is often used to describe the commercial and open-source tools that were used in conducting the assessment. When custom scripts/code are utilized during the assessment, it should be disclosed in this section or noted as attachment.&lt;br /&gt;
It is often appreciated by the customer when the methodology used by the consultants is included. It gives them an idea of the thoroughness of the assessment and also an idea what areas were included.&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=161129</id>
		<title>OWASP Testing Guide v4 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=161129"/>
				<updated>2013-10-18T23:48:28Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{OWASP Breakers}}&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
'''This is the DRAFT of the table of content of the New Testing Guide v4.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;You can download the stable version v3 [http://www.owasp.org/images/5/56/OWASP_Testing_Guide_v3.pdf here] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Back to the OWASP Testing Guide Project:&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Testing_Project&lt;br /&gt;
&lt;br /&gt;
'''Updated: 15th February 2013'''&lt;br /&gt;
&lt;br /&gt;
[[ OWTGv4 Contributors list|'''Contributors List]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following is a DRAFT of the Toc based on the feedback already received.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Foreword|Foreword by Eoin Keary]]== &lt;br /&gt;
[To review--&amp;gt; Eoin Keary -&amp;gt; Done!!]&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Frontispiece |1. Frontispiece]]== &lt;br /&gt;
[To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[Testing Guide Frontispiece|1.1 About the OWASP Testing Guide Project]]''' &lt;br /&gt;
[To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[About The Open Web Application Security Project|1.2 About The Open Web Application Security Project]]''' &lt;br /&gt;
[To review--&amp;gt; ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Introduction|2. Introduction]]==&lt;br /&gt;
&lt;br /&gt;
'''2.1 The OWASP Testing Project'''&lt;br /&gt;
&lt;br /&gt;
'''2.2 Principles of Testing'''&lt;br /&gt;
&lt;br /&gt;
'''2.3 Testing Techniques Explained''' &lt;br /&gt;
&lt;br /&gt;
2.4 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Requirements_Test_Derivation Security requirements test derivation],[https://www.owasp.org/index.php/Testing_Guide_Introduction#Functional_and_Non_Functional_Test_Requirements functional and non functional test requirements], and [https://www.owasp.org/index.php/Testing_Guide_Introduction#Test_Cases_Through_Use_and_Misuse_Cases test cases through use and misuse cases]&lt;br /&gt;
&lt;br /&gt;
2.5 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Test_Data_Analysis_and_Reporting Security test data analysis and reporting: root cause identification and business/role case test data reporting]&lt;br /&gt;
&lt;br /&gt;
==[[The OWASP Testing Framework|3. The OWASP Testing Framework]]==&lt;br /&gt;
&lt;br /&gt;
'''3.1. Overview'''&lt;br /&gt;
&lt;br /&gt;
'''3.2. Phase 1: Before Development Begins '''&lt;br /&gt;
&lt;br /&gt;
'''3.3. Phase 2: During Definition and Design'''&lt;br /&gt;
&lt;br /&gt;
'''3.4. Phase 3: During Development'''&lt;br /&gt;
&lt;br /&gt;
'''3.5. Phase 4: During Deployment'''&lt;br /&gt;
&lt;br /&gt;
'''3.6. Phase 5: Maintenance and Operations'''&lt;br /&gt;
&lt;br /&gt;
'''3.7. A Typical SDLC Testing Workflow '''&lt;br /&gt;
&lt;br /&gt;
==[[Web Application Penetration Testing |4. Web Application Penetration Testing ]]==&lt;br /&gt;
&lt;br /&gt;
[[Testing: Introduction and objectives|'''4.1 Introduction and Objectives''']] [To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
[[Testing Checklist| 4.1.1 Testing Checklist]] [To review at the end of brainstorming --&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing Information Gathering|'''4.2 Information Gathering ''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing: Search engine discovery/reconnaissance (OWASP-IG-002)|4.2.1 Conduct Search Engine Discovery and Reconnaissance for Information Leakage (OTG-INFO-001) ]] formerly &amp;quot;Search Engine Discovery/Reconnaissance (OWASP-IG-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Fingerprint Web Server (OTG-INFO-002)|4.2.2 Fingerprint Web Server (OTG-INFO-002) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing: Spiders, Robots, and Crawlers (OWASP-IG-001)|4.2.3 Review Webserver Metafiles for Information Leakage (OTG-INFO-003) ]] formerly &amp;quot;Spiders, Robots and Crawlers (OWASP-IG-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Application Discovery (OWASP-IG-005)|4.2.4 Enumerate Applications on Webserver (OTG-INFO-004) ]] formerly &amp;quot;Application Discovery (OWASP-IG-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Review webpage comments and metadata(OWASP-IG-007)|4.2.5 Review Webpage Comments and Metadata for Information Leakage (OTG-INFO-005) ]] formerly &amp;quot;Review webpage comments and metadata(OWASP-IG-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing: Identify application entry points (OWASP-IG-003)|4.2.6 Identify application entry points (OTG-INFO-006) ]] formerly &amp;quot;Identify application entry points (OWASP-IG-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Identify application exit/handover points (OWASP-IG-008)|4.2.7 Identify application exit/handover points (OTG-INFO-007) ]] formerly &amp;quot;Identify application exit/handover points (OWASP-IG-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Map execution paths through application (OWASP-IG-009)|4.2.8 Map execution paths through application (OTG-INFO-008)]] formerly &amp;quot;Map execution paths through application (OWASP-IG-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Fingerprint Web Application Framework (OTG-INFO-009)|4.2.9 Fingerprint Web Application Framework (OTG-INFO-009) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-010)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Web Application (OTG-INFO-011)|4.2.10 Fingerprint Web Application (OTG-INFO-010) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-010)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[Map Network and Application Architecture (OTG-INFO-012)|4.2.11 Map Network and Application Architecture (OTG-INFO-011) ]] formerly &amp;quot;Testing for Infrastructure Configuration Management Testing weakness (OWASP-CM-001)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for configuration management|'''4.3 Configuration and Deploy Management Testing ''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for infrastructure configuration management (OWASP-CM-003)|4.3.1 Test Network/Infrastructure Configuration (OTG-CONFIG-001) ]] formerly &amp;quot;Testing for Infrastructure Configuration Management Testing weakness (OWASP-CM-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for application configuration management (OWASP-CM-004)|4.3.2 Test Application Platform Configuration (OTG-CONFIG-002) ]] formerly &amp;quot;Testing for Application Configuration Management weakness (OWASP-CM-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for file extensions handling  (OWASP-CM-005)|4.3.3 Test File Extensions Handling for Sensitive Information (OTG-CONFIG-003) ]] formerly &amp;quot;Testing for File Extensions Handling  (OWASP-CM-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Old, Backup and Unreferenced Files (OWASP-CM-006)|4.3.4 Review Old, Backup and Unreferenced Files for Sensitive Information (OTG-CONFIG-004) ]] formerly &amp;quot;Old, Backup and Unreferenced Files (OWASP-CM-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Admin Interfaces  (OWASP-CM-007)|4.3.5 Enumerate Infrastructure and Application Admin Interfaces (OTG-CONFIG-005) ]] formerly &amp;quot;Infrastructure and Application Admin Interfaces  (OWASP-CM-005)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Methods and XST  (OWASP-CM-008)|4.3.6 Test HTTP Methods (OTG-CONFIG-006) ]] formerly &amp;quot;Testing for Bad HTTP Methods (OWASP-CM-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Database credentials/connection strings available|4.3.7 Testing for Database credentials/connection strings available (OTG-CONFIG-007) ]] formerly &amp;quot;Testing for Database credentials/connection strings available (OWASP-CM-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Content Security Policy weakness|4.3.8 Test Content Security Policy (OTG-CONFIG-008) ]] formerly &amp;quot;Testing for Content Security Policy weakness (OWASP-CM-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Missing HSTS header|4.3.9 Test HTTP Strict Transport Security (OTG-CONFIG-009) ]] formerly &amp;quot;Testing for Missing HSTS header (OWASP-CM-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Frame Options|4.3.10 Test Frame Options (OTG-CONFIG-010) ]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for RIA policy files weakness|4.3.11 Test RIA cross domain policy (OTG-CONFIG-011) ]] formerly &amp;quot;Testing for RIA policy files weakness (OWASP-CM-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Content Type Options|4.3.12 Test Content Type Options (OTG-CONFIG-012) ]] new&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing Identity Management|'''4.4 Identity Management Testing''']]&lt;br /&gt;
&lt;br /&gt;
[[Test Role Definitions (OTG-IDENT-001)|4.4.1 Test Role Definitions (OTG-IDENT-001)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test User Registration Process (OTG-IDENT-002)|4.4.2 Test User Registration Process (OTG-IDENT-002)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Provisioning Process (OTG-IDENT-003)|4.4.3 Test Account Provisioning Process (OTG-IDENT-003)]] New&lt;br /&gt;
&lt;br /&gt;
[[Testing for Account Enumeration and Guessable User Account (OWASP-AT-002)|4.4.4 Testing for Account Enumeration and Guessable User Account (OTG-IDENT-004) ]] formerly &amp;quot;Testing for Account Enumeration and Guessable User Account (OWASP-AT-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak or unenforced username policy (OWASP-AT-009)| 4.4.5 Testing for Weak or unenforced username policy (OTG-IDENT-005)]] formerly &amp;quot;Testing for Weak or unenforced username policy (OWASP-AT-009)&lt;br /&gt;
&lt;br /&gt;
[[Test Permissions of Guest/Training Accounts (OTG-IDENT-006)|4.4.6 Test Permissions of Guest/Training Accounts (OTG-IDENT-006)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Suspension/Resumption Process (OTG-IDENT-007)|4.4.7 Test Account Suspension/Resumption Process (OTG-IDENT-007)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test User Deregistration Process (OTG-IDENT-008)|4.4.8 Test User Deregistration Process (OTG-IDENT-008)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Deregistration Process (OTG-IDENT-009)|4.4.9 Test Account Deregistration Process (OTG-IDENT-009)]] New&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for authentication|'''4.5 Authentication Testing ''']] &lt;br /&gt;
&lt;br /&gt;
[[Testing for Credentials Transported over an Encrypted Channel (OWASP-AT-001)|4.5.1 Testing for Credentials Transported over an Encrypted Channel  (OTG-AUTHN-001)]] formerly &amp;quot;Testing for Credentials Transported over an Encrypted Channel  (OWASP-AT-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for default credentials (OWASP-AT-003)|4.5.2 Testing for default credentials (OTG-AUTHN-002)]] formerly &amp;quot;Testing for default credentials (OWASP-AT-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak lock out mechanism (OWASP-AT-004)|4.5.3 Testing for Weak lock out mechanism (OTG-AUTHN-003)]] formerly &amp;quot;Testing for Weak lock out mechanism (OWASP-AT-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Bypassing Authentication Schema (OWASP-AT-005)|4.5.4 Testing for bypassing authentication schema (OTG-AUTHN-004)]] formerly &amp;quot;Testing for bypassing authentication schema (OWASP-AT-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Vulnerable Remember Password (OWASP-AT-006)|4.5.5 Test remember password functionality (OTG-AUTHN-005)]] formerly &amp;quot;Testing for vulnerable remember password functionality (OWASP-AT-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Browser cache weakness (OWASP-AT-007)|4.5.6 Testing for Browser cache weakness (OTG-AUTHN-006)]] formerly &amp;quot;Testing for Browser cache weakness (OWASP-AT-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak password policy (OWASP-AT-008)|4.5.7 Testing for Weak password policy (OTG-AUTHN-007)]] formerly &amp;quot;Testing for Weak password policy (OWASP-AT-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak security question/answer (OTG-AUTHN-008)|4.5.8 Testing for Weak security question/answer (OTG-AUTHN-008)]] New! - Robert Winkel&lt;br /&gt;
&lt;br /&gt;
[[Testing for weak password change or reset functionalities (OWASP-AT-011)|4.5.9 Testing for weak password change or reset functionalities (OTG-AUTHN-009)]] formerly &amp;quot;Testing for weak password change or reset functionalities (OWASP-AT-011)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weaker authentication in alternative channel (OTG-AUTHN-010)|4.5.10 Testing for Weaker authentication in alternative channel (OTG-AUTHN-010)]] (e.g. mobile app, IVR, help desk)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Authorization|'''4.6 Authorization Testing''']] &lt;br /&gt;
&lt;br /&gt;
[[Test Management of Account Permissions (OTG-AUTHZ-001)|4.6.1 Test Management of Account Permissions (OTG-AUTHZ-001)]] New&lt;br /&gt;
&lt;br /&gt;
[[Testing for Path Traversal  (OWASP-AZ-001)|4.6.2 Testing Directory traversal/file include (OTG-AUTHZ-002)]] formerly &amp;quot;Testing Directory traversal/file include (OWASP-AZ-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Bypassing Authorization Schema  (OWASP-AZ-002)|4.6.3 Testing for bypassing authorization schema (OTG-AUTHZ-003)]] formerly &amp;quot;Testing for bypassing authorization schema  (OWASP-AZ-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Privilege escalation  (OWASP-AZ-003)|4.6.4 Testing for Privilege Escalation (OTG-AUTHZ-004)]] formerly &amp;quot;Testing for Privilege Escalation  (OWASP-AZ-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure Direct Object References (OWASP-AZ-004)|4.6.5 Testing for Insecure Direct Object References (OTG-AUTHZ-005)]] formerly &amp;quot;Testing for Insecure Direct Object References (OWASP-AZ-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Failure to Restrict access to authorized resource (OWASP-AZ-005)|4.6.6 Testing for Failure to Restrict access to authorized resource (OTG-AUTHZ-006)]] formerly &amp;quot;Testing for Failure to Restrict access to authorized resource (OWASP-AZ-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test privileges of server components (OTG-AUTHZ-007)|4.6.7 Test privileges of server components (OTG-AUTHZ-007)]] (e.g. indexing service, reporting interface, file generator)&lt;br /&gt;
&lt;br /&gt;
[[Test enforcement of application entry points (OTG-AUTHZ-008)|4.6.8 Test enforcement of application entry points (OTG-AUTHZ-008)]] (including exposure of objects)&lt;br /&gt;
&lt;br /&gt;
[[Testing for failure to restrict access to authenticated resource(OWASP-AT-010)|4.6.9 Testing for failure to restrict access to authenticated resource (OTG-AUTHZ-009)]] formerly &amp;quot;Testing for failure to restrict access to authenticated resource (OWASP-AT-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session Management|'''4.7 Session Management Testing''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session_Management_Schema (OWASP-SM-001)|4.7.1 Testing for Bypassing Session Management Schema (OTG-SESS-001)]] formerly &amp;quot;Testing for Bypassing Session Management Schema (OWASP-SM-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for cookies attributes  (OWASP-SM-002)|4.7.2 Testing for Cookies attributes (OTG-SESS-002)]] formerly &amp;quot;Testing for Cookies attributes (OWASP-SM-002)&amp;quot; (Cookies are set not ‘HTTP Only’, ‘Secure’,  and no time validity)&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session Fixation  (OWASP-SM-003)|4.7.3 Testing for Session Fixation (OTG-SESS-003)]] formerly &amp;quot;Testing for Session Fixation  (OWASP-SM-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Exposed Session Variables  (OWASP-SM-004)|4.7.4 Testing for Exposed Session Variables (OTG-SESS-004)]] formerly &amp;quot;Testing for Exposed Session Variables (OWASP-SM-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for CSRF  (OWASP-SM-005)|4.7.5 Testing for Cross Site Request Forgery (CSRF) (OTG-SESS-005)]] formerly &amp;quot;Testing for Cross Site Request Forgery (CSRF) (OWASP-SM-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test Session Token Strength (OTG-SESS-006)|4.7.6 Test Session Token Strength (OTG-SESS-006)]]&lt;br /&gt;
 &lt;br /&gt;
[[Testing for logout functionality (OWASP-SM-007)|4.7.7 Testing for logout functionality (OTG-SESS-007)]] formerly &amp;quot;Testing for logout functionality (OWASP-SM-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session puzzling (OWASP-SM-008)|4.7.8 Testing for Session puzzling (OWASP-SM-008)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Session Timeout (OTG-SESS-008)|4.7.8 Test Session Timeout (OTG-SESS-008)]]&lt;br /&gt;
&lt;br /&gt;
[[Test multiple concurrent sessions (OTG-SESS-009)|4.7.9 Test multiple concurrent sessions (OTG-SESS-009)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Data Validation|'''4.8 Data Validation Testing''']] &lt;br /&gt;
&lt;br /&gt;
[[Testing for Reflected Cross site scripting (OWASP-DV-001) |4.8.1 Testing for Reflected Cross Site Scripting (OTG-INPVAL-001)]] formerly &amp;quot;Testing for Reflected Cross Site Scripting (OWASP-DV-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stored Cross site scripting (OWASP-DV-002) |4.8.2 Testing for Stored Cross Site Scripting (OTG-INPVAL-002)]] formerly &amp;quot;Testing for Stored Cross Site Scripting (OWASP-DV-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Verb Tampering (OWASP-DV-003)|4.8.3 Testing for HTTP Verb Tampering (OTG-INPVAL-003)]] formerly &amp;quot;Testing for HTTP Verb Tampering (OWASP-DV-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Parameter pollution (OWASP-DV-004)|4.8.4 Testing for HTTP Parameter pollution (OTG-INPVAL-004) ]] formerly &amp;quot;Testing for HTTP Parameter pollution (OWASP-DV-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Unvalidated Redirects and Forwards (OWASP-DV-004)|4.8.5 Testing for Unvalidated Redirects and Forwards (OTG-INPVAL-005) ]] formerly &amp;quot;Testing for Unvalidated Redirects and Forwards (OWASP-DV-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for SQL Injection (OWASP-DV-005)| 4.8.6 Testing for SQL Injection (OTG-INPVAL-006)]] formerly &amp;quot;Testing for SQL Injection (OWASP-DV-005)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[Testing for Oracle|4.8.6.1 Oracle Testing]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for MySQL|4.8.6.2 MySQL Testing [Ismael Gonçalves]]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for SQL Server|4.8.6.3 SQL Server Testing]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Backend_Security_Project_Testing_PostgreSQL|4.8.6.4 Testing PostgreSQL (from OWASP BSP) ]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for MS Access |4.8.6.5 MS Access Testing]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for NoSQL injection|4.8.6.6 Testing for NoSQL injection [New!]]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for LDAP Injection  (OWASP-DV-006)|4.8.7 Testing for LDAP Injection  (OTG-INPVAL-007)]] formerly &amp;quot;Testing for LDAP Injection  (OWASP-DV-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for ORM Injection   (OWASP-DV-007)|4.8.8 Testing for ORM Injection   (OTG-INPVAL-008)]] formerly &amp;quot;Testing for ORM Injection   (OWASP-DV-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for XML Injection (OWASP-DV-008)|4.8.9 Testing for XML Injection (OTG-INPVAL-009)]] formerly &amp;quot;Testing for XML Injection (OWASP-DV-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for SSI Injection  (OWASP-DV-009)|4.8.10 Testing for SSI Injection  (OTG-INPVAL-010)]] formerly &amp;quot;Testing for SSI Injection  (OWASP-DV-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for XPath Injection  (OWASP-DV-010)|4.8.11 Testing for XPath Injection  (OTG-INPVAL-011)]] formerly &amp;quot;Testing for XPath Injection  (OWASP-DV-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for IMAP/SMTP Injection  (OWASP-DV-011)|4.8.12 IMAP/SMTP Injection  (OTG-INPVAL-012)]] formerly &amp;quot;IMAP/SMTP Injection  (OWASP-DV-011)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Code Injection  (OWASP-DV-012)|4.8.13 Testing for Code Injection  (OTG-INPVAL-013)]] formerly &amp;quot;Testing for Code Injection  (OWASP-DV-012)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Local File Inclusion|4.8.13.1 Testing for Local File Inclusion]] [Alexander Antukh]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Remote File Inclusion|4.8.13.2 Testing for Remote File Inclusion]] [Alexander Antukh]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Command Injection   (OWASP-DV-013)|4.8.14 Testing for Command Injection   (OTG-INPVAL-014)]] formerly &amp;quot;Testing for Command Injection   (OWASP-DV-013)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Buffer Overflow (OWASP-DV-014)|4.8.15 Testing for Buffer overflow (OTG-INPVAL-015)]] formerly &amp;quot;Testing for Buffer overflow (OWASP-DV-014)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Heap Overflow|4.8.15.1 Testing for Heap overflow]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stack Overflow|4.8.15.2 Testing for Stack overflow]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Format String|4.8.15.3 Testing for Format string]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Incubated Vulnerability (OWASP-DV-015)|4.8.16 Testing for incubated vulnerabilities (OTG-INPVAL-016)]] formerly &amp;quot;Testing for incubated vulnerabilities (OWASP-DV-015)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Splitting/Smuggling  (OWASP-DV-016)|4.8.17 Testing for HTTP Splitting/Smuggling  (OTG-INPVAL-017) ]] formerly &amp;quot;Testing for HTTP Splitting/Smuggling  (OWASP-DV-016)&amp;quot; [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Error Handling|'''4.9 Error Handling''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Error Code (OWASP-IG-006)|4.9.1 Analysis of Error Codes (OTG-ERR-001)]] formerly &amp;quot;Analysis of Error Codes (OWASP-IG-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stack Traces (OWASP-IG-XXX)|4.9.2 Analysis of Stack Traces (OTG-ERR-002)]] formerly &amp;quot;Analysis of Stack Traces&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Cryptography|'''4.10 Cryptography''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure encryption usage (OWASP-EN-001)| 4.10.1  Testing for Insecure encryption usage (OTG-CRYPST-001)]] formerly &amp;quot;Testing for Insecure encryption usage (OWASP-EN-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OWASP-EN-002)| 4.10.2 Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OTG-CRYPST-002)]] formerly &amp;quot;Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OWASP-EN-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Padding Oracle (OWASP-EN-003)| 4.10.3 Testing for Padding Oracle (OTG-CRYPST-003)]] formerly &amp;quot;Testing for Padding Oracle (OWASP-EN-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Cacheable HTTPS Response (OTG-CRYPST-004)| 4.10.4 Testing for Cacheable HTTPS Response (OTG-CRYPST-004)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Cache Directives (OTG-CRYPST-005)|4.10.5 Test Cache Directives (OTG-CRYPST-005)]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure Cryptographic Storage (OTG-CRYPST-006)|4.10.6 Testing for Insecure Cryptographic Storage (OTG-CRYPST-006)]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-007)|4.10.7 Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-007)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Cryptographic Key Management (OTG-CRYPST-008)|4.10.8 Test Cryptographic Key Management (OTG-CRYPST-008)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Logging|'''4.11 Logging''']] Not convinced Logging should be included as it requires access to logs to test&lt;br /&gt;
&lt;br /&gt;
[[Test time synchronisation (OTG-LOG-001)|4.11.1 Test time synchronisation (OTG-LOG-001) ]] formerly &amp;quot;Incorrect time&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test user-viewable log of authentication events (OTG-LOG-002)|4.11.2 Test user-viewable log of authentication events (OTG-LOG-002)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for business logic   (OWASP-BL-001)|'''4.12 Business Logic Testing  (OWASP-BL-001)''']] [To review--&amp;gt; David Fern]&lt;br /&gt;
Business Logic&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Test business logic data validation (OTG-BUSLOGIC-001)|4.12.1 Test business logic data validation (OTG-BUSLOGIC-001)]] [New!] NOTE MAT: to discuss this section&lt;br /&gt;
&lt;br /&gt;
[[Test Ability to forge requests (OTG-BUSLOGIC-002)|4.12.2 Test Ability to forge requests (OTG-BUSLOGIC-002)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test integrity checks (OTG-BUSLOGIC-003)|4.12.3 Test integrity checks (OTG-BUSLOGIC-003)]] (e.g. overwriting updates) [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test tamper evidence (OTG-BUSLOGIC-004)|4.12.4 Test tamper evidence (OTG-BUSLOGIC-004)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test excessive rate (speed) of use limits (OTG-BUSLOGIC-005)|4.12.5 Test excessive rate (speed) of use limits (OTG-BUSLOGIC-005)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test size of request limits (OTG-BUSLOGIC-006)|4.12.6 Test size of request limits (OTG-BUSLOGIC-006)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test number of times a function can be used limits (OTG-BUSLOGIC-007)|4.12.7 Test number of times a function can be used limits (OTG-BUSLOGIC-002)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test bypass of correct sequence (OTG-BUSLOGIC-008)|4.12.8 Test bypass of correct sequence (OTG-BUSLOGIC-008)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test self-hosted payment cardholder data processing (OTG-BUSLOGIC-009)|4.12.9 Test self-hosted payment cardholder data processing (OTG-BUSLOGIC-009)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test security incident reporting information (OTG-BUSLOGIC-010)|4.12.10 Test security incident reporting information (OTG-BUSLOGIC-010)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test defenses against application mis-use (OTG-BUSLOGIC-011)|4.12.11 Test defenses against application mis-use (OTG-BUSLOGIC-011)]] [New!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Denial of Service|'''4.13 Denial of Service''']]&lt;br /&gt;
&lt;br /&gt;
[[Test Regular expression DoS (OTG-DOS-001)| 4.13.1 Test Regular expression DoS (OTG-DOS-001)]] [New!] note: to understand better&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Test XML DoS (OTG-DOS-002)| 4.13.2 Test XML DoS (OTG-DOS-002)]] [New! - Andrew Muller]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Captcha (OWASP-AT-012)|4.13.3 Testing for CAPTCHA (OTG-DOS-003)]] formerly &amp;quot;Testing for CAPTCHA (OWASP-AT-012)&amp;quot; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Web Service (XML Interpreter)|'''4.14 Web Service Testing''']] [Tom Eston] &lt;br /&gt;
&lt;br /&gt;
[[Scoping a Web Service Test (OWASP-WS-001)|4.14.1 Scoping a Web Service Test (OTG-WEBSVC-001)]] formerly &amp;quot;Scoping a Web Service Test (OWASP-WS-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Information Gathering (OWASP-WS-002)|4.14.2 WS Information Gathering (OTG-WEBSVC-002)]] formerly &amp;quot;WS Information Gathering (OWASP-WS-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Authentication Testing (OWASP-WS-003)|4.14.3 WS Authentication Testing (OTG-WEBSVC-003)]] formerly &amp;quot;WS Authentication Testing (OWASP-WS-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Management Interface Testing (OWASP-WS-004)|4.14.4 WS Management Interface Testing (OTG-WEBSVC-004)]] formerly &amp;quot;WS Management Interface Testing (OWASP-WS-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Weak XML Structure Testing (OWASP-WS-005)|4.14.5 Weak XML Structure Testing (OTG-WEBSVC-005)]] formerly &amp;quot;Weak XML Structure Testing (OWASP-WS-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[XML Content-Level Testing (OWASP-WS-006)|4.14.6 XML Content-Level Testing (OTG-WEBSVC-006)]] formerly &amp;quot;XML Content-Level Testing (OWASP-WS-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS HTTP GET Parameters/REST Testing (OWASP-WS-007)|4.14.7 WS HTTP GET Parameters/REST Testing (OTG-WEBSVC-007)]] formerly &amp;quot;WS HTTP GET Parameters/REST Testing (OWASP-WS-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Naughty SOAP Attachment Testing (OWASP-WS-008)|4.14.8 WS Naughty SOAP Attachment Testing (OTG-WEBSVC-008)]] formerly &amp;quot;WS Naughty SOAP Attachment Testing (OWASP-WS-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Replay/MiTM Testing (OWASP-WS-009)|4.14.9 WS Replay/MiTM Testing (OTG-WEBSVC-009)]] formerly &amp;quot;WS Replay/MiTM Testing (OWASP-WS-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS BEPL Testing (OWASP-WS-010)|4.14.10 WS BEPL Testing (OTG-WEBSVC-010)]] formerly &amp;quot;WS BEPL Testing (OWASP-WS-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Client Side Testing|'''4.15 Client Side Testing''']] [New!] &lt;br /&gt;
&lt;br /&gt;
[[Testing for DOM-based Cross site scripting  (OWASP-DV-003)|4.15.1 Testing for DOM based Cross Site Scripting  (OTG-CLIENT-001)]] formerly &amp;quot;Testing for DOM based Cross Site Scripting  (OWASP-CS-001)&amp;quot; [Stefano Di Paola]&lt;br /&gt;
&lt;br /&gt;
[[Test Cross Origin Resource Sharing (OTG-CLIENT-002)|4.15.2 Test Cross Origin Resource Sharing (OTG-CLIENT-002)]] formerly &amp;quot;Testing for HTML5 (OWASP CS-002)&amp;quot; [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Cross site flashing (OWASP-DV-004)|4.15.3 Testing for Cross Site Flashing   (OTG-CLIENT-003)]] formerly &amp;quot;Testing for Cross Site Flashing   (OWASP-CS-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Clickjacking (OWASP-CS-004)|4.15.4 Testing for Clickjacking (OTG-CLIENT-004)]] formerly &amp;quot;Testing for Clickjacking (OWASP-CS-004)&amp;quot; [Davide Danelon]&lt;br /&gt;
&lt;br /&gt;
[[Testing WebSockets (OTG-CLIENT-005)|4.15.5 Testing WebSockets (OTG-CLIENT-005)]] [Ryan Dewhurst]&lt;br /&gt;
&lt;br /&gt;
[[Test Web Messaging (OTG-CLIENT-006)|4.15.6 Test Web Messaging (OTG-CLIENT-006)]] [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
[[Test Local Storage (OTG-CLIENT-007)|4.15.7 Test Local Storage (OTG-CLIENT-007)]] [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
==[[Writing Reports: value the real risk |5. Writing Reports: value the real risk ]]==&lt;br /&gt;
&lt;br /&gt;
[[How to value the real risk |5.1 How to value the real risk]] [To review--&amp;gt; Amro AlOlaqi]&lt;br /&gt;
&lt;br /&gt;
[[How to write the report of the testing |5.2 How to write the report of the testing]] [To review--&amp;gt; Amro AlOlaqi]&lt;br /&gt;
&lt;br /&gt;
==[[Appendix A: Testing Tools |Appendix A: Testing Tools ]]==&lt;br /&gt;
&lt;br /&gt;
* Black Box Testing Tools [To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix B: Suggested Reading | Appendix B: Suggested Reading]]==&lt;br /&gt;
* Whitepapers [To review--&amp;gt; David Fern]&lt;br /&gt;
* Books [To review--&amp;gt; David Fern]&lt;br /&gt;
* Useful Websites [To review--&amp;gt; David Fern]&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix C: Fuzz Vectors | Appendix C: Fuzz Vectors]]==&lt;br /&gt;
&lt;br /&gt;
* Fuzz Categories [To review--&amp;gt; Amro AlOlaqi]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix D: Encoded Injection | Appendix D: Encoded Injection]]==&lt;br /&gt;
&lt;br /&gt;
[To review--&amp;gt; Amro AlOlaqi]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Testing Project]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Enumerate_Infrastructure_and_Application_Admin_Interfaces_(OTG-CONFIG-005)&amp;diff=161128</id>
		<title>Enumerate Infrastructure and Application Admin Interfaces (OTG-CONFIG-005)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Enumerate_Infrastructure_and_Application_Admin_Interfaces_(OTG-CONFIG-005)&amp;diff=161128"/>
				<updated>2013-10-18T23:44:38Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Administrator interfaces may be present in the application or on the application server to allow certain users to undertake privileged activities on the site. Tests should be undertaken to reveal if and how this privileged functionality can be accessed by an unauthorized or standard user.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
An application may require an administrator interface to enable a privileged user to access functionality that may make changes to how the site functions. Such changes may include:&lt;br /&gt;
&lt;br /&gt;
- user account provisioning&amp;lt;br&amp;gt;&lt;br /&gt;
- site design and layout&amp;lt;br&amp;gt;&lt;br /&gt;
- data manipulation&amp;lt;br&amp;gt;&lt;br /&gt;
- configuration changes&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In many instances, such interfaces are usually implemented with little thought of how to separate them from the normal users of the site. Testing is aimed at discovering these administrator interfaces and accessing functionality intended for the privileged users.&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
The following describes vectors that may be used to test for the presence of administrative interfaces. These techniques may also be used for testing for related issues including privilege escalation, and are described elsewhere in this guide in greater detail:&lt;br /&gt;
&lt;br /&gt;
* Directory and file enumeration - An administrative interface may be present but not visibly available to the tester. Attempting to guess the path of the administrative interface may be as simple as requesting: ''/admin or /administrator etc..'' or in some scenarios can be revealed within seconds using [http://www.exploit-db.com/google-dorks Google dorks].&lt;br /&gt;
&lt;br /&gt;
A tester may have to also identify the filename of the administration page. Forcibly browsing to the identified page may provide access to the interface.&lt;br /&gt;
&lt;br /&gt;
* Comments and links in source - Many sites use common code that is loaded for all site users. By examining all source sent to the client, links to administrator functionality may be discovered and should be investigated. &lt;br /&gt;
&lt;br /&gt;
* Reviewing server and application documentation - If the application server or application is deployed in its default configuration it may be possible to access the administration interface using information described in configuration or help documentation. Default password lists should be consulted if an administrative interface is found and credentials are required.&lt;br /&gt;
&lt;br /&gt;
* Alternative server port - Administration interfaces may be seen on a different port on the host than the main application. For example, Apache Tomcat's Administration interface can often be seen on port 8080.&lt;br /&gt;
&lt;br /&gt;
* Parameter tampering - A GET or POST parameter or a cookie variable may be required to enable the administrator functionality. Clues to this include the presence of hidden fields such as:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;input type=&amp;quot;hidden&amp;quot; name=&amp;quot;admin&amp;quot; value=&amp;quot;no&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
or in a cookie:&lt;br /&gt;
&lt;br /&gt;
 Cookie: session_cookie; useradmin=0&lt;br /&gt;
&lt;br /&gt;
Once an administrative interface has been discovered, a combination of the above techniques may be used to attempt to bypass authentication. If this fails, the tester may wish to attempt a brute force attack. In such an instance the tester should be aware of the potential for administrative account lockout if such functionality is present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example == &lt;br /&gt;
A more detailed examination of the server and application components should be undertaken to ensure hardening (i.e. administrator pages are not accessible to everyone through the use of IP filtering or other controls), and where applicable, verification that all components do not use default credentials or configurations.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Source code should be reviewed to ensure that the authorization and authentication model ensures clear separation of duties between normal users and site administrators. User interface functions shared between normal and administrator users should be reviewed to ensure clear separation between the drawing of such components and information leakage from such shared functionality.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Default Password list: http://www.governmentsecurity.org/articles/DefaultLoginsandPasswordsforNetworkedDevices.php&lt;br /&gt;
* Default Password list: http://www.cirt.net/passwords&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Enumerate_Infrastructure_and_Application_Admin_Interfaces_(OTG-CONFIG-005)&amp;diff=161110</id>
		<title>Enumerate Infrastructure and Application Admin Interfaces (OTG-CONFIG-005)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Enumerate_Infrastructure_and_Application_Admin_Interfaces_(OTG-CONFIG-005)&amp;diff=161110"/>
				<updated>2013-10-18T23:19:18Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Administrator interfaces may be present in the application or on the application server to allow certain users to undertake privileged activities on the site. Tests should be undertaken to reveal if and how this privileged functionality can be accessed by an unauthorized or standard user.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
An application may require an administrator interface to enable a privileged user to access functionality that may make changes to how the site functions. Such changes may include:&lt;br /&gt;
&lt;br /&gt;
- user account provisioning&amp;lt;br&amp;gt;&lt;br /&gt;
- site design and layout&amp;lt;br&amp;gt;&lt;br /&gt;
- data manipulation&amp;lt;br&amp;gt;&lt;br /&gt;
- configuration changes&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In many instances, such interfaces are usually implemented with little thought of how to separate them from the normal users of the site. Testing is aimed at discovering these administrator interfaces and accessing functionality intended for the privileged users.&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
The following describes vectors that may be used to test for the presence of administrative interfaces. These techniques may also be used for testing for related issues including privilege escalation, and are described elsewhere in this guide in greater detail:&lt;br /&gt;
&lt;br /&gt;
* Directory and file enumeration - An administrative interface may be present but not visibly available to the tester. Attempting to guess the path of the administrative interface may be as simple as requesting: &lt;br /&gt;
/admin or /administrator etc..&lt;br /&gt;
A tester may have to also identify the filename of the administration page. Forcibly browsing to the identified page may provide access to the interface.&lt;br /&gt;
&lt;br /&gt;
* Comments and links in source - Many sites use common code that is loaded for all site users. By examining all source sent to the client, links to administrator functionality may be discovered and should be investigated. &lt;br /&gt;
&lt;br /&gt;
* Reviewing server and application documentation - If the application server or application is deployed in its default configuration it may be possible to access the administration interface using information described in configuration or help documentation. Default password lists should be consulted if an administrative interface is found and credentials are required.&lt;br /&gt;
&lt;br /&gt;
* Alternative server port - Administration interfaces may be seen on a different port on the host than the main application. For example, Apache Tomcat's Administration interface can often be seen on port 8080.&lt;br /&gt;
&lt;br /&gt;
* Parameter tampering - A GET or POST parameter or a cookie variable may be required to enable the administrator functionality. Clues to this include the presence of hidden fields such as:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;input type=&amp;quot;hidden&amp;quot; name=&amp;quot;admin&amp;quot; value=&amp;quot;no&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
or in a cookie:&lt;br /&gt;
&lt;br /&gt;
 Cookie: session_cookie; useradmin=0&lt;br /&gt;
&lt;br /&gt;
Once an administrative interface has been discovered, a combination of the above techniques may be used to attempt to bypass authentication. If this fails, the tester may wish to attempt a brute force attack. In such an instance the tester should be aware of the potential for administrative account lockout if such functionality is present.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example == &lt;br /&gt;
A more detailed examination of the server and application components should be undertaken to ensure hardening (i.e. administrator pages are not accessible to everyone through the use of IP filtering or other controls), and where applicable, verification that all components do not use default credentials or configurations.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Source code should be reviewed to ensure that the authorization and authentication model ensures clear separation of duties between normal users and site administrators. User interface functions shared between normal and administrator users should be reviewed to ensure clear separation between the drawing of such components and information leakage from such shared functionality.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Default Password list: http://www.governmentsecurity.org/articles/DefaultLoginsandPasswordsforNetworkedDevices.php&lt;br /&gt;
* Default Password list: http://www.cirt.net/passwords&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Enumerate_Infrastructure_and_Application_Admin_Interfaces_(OTG-CONFIG-005)&amp;diff=161109</id>
		<title>Enumerate Infrastructure and Application Admin Interfaces (OTG-CONFIG-005)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Enumerate_Infrastructure_and_Application_Admin_Interfaces_(OTG-CONFIG-005)&amp;diff=161109"/>
				<updated>2013-10-18T23:09:41Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Administrator interfaces may be present in the application or on the application server to allow certain users to undertake privileged activities on the site. Tests should be undertaken to reveal if and how this privileged functionality can be accessed by an unauthorized or standard user.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
An application may require an administrator interface to enable a privileged user to access functionality that may make changes to how the site functions. Such changes may include:&lt;br /&gt;
&lt;br /&gt;
- user account provisioning&amp;lt;br&amp;gt;&lt;br /&gt;
- site design and layout&amp;lt;br&amp;gt;&lt;br /&gt;
- data manipulation&amp;lt;br&amp;gt;&lt;br /&gt;
- configuration changes&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In many instances, such interfaces are usually implemented with little thought of how to separate them from the normal users of the site. Testing is aimed at discovering these administrator interfaces and accessing functionality intended for the privileged users.&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
The following describes vectors that may be used to test for the presence of administrative interfaces. These techniques may also be used for testing for related issues including privilege escalation, and are described elsewhere in this guide in greater detail:&lt;br /&gt;
&lt;br /&gt;
* Directory and file enumeration - An administrative interface may be present but not visibly available to the tester. Attempting to guess the path of the administrative interface may be as simple as requesting: &lt;br /&gt;
/admin or /administrator etc..&lt;br /&gt;
A tester may have to also identify the filename of the administration page. Forcibly browsing to the identified page may provide access to the interface.&lt;br /&gt;
&lt;br /&gt;
* Comments and links in source - Many sites use common code that is loaded for all site users. By examining all source sent to the client, links to administrator functionality may be discovered and should be investigated. &lt;br /&gt;
&lt;br /&gt;
* Reviewing server and application documentation - If the application server or application is deployed in its default configuration it may be possible to access the administration interface using information described in configuration or help documentation. Default password lists should be consulted if an administrative interface is found and credentials are required.&lt;br /&gt;
&lt;br /&gt;
* Alternative server port - Administration interfaces may be seen on a different port on the host than the main application. For example, Apache Tomcat's Administration interface can often be seen on port 8080.&lt;br /&gt;
&lt;br /&gt;
* Parameter tampering - A GET or POST parameter or a cookie variable may be required to enable the administrator functionality. Clues to this include the presence of hidden fields such as:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;input type=&amp;quot;hidden&amp;quot; name=&amp;quot;admin&amp;quot; value=&amp;quot;no&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
or in a cookie:&lt;br /&gt;
&lt;br /&gt;
 Cookie: session_cookie; useradmin=0&lt;br /&gt;
&lt;br /&gt;
Once an administrative interface has been discovered, a combination of the above techniques may be used to attempt to bypass authentication. If this fails, the tester may wish to attempt a brute force attack. In such an instance the tester should be aware of the potential for administrative account lockout if such functionality is present.&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example == &lt;br /&gt;
A more detailed examination of the server and application components should be undertaken to ensure hardening (i.e. administrator pages are not accessible to everyone through the use of IP filtering or other controls), and where applicable, verification that all components do not use default credentials or configurations.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Source code should be reviewed to ensure that the authorization and authentication model ensures clear separation of duties between normal users and site administrators. User interface functions shared between normal and administrator users should be reviewed to ensure clear separation between the drawing of such components and information leakage from such shared functionality.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* Default Password list: http://www.governmentsecurity.org/articles/DefaultLoginsandPasswordsforNetworkedDevices.php&lt;br /&gt;
* Default Password list: http://www.cirt.net/passwords&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=159364</id>
		<title>OWASP Testing Guide v4 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=159364"/>
				<updated>2013-09-27T17:45:30Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{OWASP Breakers}}&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
'''This is the DRAFT of the table of content of the New Testing Guide v4.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;You can download the stable version v3 [http://www.owasp.org/images/5/56/OWASP_Testing_Guide_v3.pdf here] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Back to the OWASP Testing Guide Project:&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Testing_Project&lt;br /&gt;
&lt;br /&gt;
'''Updated: 15th February 2013'''&lt;br /&gt;
&lt;br /&gt;
[[ OWTGv4 Contributors list|'''Contributors List]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following is a DRAFT of the Toc based on the feedback already received.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Foreword|Foreword by Eoin Keary]]== &lt;br /&gt;
[To review--&amp;gt; Eoin Keary -&amp;gt; Done!!]&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Frontispiece |1. Frontispiece]]== &lt;br /&gt;
[To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[Testing Guide Frontispiece|1.1 About the OWASP Testing Guide Project]]''' &lt;br /&gt;
[To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[About The Open Web Application Security Project|1.2 About The Open Web Application Security Project]]''' &lt;br /&gt;
[To review--&amp;gt; ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Introduction|2. Introduction]]==&lt;br /&gt;
&lt;br /&gt;
'''2.1 The OWASP Testing Project'''&lt;br /&gt;
&lt;br /&gt;
'''2.2 Principles of Testing'''&lt;br /&gt;
&lt;br /&gt;
'''2.3 Testing Techniques Explained''' &lt;br /&gt;
&lt;br /&gt;
2.4 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Requirements_Test_Derivation Security requirements test derivation],[https://www.owasp.org/index.php/Testing_Guide_Introduction#Functional_and_Non_Functional_Test_Requirements functional and non functional test requirements], and [https://www.owasp.org/index.php/Testing_Guide_Introduction#Test_Cases_Through_Use_and_Misuse_Cases test cases through use and misuse cases]&lt;br /&gt;
&lt;br /&gt;
2.5 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Test_Data_Analysis_and_Reporting Security test data analysis and reporting: root cause identification and business/role case test data reporting]&lt;br /&gt;
&lt;br /&gt;
==[[The OWASP Testing Framework|3. The OWASP Testing Framework]]==&lt;br /&gt;
&lt;br /&gt;
'''3.1. Overview'''&lt;br /&gt;
&lt;br /&gt;
'''3.2. Phase 1: Before Development Begins '''&lt;br /&gt;
&lt;br /&gt;
'''3.3. Phase 2: During Definition and Design'''&lt;br /&gt;
&lt;br /&gt;
'''3.4. Phase 3: During Development'''&lt;br /&gt;
&lt;br /&gt;
'''3.5. Phase 4: During Deployment'''&lt;br /&gt;
&lt;br /&gt;
'''3.6. Phase 5: Maintenance and Operations'''&lt;br /&gt;
&lt;br /&gt;
'''3.7. A Typical SDLC Testing Workflow '''&lt;br /&gt;
&lt;br /&gt;
==[[Web Application Penetration Testing |4. Web Application Penetration Testing ]]==&lt;br /&gt;
&lt;br /&gt;
[[Testing: Introduction and objectives|'''4.1 Introduction and Objectives''']] [To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
[[Testing Checklist| 4.1.1 Testing Checklist]] [To review at the end of brainstorming --&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing Information Gathering|'''4.2 Information Gathering ''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing: Search engine discovery/reconnaissance (OWASP-IG-002)|4.2.1 Conduct Search Engine Discovery and Reconnaissance for Information Leakage (OTG-INFO-001) ]] formerly &amp;quot;Search Engine Discovery/Reconnaissance (OWASP-IG-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Fingerprint Web Server (OTG-INFO-002)|4.2.2 Fingerprint Web Server (OTG-INFO-002) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing: Spiders, Robots, and Crawlers (OWASP-IG-001)|4.2.3 Review Webserver Metafiles for Information Leakage (OTG-INFO-003) ]] formerly &amp;quot;Spiders, Robots and Crawlers (OWASP-IG-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Application Discovery (OWASP-IG-005)|4.2.4 Enumerate Applications on Webserver (OTG-INFO-004) ]] formerly &amp;quot;Application Discovery (OWASP-IG-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Review webpage comments and metadata(OWASP-IG-007)|4.2.5 Review Webpage Comments and Metadata for Information Leakage (OTG-INFO-005) ]] formerly &amp;quot;Review webpage comments and metadata(OWASP-IG-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing: Identify application entry points (OWASP-IG-003)|4.2.6 Identify application entry points (OTG-INFO-006) ]] formerly &amp;quot;Identify application entry points (OWASP-IG-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Identify application exit/handover points (OWASP-IG-008)|4.2.7 Identify application exit/handover points (OTG-INFO-007) ]] formerly &amp;quot;Identify application exit/handover points (OWASP-IG-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Map execution paths through application (OWASP-IG-009)|4.2.8 Map execution paths through application (OTG-INFO-008)]] formerly &amp;quot;Map execution paths through application (OWASP-IG-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Fingerprint Web Application Framework (OTG-INFO-009)|4.2.9 Fingerprint Web Application Framework (OTG-INFO-009) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-010)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Web Application (OTG-INFO-011)|4.2.10 Fingerprint Web Application (OTG-INFO-010) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-010)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[Map Network and Application Architecture (OTG-INFO-012)|4.2.11 Map Network and Application Architecture (OTG-INFO-011) ]] formerly &amp;quot;Testing for Infrastructure Configuration Management Testing weakness (OWASP-CM-001)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for configuration management|'''4.3 Configuration and Deploy Management Testing ''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for infrastructure configuration management (OWASP-CM-003)|4.3.1 Test Network/Infrastructure Configuration (OTG-CONFIG-001) ]] formerly &amp;quot;Testing for Infrastructure Configuration Management Testing weakness (OWASP-CM-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for application configuration management (OWASP-CM-004)|4.3.2 Test Application Platform Configuration (OTG-CONFIG-002) ]] formerly &amp;quot;Testing for Application Configuration Management weakness (OWASP-CM-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for file extensions handling  (OWASP-CM-005)|4.3.3 Test File Extensions Handling for Sensitive Information (OTG-CONFIG-003) ]] formerly &amp;quot;Testing for File Extensions Handling  (OWASP-CM-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Old, Backup and Unreferenced Files (OWASP-CM-006)|4.3.4 Review Old, Backup and Unreferenced Files for Sensitive Information (OTG-CONFIG-004) ]] formerly &amp;quot;Old, Backup and Unreferenced Files (OWASP-CM-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Admin Interfaces  (OWASP-CM-007)|4.3.5 Enumerate Infrastructure and Application Admin Interfaces (OTG-CONFIG-005) ]] formerly &amp;quot;Infrastructure and Application Admin Interfaces  (OWASP-CM-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Methods and XST  (OWASP-CM-008)|4.3.6 Test HTTP Methods (OTG-CONFIG-006) ]] formerly &amp;quot;Testing for Bad HTTP Methods (OWASP-CM-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Database credentials/connection strings available|4.3.7 Testing for Database credentials/connection strings available (OTG-CONFIG-007) ]] formerly &amp;quot;Testing for Database credentials/connection strings available (OWASP-CM-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Content Security Policy weakness|4.3.8 Test Content Security Policy (OTG-CONFIG-008) ]] formerly &amp;quot;Testing for Content Security Policy weakness (OWASP-CM-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Missing HSTS header|4.3.9 Test HTTP Strict Transport Security (OTG-CONFIG-009) ]] formerly &amp;quot;Testing for Missing HSTS header (OWASP-CM-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Frame Options|4.3.10 Test Frame Options (OTG-CONFIG-010) ]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for RIA policy files weakness|4.3.11 Test RIA cross domain policy (OTG-CONFIG-011) ]] formerly &amp;quot;Testing for RIA policy files weakness (OWASP-CM-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Content Type Options|4.3.12 Test Content Type Options (OTG-CONFIG-012) ]] new&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing Identity Management|'''4.4 Identity Management Testing''']]&lt;br /&gt;
&lt;br /&gt;
[[Test Role Definitions (OTG-IDENT-001)|4.4.1 Test Role Definitions (OTG-IDENT-001)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test User Registration Process (OTG-IDENT-002)|4.4.2 Test User Registration Process (OTG-IDENT-002)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Provisioning Process (OTG-IDENT-003)|4.4.3 Test Account Provisioning Process (OTG-IDENT-003)]] New&lt;br /&gt;
&lt;br /&gt;
[[Testing for Account Enumeration and Guessable User Account (OWASP-AT-002)|4.4.4 Testing for Account Enumeration and Guessable User Account (OTG-IDENT-004) ]] formerly &amp;quot;Testing for Account Enumeration and Guessable User Account (OWASP-AT-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak or unenforced username policy (OWASP-AT-009)| 4.4.5 Testing for Weak or unenforced username policy (OTG-IDENT-005)]] formerly &amp;quot;Testing for Weak or unenforced username policy (OWASP-AT-009)&lt;br /&gt;
&lt;br /&gt;
[[Test Permissions of Guest/Training Accounts (OTG-IDENT-006)|4.4.6 Test Permissions of Guest/Training Accounts (OTG-IDENT-006)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Suspension/Resumption Process (OTG-IDENT-007)|4.4.7 Test Account Suspension/Resumption Process (OTG-IDENT-007)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test User Deregistration Process (OTG-IDENT-008)|4.4.8 Test User Deregistration Process (OTG-IDENT-008)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Deregistration Process (OTG-IDENT-009)|4.4.9 Test Account Deregistration Process (OTG-IDENT-009)]] New&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for authentication|'''4.5 Authentication Testing ''']] &lt;br /&gt;
&lt;br /&gt;
[[Testing for Credentials Transported over an Encrypted Channel (OWASP-AT-001)|4.5.1 Testing for Credentials Transported over an Encrypted Channel  (OTG-AUTHN-001)]] formerly &amp;quot;Testing for Credentials Transported over an Encrypted Channel  (OWASP-AT-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for default credentials (OWASP-AT-003)|4.5.2 Testing for default credentials (OTG-AUTHN-002)]] formerly &amp;quot;Testing for default credentials (OWASP-AT-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak lock out mechanism (OWASP-AT-004)|4.5.3 Testing for Weak lock out mechanism (OTG-AUTHN-003)]] formerly &amp;quot;Testing for Weak lock out mechanism (OWASP-AT-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Bypassing Authentication Schema (OWASP-AT-005)|4.5.4 Testing for bypassing authentication schema (OTG-AUTHN-004)]] formerly &amp;quot;Testing for bypassing authentication schema (OWASP-AT-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Vulnerable Remember Password (OWASP-AT-006)|4.5.5 Test remember password functionality (OTG-AUTHN-005)]] formerly &amp;quot;Testing for vulnerable remember password functionality (OWASP-AT-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Browser cache weakness (OWASP-AT-007)|4.5.6 Testing for Browser cache weakness (OTG-AUTHN-006)]] formerly &amp;quot;Testing for Browser cache weakness (OWASP-AT-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak password policy (OWASP-AT-008)|4.5.7 Testing for Weak password policy (OTG-AUTHN-007)]] formerly &amp;quot;Testing for Weak password policy (OWASP-AT-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak security question/answer (OTG-AUTHN-008)|4.5.8 Testing for Weak security question/answer (OTG-AUTHN-008)]] New! - Robert Winkel&lt;br /&gt;
&lt;br /&gt;
[[Testing for weak password change or reset functionalities (OWASP-AT-011)|4.5.9 Testing for weak password change or reset functionalities (OTG-AUTHN-009)]] formerly &amp;quot;Testing for weak password change or reset functionalities (OWASP-AT-011)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weaker authentication in alternative channel (OTG-AUTHN-010)|4.5.10 Testing for Weaker authentication in alternative channel (OTG-AUTHN-010)]] (e.g. mobile app, IVR, help desk)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Authorization|'''4.6 Authorization Testing''']] &lt;br /&gt;
&lt;br /&gt;
[[Test Management of Account Permissions (OTG-AUTHZ-001)|4.6.1 Test Management of Account Permissions (OTG-AUTHZ-001)]] New&lt;br /&gt;
&lt;br /&gt;
[[Testing for Path Traversal  (OWASP-AZ-001)|4.6.2 Testing Directory traversal/file include (OTG-AUTHZ-002)]] formerly &amp;quot;Testing Directory traversal/file include (OWASP-AZ-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Bypassing Authorization Schema  (OWASP-AZ-002)|4.6.3 Testing for bypassing authorization schema (OTG-AUTHZ-003)]] formerly &amp;quot;Testing for bypassing authorization schema  (OWASP-AZ-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Privilege escalation  (OWASP-AZ-003)|4.6.4 Testing for Privilege Escalation (OTG-AUTHZ-004)]] formerly &amp;quot;Testing for Privilege Escalation  (OWASP-AZ-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure Direct Object References (OWASP-AZ-004)|4.6.5 Testing for Insecure Direct Object References (OTG-AUTHZ-005)]] formerly &amp;quot;Testing for Insecure Direct Object References (OWASP-AZ-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Failure to Restrict access to authorized resource (OWASP-AZ-005)|4.6.6 Testing for Failure to Restrict access to authorized resource (OTG-AUTHZ-006)]] formerly &amp;quot;Testing for Failure to Restrict access to authorized resource (OWASP-AZ-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test privileges of server components (OTG-AUTHZ-007)|4.6.7 Test privileges of server components (OTG-AUTHZ-007)]] (e.g. indexing service, reporting interface, file generator)&lt;br /&gt;
&lt;br /&gt;
[[Test enforcement of application entry points (OTG-AUTHZ-008)|4.6.8 Test enforcement of application entry points (OTG-AUTHZ-008)]] (including exposure of objects)&lt;br /&gt;
&lt;br /&gt;
[[Testing for failure to restrict access to authenticated resource(OWASP-AT-010)|4.6.9 Testing for failure to restrict access to authenticated resource (OTG-AUTHZ-009)]] formerly &amp;quot;Testing for failure to restrict access to authenticated resource (OWASP-AT-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session Management|'''4.7 Session Management Testing''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session_Management_Schema (OWASP-SM-001)|4.7.1 Testing for Bypassing Session Management Schema (OTG-SESS-001)]] formerly &amp;quot;Testing for Bypassing Session Management Schema (OWASP-SM-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for cookies attributes  (OWASP-SM-002)|4.7.2 Testing for Cookies attributes (OTG-SESS-002)]] formerly &amp;quot;Testing for Cookies attributes (OWASP-SM-002)&amp;quot; (Cookies are set not ‘HTTP Only’, ‘Secure’,  and no time validity)&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session Fixation  (OWASP-SM-003)|4.7.3 Testing for Session Fixation (OTG-SESS-003)]] formerly &amp;quot;Testing for Session Fixation  (OWASP-SM-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Exposed Session Variables  (OWASP-SM-004)|4.7.4 Testing for Exposed Session Variables (OTG-SESS-004)]] formerly &amp;quot;Testing for Exposed Session Variables (OWASP-SM-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for CSRF  (OWASP-SM-005)|4.7.5 Testing for Cross Site Request Forgery (CSRF) (OTG-SESS-005)]] formerly &amp;quot;Testing for Cross Site Request Forgery (CSRF) (OWASP-SM-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test Session Token Strength (OTG-SESS-006)|4.7.6 Test Session Token Strength (OTG-SESS-006)]]&lt;br /&gt;
 &lt;br /&gt;
[[Testing for logout functionality (OWASP-SM-007)|4.7.7 Testing for logout functionality (OTG-SESS-007)]] formerly &amp;quot;Testing for logout functionality (OWASP-SM-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session puzzling (OWASP-SM-008)|4.7.8 Testing for Session puzzling (OWASP-SM-008)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Session Timeout (OTG-SESS-008)|4.7.8 Test Session Timeout (OTG-SESS-008)]]&lt;br /&gt;
&lt;br /&gt;
[[Test multiple concurrent sessions (OTG-SESS-009)|4.7.9 Test multiple concurrent sessions (OTG-SESS-009)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Data Validation|'''4.8 Data Validation Testing''']] &lt;br /&gt;
&lt;br /&gt;
[[Testing for Reflected Cross site scripting (OWASP-DV-001) |4.8.1 Testing for Reflected Cross Site Scripting (OTG-INPVAL-001)]] formerly &amp;quot;Testing for Reflected Cross Site Scripting (OWASP-DV-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stored Cross site scripting (OWASP-DV-002) |4.8.2 Testing for Stored Cross Site Scripting (OTG-INPVAL-002)]] formerly &amp;quot;Testing for Stored Cross Site Scripting (OWASP-DV-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Verb Tampering (OWASP-DV-003)|4.8.3 Testing for HTTP Verb Tampering (OTG-INPVAL-003)]] formerly &amp;quot;Testing for HTTP Verb Tampering (OWASP-DV-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Parameter pollution (OWASP-DV-004)|4.8.4 Testing for HTTP Parameter pollution (OTG-INPVAL-004) ]] formerly &amp;quot;Testing for HTTP Parameter pollution (OWASP-DV-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Unvalidated Redirects and Forwards (OWASP-DV-004)|4.8.5 Testing for Unvalidated Redirects and Forwards (OTG-INPVAL-005) ]] formerly &amp;quot;Testing for Unvalidated Redirects and Forwards (OWASP-DV-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for SQL Injection (OWASP-DV-005)| 4.8.6 Testing for SQL Injection (OTG-INPVAL-006)]] formerly &amp;quot;Testing for SQL Injection (OWASP-DV-005)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[Testing for Oracle|4.8.6.1 Oracle Testing]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for MySQL|4.8.6.2 MySQL Testing [Ismael Gonçalves]]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for SQL Server|4.8.6.3 SQL Server Testing]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Backend_Security_Project_Testing_PostgreSQL|4.8.6.4 Testing PostgreSQL (from OWASP BSP) ]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for MS Access |4.8.6.5 MS Access Testing]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for NoSQL injection|4.8.6.6 Testing for NoSQL injection [New!]]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for LDAP Injection  (OWASP-DV-006)|4.8.7 Testing for LDAP Injection  (OTG-INPVAL-007)]] formerly &amp;quot;Testing for LDAP Injection  (OWASP-DV-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for ORM Injection   (OWASP-DV-007)|4.8.8 Testing for ORM Injection   (OTG-INPVAL-008)]] formerly &amp;quot;Testing for ORM Injection   (OWASP-DV-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for XML Injection (OWASP-DV-008)|4.8.9 Testing for XML Injection (OTG-INPVAL-009)]] formerly &amp;quot;Testing for XML Injection (OWASP-DV-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for SSI Injection  (OWASP-DV-009)|4.8.10 Testing for SSI Injection  (OTG-INPVAL-010)]] formerly &amp;quot;Testing for SSI Injection  (OWASP-DV-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for XPath Injection  (OWASP-DV-010)|4.8.11 Testing for XPath Injection  (OTG-INPVAL-011)]] formerly &amp;quot;Testing for XPath Injection  (OWASP-DV-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for IMAP/SMTP Injection  (OWASP-DV-011)|4.8.12 IMAP/SMTP Injection  (OTG-INPVAL-012)]] formerly &amp;quot;IMAP/SMTP Injection  (OWASP-DV-011)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Code Injection  (OWASP-DV-012)|4.8.13 Testing for Code Injection  (OTG-INPVAL-013)]] formerly &amp;quot;Testing for Code Injection  (OWASP-DV-012)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Local File Inclusion|4.8.13.1 Testing for Local File Inclusion]] [Alexander Antukh]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Remote File Inclusion|4.8.13.2 Testing for Remote File Inclusion]] [Alexander Antukh]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Command Injection   (OWASP-DV-013)|4.8.14 Testing for Command Injection   (OTG-INPVAL-014)]] formerly &amp;quot;Testing for Command Injection   (OWASP-DV-013)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Buffer Overflow (OWASP-DV-014)|4.8.15 Testing for Buffer overflow (OTG-INPVAL-015)]] formerly &amp;quot;Testing for Buffer overflow (OWASP-DV-014)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Heap Overflow|4.8.15.1 Testing for Heap overflow]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stack Overflow|4.8.15.2 Testing for Stack overflow]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Format String|4.8.15.3 Testing for Format string]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Incubated Vulnerability (OWASP-DV-015)|4.8.16 Testing for incubated vulnerabilities (OTG-INPVAL-016)]] formerly &amp;quot;Testing for incubated vulnerabilities (OWASP-DV-015)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Splitting/Smuggling  (OWASP-DV-016)|4.8.17 Testing for HTTP Splitting/Smuggling  (OTG-INPVAL-017) ]] formerly &amp;quot;Testing for HTTP Splitting/Smuggling  (OWASP-DV-016)&amp;quot; [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Error Handling|'''4.9 Error Handling''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Error Code (OWASP-IG-006)|4.9.1 Analysis of Error Codes (OTG-ERR-001)]] formerly &amp;quot;Analysis of Error Codes (OWASP-IG-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stack Traces (OWASP-IG-XXX)|4.9.2 Analysis of Stack Traces (OTG-ERR-002)]] formerly &amp;quot;Analysis of Stack Traces&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Cryptography|'''4.10 Cryptography''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure encryption usage (OWASP-EN-001)| 4.10.1  Testing for Insecure encryption usage (OTG-CRYPST-001)]] formerly &amp;quot;Testing for Insecure encryption usage (OWASP-EN-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OWASP-EN-002)| 4.10.2 Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OTG-CRYPST-002)]] formerly &amp;quot;Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OWASP-EN-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Padding Oracle (OWASP-EN-003)| 4.10.3 Testing for Padding Oracle (OTG-CRYPST-003)]] formerly &amp;quot;Testing for Padding Oracle (OWASP-EN-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Cacheable HTTPS Response (OTG-CRYPST-004)| 4.10.4 Testing for Cacheable HTTPS Response (OTG-CRYPST-004)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Cache Directives (OTG-CRYPST-005)|4.10.5 Test Cache Directives (OTG-CRYPST-005)]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure Cryptographic Storage (OTG-CRYPST-006)|4.10.6 Testing for Insecure Cryptographic Storage (OTG-CRYPST-006)]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-007)|4.10.7 Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-007)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Cryptographic Key Management (OTG-CRYPST-008)|4.10.8 Test Cryptographic Key Management (OTG-CRYPST-008)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Logging|'''4.11 Logging''']] Not convinced Logging should be included as it requires access to logs to test&lt;br /&gt;
&lt;br /&gt;
[[Test time synchronisation (OTG-LOG-001)|4.11.1 Test time synchronisation (OTG-LOG-001) ]] formerly &amp;quot;Incorrect time&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test user-viewable log of authentication events (OTG-LOG-002)|4.11.2 Test user-viewable log of authentication events (OTG-LOG-002)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for business logic   (OWASP-BL-001)|'''4.12 Business Logic Testing  (OWASP-BL-001)''']] [To review--&amp;gt; David Fern]&lt;br /&gt;
Business Logic&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Test business logic data validation (OTG-BUSLOGIC-001)|4.12.1 Test business logic data validation (OTG-BUSLOGIC-001)]] [New!] NOTE MAT: to discuss this section&lt;br /&gt;
&lt;br /&gt;
[[Test Ability to forge requests (OTG-BUSLOGIC-002)|4.12.2 Test Ability to forge requests (OTG-BUSLOGIC-002)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test integrity checks (OTG-BUSLOGIC-003)|4.12.3 Test integrity checks (OTG-BUSLOGIC-003)]] (e.g. overwriting updates) [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test tamper evidence (OTG-BUSLOGIC-004)|4.12.4 Test tamper evidence (OTG-BUSLOGIC-004)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test excessive rate (speed) of use limits (OTG-BUSLOGIC-005)|4.12.5 Test excessive rate (speed) of use limits (OTG-BUSLOGIC-005)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test size of request limits (OTG-BUSLOGIC-006)|4.12.6 Test size of request limits (OTG-BUSLOGIC-006)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test number of times a function can be used limits (OTG-BUSLOGIC-007)|4.12.7 Test number of times a function can be used limits (OTG-BUSLOGIC-002)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test bypass of correct sequence (OTG-BUSLOGIC-008)|4.12.8 Test bypass of correct sequence (OTG-BUSLOGIC-008)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test self-hosted payment cardholder data processing (OTG-BUSLOGIC-009)|4.12.9 Test self-hosted payment cardholder data processing (OTG-BUSLOGIC-009)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test security incident reporting information (OTG-BUSLOGIC-010)|4.12.10 Test security incident reporting information (OTG-BUSLOGIC-010)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test defenses against application mis-use (OTG-BUSLOGIC-011)|4.12.11 Test defenses against application mis-use (OTG-BUSLOGIC-011)]] [New!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Denial of Service|'''4.13 Denial of Service''']]&lt;br /&gt;
&lt;br /&gt;
[[Test Regular expression DoS (OTG-DOS-001)| 4.13.1 Test Regular expression DoS (OTG-DOS-001)]] [New!] note: to understand better&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Test XML DoS (OTG-DOS-002)| 4.13.2 Test XML DoS (OTG-DOS-002)]] [New! - Andrew Muller]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Captcha (OWASP-AT-012)|4.13.3 Testing for CAPTCHA (OTG-DOS-003)]] formerly &amp;quot;Testing for CAPTCHA (OWASP-AT-012)&amp;quot; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Web Service (XML Interpreter)|'''4.14 Web Service Testing''']] [Tom Eston] &lt;br /&gt;
&lt;br /&gt;
[[Scoping a Web Service Test (OWASP-WS-001)|4.14.1 Scoping a Web Service Test (OTG-WEBSVC-001)]] formerly &amp;quot;Scoping a Web Service Test (OWASP-WS-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Information Gathering (OWASP-WS-002)|4.14.2 WS Information Gathering (OTG-WEBSVC-002)]] formerly &amp;quot;WS Information Gathering (OWASP-WS-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Authentication Testing (OWASP-WS-003)|4.14.3 WS Authentication Testing (OTG-WEBSVC-003)]] formerly &amp;quot;WS Authentication Testing (OWASP-WS-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Management Interface Testing (OWASP-WS-004)|4.14.4 WS Management Interface Testing (OTG-WEBSVC-004)]] formerly &amp;quot;WS Management Interface Testing (OWASP-WS-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Weak XML Structure Testing (OWASP-WS-005)|4.14.5 Weak XML Structure Testing (OTG-WEBSVC-005)]] formerly &amp;quot;Weak XML Structure Testing (OWASP-WS-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[XML Content-Level Testing (OWASP-WS-006)|4.14.6 XML Content-Level Testing (OTG-WEBSVC-006)]] formerly &amp;quot;XML Content-Level Testing (OWASP-WS-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS HTTP GET Parameters/REST Testing (OWASP-WS-007)|4.14.7 WS HTTP GET Parameters/REST Testing (OTG-WEBSVC-007)]] formerly &amp;quot;WS HTTP GET Parameters/REST Testing (OWASP-WS-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Naughty SOAP Attachment Testing (OWASP-WS-008)|4.14.8 WS Naughty SOAP Attachment Testing (OTG-WEBSVC-008)]] formerly &amp;quot;WS Naughty SOAP Attachment Testing (OWASP-WS-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Replay/MiTM Testing (OWASP-WS-009)|4.14.9 WS Replay/MiTM Testing (OTG-WEBSVC-009)]] formerly &amp;quot;WS Replay/MiTM Testing (OWASP-WS-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS BEPL Testing (OWASP-WS-010)|4.14.10 WS BEPL Testing (OTG-WEBSVC-010)]] formerly &amp;quot;WS BEPL Testing (OWASP-WS-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Client Side Testing|'''4.15 Client Side Testing''']] [New!] &lt;br /&gt;
&lt;br /&gt;
[[Testing for DOM-based Cross site scripting  (OWASP-DV-003)|4.15.1 Testing for DOM based Cross Site Scripting  (OTG-CLIENT-001)]] formerly &amp;quot;Testing for DOM based Cross Site Scripting  (OWASP-CS-001)&amp;quot; [Stefano Di Paola]&lt;br /&gt;
&lt;br /&gt;
[[Testing Cross Origin Resource Sharing (OWASP CS-002)|4.15.2 Testing Cross Origin Resource Sharing  (OTG-CLIENT-002)]] formerly &amp;quot;Testing for HTML5 (OWASP CS-002)&amp;quot; [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Cross site flashing (OWASP-DV-004)|4.15.3 Testing for Cross Site Flashing   (OTG-CLIENT-003)]] formerly &amp;quot;Testing for Cross Site Flashing   (OWASP-CS-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Clickjacking (OWASP-CS-004)|4.15.4 Testing for Clickjacking (OTG-CLIENT-004)]] formerly &amp;quot;Testing for Clickjacking (OWASP-CS-004)&amp;quot; [Davide Danelon]&lt;br /&gt;
&lt;br /&gt;
[[Testing WebSockets (OTG-CLIENT-005)|4.15.5 Testing WebSockets (OTG-CLIENT-005)]] [Ryan Dewhurst]&lt;br /&gt;
&lt;br /&gt;
[[Testing Web Messaging (OWASP CS-006)|4.15.6 Testing Web Messaging (OTG-CLIENT-006)]] [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
[[Testing Local Storage (OWASP CS-007)|4.15.7 Testing Local Storage (OTG-CLIENT-007)]] [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
[[Testing Sandboxed Iframes (OWASP CS-008)|4.15.8 Testing Sandboxed Iframes (OTG-CLIENT-008)]] [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[Writing Reports: value the real risk |5. Writing Reports: value the real risk ]]==&lt;br /&gt;
&lt;br /&gt;
[[How to value the real risk |5.1 How to value the real risk]] [To review--&amp;gt; Amro AlOlaqi]&lt;br /&gt;
&lt;br /&gt;
[[How to write the report of the testing |5.2 How to write the report of the testing]] [To review--&amp;gt; Amro AlOlaqi]&lt;br /&gt;
&lt;br /&gt;
==[[Appendix A: Testing Tools |Appendix A: Testing Tools ]]==&lt;br /&gt;
&lt;br /&gt;
* Black Box Testing Tools [To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix B: Suggested Reading | Appendix B: Suggested Reading]]==&lt;br /&gt;
* Whitepapers [To review--&amp;gt; David Fern]&lt;br /&gt;
* Books [To review--&amp;gt; David Fern]&lt;br /&gt;
* Useful Websites [To review--&amp;gt; David Fern]&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix C: Fuzz Vectors | Appendix C: Fuzz Vectors]]==&lt;br /&gt;
&lt;br /&gt;
* Fuzz Categories [To review--&amp;gt; Amro AlOlaqi]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix D: Encoded Injection | Appendix D: Encoded Injection]]==&lt;br /&gt;
&lt;br /&gt;
[To review--&amp;gt; Amro AlOlaqi]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Testing Project]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Map_Application_Architecture_(OTG-INFO-010)&amp;diff=159363</id>
		<title>Map Application Architecture (OTG-INFO-010)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Map_Application_Architecture_(OTG-INFO-010)&amp;diff=159363"/>
				<updated>2013-09-27T17:43:52Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: Created page with &amp;quot;{{Template:OWASP Testing Guide v4}}  == Brief Summary == The intrinsic complexity of interconnected and heterogeneous web server infrastructure, which can count hundreds of we...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
The intrinsic complexity of interconnected and heterogeneous web server infrastructure, which can count hundreds of web applications, makes configuration management and review a fundamental step in testing and deploying every single application.&lt;br /&gt;
In fact it takes only a single vulnerability to undermine the security of the entire infrastructure, and even small and (almost) unimportant problems may evolve into severe risks for another application on the same server.&lt;br /&gt;
In order to address these problems, it is of utmost importance to perform an in-depth review of configuration and known security issues.&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
&lt;br /&gt;
Proper configuration management of the web server infrastructure is very important in order to preserve the security of the application itself. If elements such as the web server software, the back-end database servers, or the authentication servers are not properly reviewed and secured, they might introduce undesired risks or introduce new vulnerabilities that might compromise the application itself.&lt;br /&gt;
&lt;br /&gt;
For example, a web server vulnerability that would allow a remote attacker to disclose the source code of the application itself (a vulnerability that has arisen a number of times in both web servers or application servers) could compromise the application, as anonymous users could use the information disclosed in the source code to leverage attacks against the application or its users.&lt;br /&gt;
&lt;br /&gt;
In order to test the configuration management infrastructure, the following steps need to be taken:&lt;br /&gt;
&lt;br /&gt;
* The different elements that make up the infrastructure need to be determined in order to understand how they interact with a web application and how they affect its security.&lt;br /&gt;
* All the elements of the infrastructure need to be reviewed in order to make sure that they don’t hold any known vulnerabilities.&lt;br /&gt;
* A review needs to be made of the administrative tools used to maintain all the different elements.&lt;br /&gt;
* The authentication systems, if any, need to reviewed in order to assure that they serve the needs of the application and that they cannot be manipulated by external users to leverage access.&lt;br /&gt;
* A list of defined ports which are required for the application should be maintained and kept under change control.&lt;br /&gt;
&lt;br /&gt;
== Black Box Testing and examples==&lt;br /&gt;
&lt;br /&gt;
===Review of the application architecture===&lt;br /&gt;
&lt;br /&gt;
The application architecture needs to be reviewed through the test to determine what different components are used to build the web application. In small setups, such as a simple CGI-based application, a single server might be used that runs the web server which executes the C, Perl, or Shell CGIs application, and perhaps also the authentication mechanism. On more complex setups, such as an online bank system, multiple servers might be involved including: a reverse proxy, a front-end web server, an application server and a database server or LDAP server. Each of these servers will be used for different purposes and might be even be divided in different networks with firewalling devices between them, creating different DMZs so that access to the web server will not grant a remote user access to the authentication mechanism itself, and so that compromises of the different elements of the architecture can be isolated in a way such that they will not compromise the whole architecture.&lt;br /&gt;
&lt;br /&gt;
Getting knowledge of the application architecture can be easy if this information is provided to the testing team by the application developers in document form or through interviews, but can also prove to be very difficult if doing a blind penetration test.&lt;br /&gt;
&lt;br /&gt;
In the latter case, a tester will first start with the assumption that there is a simple setup (a single server) and will, through the information retrieved from other tests, derive the different elements and question this assumption that the architecture will be extended. The tester will start by asking simple questions such as: “Is there a firewalling system protecting the web server?” which will be answered based on the results of network scans targeted at the web server and the analysis of whether the network ports of the web server are being filtered in the network edge (no answer or ICMP unreachables are received) or if the server is directly connected to the Internet (i.e. returns RST packets for all non-listening ports). This analysis can be enhanced in order to determine the type of firewall system used based on network packet tests: is it a stateful firewall or is it an access list filter on a router? How is it configured? Can it be bypassed? &lt;br /&gt;
&lt;br /&gt;
Detecting a reverse proxy in front of the web server needs to be done by the analysis of the web server banner, which might directly disclose the existence of a reverse proxy (for example, if ‘WebSEAL’[1]  is returned). It can also be determined by obtaining the answers given by the web server to requests and comparing them to the expected answers. For example, some reverse proxies act as “intrusion prevention systems” (or web-shields) by blocking known attacks targeted at the web server. If the web server is known to answer with a 404 message to a request which targets an unavailable page and returns a different error message for some common web attacks like those done by CGI scanners, it might be an indication of a reverse proxy (or an application-level firewall) which is filtering the requests and returning a different error page than the one expected. Another example: if the web server returns a set of available HTTP methods (including TRACE) but the expected methods return errors then there is probably something in between, blocking them. In some cases, even the protection system gives itself away:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
GET /web-console/ServerInfo.jsp%00 HTTP/1.0&lt;br /&gt;
&lt;br /&gt;
HTTP/1.0 200&lt;br /&gt;
Pragma: no-cache&lt;br /&gt;
Cache-Control: no-cache&lt;br /&gt;
Content-Type: text/html&lt;br /&gt;
Content-Length: 83&lt;br /&gt;
&lt;br /&gt;
&amp;lt;TITLE&amp;gt;Error&amp;lt;/TITLE&amp;gt;&lt;br /&gt;
&amp;lt;BODY&amp;gt;&lt;br /&gt;
&amp;lt;H1&amp;gt;Error&amp;lt;/H1&amp;gt;&lt;br /&gt;
FW-1 at XXXXXX: Access denied.&amp;lt;/BODY&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Example of the security server of Check Point Firewall-1 NG AI “protecting” a web server'''&lt;br /&gt;
&lt;br /&gt;
Reverse proxies can also be introduced as proxy-caches to accelerate the performance of back-end application servers. Detecting these proxies can be done based, again, on the server header or by timing requests that should be cached by the server and comparing the time taken to server the first request with subsequent requests.&lt;br /&gt;
&lt;br /&gt;
Another element that can be detected: network load balancers. Typically, these systems will balance a given TCP/IP port to multiple servers based on different algorithms (round-robin, web server load, number of requests, etc.). Thus, the detection of this architecture element needs to be done by examining multiple requests and comparing results in order to determine if the requests are going to the same or different web servers. For example, based on the Date: header if the server clocks are not synchronized. In some cases, the network load balance process might inject new information in the headers that will make it stand out distinctively, like the AlteonP cookie introduced by Nortel’s Alteon WebSystems load balancer.&lt;br /&gt;
&lt;br /&gt;
Application web servers are usually easy to detect. The request for several resources is handled by the application server itself (not the web server) and the response header will vary significantly (including different or additional values in the answer header). Another way to detect these is to see if the web server tries to set cookies which are indicative of an application web server being used (such as the JSESSIONID provided by some J2EE servers), or to rewrite URLs automatically to do session tracking.&lt;br /&gt;
&lt;br /&gt;
Authentication backends (such as LDAP directories, relational databases, or RADIUS servers) however, are not as easy to detect from an external point of view in an immediate way, since they will be hidden by the application itself.&lt;br /&gt;
&lt;br /&gt;
The use of a database backend can be determined simply by navigating an application. If there is highly dynamic content generated “on the fly,&amp;quot; it is probably being extracted from some sort of database by the application itself. Sometimes the way information is requested might give insight to the existence of a database back-end. For example, an online shopping application that uses numeric identifiers (‘id’) when browsing the different articles in the shop.  However, when doing a blind application test, knowledge of the underlying database is usually only available when a vulnerability surfaces in the application, such as poor exception handling or susceptibility to SQL injection.&lt;br /&gt;
&lt;br /&gt;
===Known server vulnerabilities===&lt;br /&gt;
Vulnerabilities found in the different elements that make up the application architecture, be it the web server or the database backend, can severely compromise the application itself. For example, consider a server vulnerability that allows a remote, unauthenticated user to upload files to the web server, or even to replace files. This vulnerability could compromise the application, since a rogue user may be able to replace the application itself or introduce code that would affect the backend servers, as its application code would be run just like any other application.&lt;br /&gt;
&lt;br /&gt;
Reviewing server vulnerabilities can be hard to do if the test needs to be done through a blind penetration test. In these cases, vulnerabilities need to be tested from a remote site, typically using an automated tool; however, the testing of some vulnerabilities can have unpredictable results to the web server, and testing for others (like those directly involved in denial of service attacks) might not be possible due to the service downtime involved if the test was successful. Also, some automated tools will flag vulnerabilities based on the web server version retrieved. This leads to both false positives and false negatives: on one hand, if the web server version has been removed or obscured by the local site administrator, the scan tool will not flag the server as vulnerable even if it is; on the other hand, if the vendor providing the software does not update the web server version when vulnerabilities are fixed in it, the scan tool will flag vulnerabilities that do not exist. The latter case is actually very common in some operating system vendors that do backport patches of security vulnerabilities to the software they provide in the operating system but do not do a full upload to the latest software version. This happens in most GNU/Linux distributions such as Debian, Red Hat or SuSE. In most cases, vulnerability scanning of an application architecture will only find vulnerabilities associated with the “exposed” elements of the architecture (such as the web server) and will usually be unable to find vulnerabilities associated to elements which are not directly exposed, such as the authentication backends, the database backends, or reverse proxies in use.&lt;br /&gt;
&lt;br /&gt;
Finally, not all software vendors disclose vulnerabilities in a public way, and therefore these weaknesses do not become registered within publicly known vulnerability databases[2]. This information is only disclosed to customers or published through fixes that do not have accompanying advisories. This reduces the usefulness of vulnerability scanning tools. Typically, vulnerability coverage of these tools will be very good for common products (such as the Apache web server, Microsoft’s Internet Information Server, or IBM’s Lotus Domino) but will be lacking for lesser known products.&lt;br /&gt;
&lt;br /&gt;
This is why reviewing vulnerabilities is best done when the tester is provided with internal information of the software used, including versions and releases used and patches applied to the software. With this information, the tester can retrieve the information from the vendor itself and analyze what vulnerabilities might be present in the architecture and how they can affect the application itself. When possible, these vulnerabilities can be tested in order to determine their real effects and to detect if there might be any external elements (such as intrusion detection or prevention systems) that might reduce or negate the possibility of successful exploitation. Testers might even determine, through a configuration review, that the vulnerability is not even present, since it affects a software component that is not in use.&lt;br /&gt;
&lt;br /&gt;
It is also worthwhile to note that vendors will sometimes silently fix vulnerabilities and make the fixes  available with new software releases. Different vendors will have different release cycles that determine the support they might provide for older releases. A tester with detailed information of the software versions used by the architecture can analyse the risk associated to the use of old software releases that might be unsupported in the short term or are already unsupported. This is critical, since if a vulnerability were to surface in an old software version that is no longer supported, the systems personnel might not be directly aware of it. No patches will be ever made available for it and advisories might not list that version as vulnerable (as it is unsupported). Even in the event that they are aware that the vulnerability is present and the system is, indeed, vulnerable, they will need to do a full upgrade to a new software release, which might introduce significant downtime in the application architecture or might force the application to be recoded due to incompatibilities with the latest software version.&lt;br /&gt;
&lt;br /&gt;
===Administrative tools===&lt;br /&gt;
&lt;br /&gt;
Any web server infrastructure requires the existence of administrative tools to maintain and update the information used by the application: static content (web pages, graphic files), application source code, user authentication databases, etc. Depending on the site, technology, or software used, administrative tools will differ. For example, some web servers will be managed using administrative interfaces which are, themselves, web servers (such as the iPlanet web server) or will be administrated by plain text configuration files (in the Apache case[3]) or use operating-system GUI tools (when using Microsoft’s IIS server or ASP.Net). In most cases, however, the server configuration will be handled using different file maintenance tools used by the web server, which are managed through FTP servers, WebDAV, network file systems (NFS, CIFS) or other mechanisms. Obviously, the operating system of the elements that make up the application architecture will also be managed using other tools. Applications may also have administrative interfaces embedded in them that are used to manage the application data itself (users, content, etc.).&lt;br /&gt;
&lt;br /&gt;
Review of the administrative interfaces used to manage the different parts of the architecture is very important, since if an attacker gains access to any of them he can then compromise or damage the application architecture. Thus it is important to:&lt;br /&gt;
&lt;br /&gt;
* List all the possible administrative interfaces.&lt;br /&gt;
* Determine if administrative interfaces are available from an internal network or are also available from the Internet.&lt;br /&gt;
* If available from the Internet, determine the mechanisms that control access to these interfaces and their associated susceptibilities.&lt;br /&gt;
* Change the default user and password.&lt;br /&gt;
&lt;br /&gt;
Some companies choose not to manage all aspects of their web server applications, but may have other parties managing the content delivered by the web application. This external company might either provide only parts of the content (news updates or promotions) or might manage the web server completely (including content and code). It is common to find administrative interfaces available from the Internet in these situations, since using the Internet is cheaper than providing a dedicated line that will connect the external company to the application infrastructure through a management-only interface. In this situation, it is very important to test if the administrative interfaces can be vulnerable to attacks.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* [1] WebSEAL, also known as Tivoli Authentication Manager, is a reverse proxy from IBM which is part of the Tivoli framework.&lt;br /&gt;
* [2] Such as Symantec’s Bugtraq, ISS’ X-Force, or NIST’s National Vulnerability Database (NVD).&lt;br /&gt;
* [3] There are some GUI-based administration tools for Apache (like NetLoony) but they are not in widespread use yet.&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=159362</id>
		<title>OWASP Testing Guide v4 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=159362"/>
				<updated>2013-09-27T17:41:52Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{OWASP Breakers}}&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
'''This is the DRAFT of the table of content of the New Testing Guide v4.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;You can download the stable version v3 [http://www.owasp.org/images/5/56/OWASP_Testing_Guide_v3.pdf here] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Back to the OWASP Testing Guide Project:&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Testing_Project&lt;br /&gt;
&lt;br /&gt;
'''Updated: 15th February 2013'''&lt;br /&gt;
&lt;br /&gt;
[[ OWTGv4 Contributors list|'''Contributors List]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following is a DRAFT of the Toc based on the feedback already received.&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Foreword|Foreword by Eoin Keary]]== &lt;br /&gt;
[To review--&amp;gt; Eoin Keary -&amp;gt; Done!!]&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Frontispiece |1. Frontispiece]]== &lt;br /&gt;
[To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[Testing Guide Frontispiece|1.1 About the OWASP Testing Guide Project]]''' &lt;br /&gt;
[To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[About The Open Web Application Security Project|1.2 About The Open Web Application Security Project]]''' &lt;br /&gt;
[To review--&amp;gt; ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Introduction|2. Introduction]]==&lt;br /&gt;
&lt;br /&gt;
'''2.1 The OWASP Testing Project'''&lt;br /&gt;
&lt;br /&gt;
'''2.2 Principles of Testing'''&lt;br /&gt;
&lt;br /&gt;
'''2.3 Testing Techniques Explained''' &lt;br /&gt;
&lt;br /&gt;
2.4 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Requirements_Test_Derivation Security requirements test derivation],[https://www.owasp.org/index.php/Testing_Guide_Introduction#Functional_and_Non_Functional_Test_Requirements functional and non functional test requirements], and [https://www.owasp.org/index.php/Testing_Guide_Introduction#Test_Cases_Through_Use_and_Misuse_Cases test cases through use and misuse cases]&lt;br /&gt;
&lt;br /&gt;
2.5 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Test_Data_Analysis_and_Reporting Security test data analysis and reporting: root cause identification and business/role case test data reporting]&lt;br /&gt;
&lt;br /&gt;
==[[The OWASP Testing Framework|3. The OWASP Testing Framework]]==&lt;br /&gt;
&lt;br /&gt;
'''3.1. Overview'''&lt;br /&gt;
&lt;br /&gt;
'''3.2. Phase 1: Before Development Begins '''&lt;br /&gt;
&lt;br /&gt;
'''3.3. Phase 2: During Definition and Design'''&lt;br /&gt;
&lt;br /&gt;
'''3.4. Phase 3: During Development'''&lt;br /&gt;
&lt;br /&gt;
'''3.5. Phase 4: During Deployment'''&lt;br /&gt;
&lt;br /&gt;
'''3.6. Phase 5: Maintenance and Operations'''&lt;br /&gt;
&lt;br /&gt;
'''3.7. A Typical SDLC Testing Workflow '''&lt;br /&gt;
&lt;br /&gt;
==[[Web Application Penetration Testing |4. Web Application Penetration Testing ]]==&lt;br /&gt;
&lt;br /&gt;
[[Testing: Introduction and objectives|'''4.1 Introduction and Objectives''']] [To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
[[Testing Checklist| 4.1.1 Testing Checklist]] [To review at the end of brainstorming --&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing Information Gathering|'''4.2 Information Gathering ''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing: Search engine discovery/reconnaissance (OWASP-IG-002)|4.2.1 Conduct Search Engine Discovery and Reconnaissance for Information Leakage (OTG-INFO-001) ]] formerly &amp;quot;Search Engine Discovery/Reconnaissance (OWASP-IG-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Fingerprint Web Server (OTG-INFO-002)|4.2.2 Fingerprint Web Server (OTG-INFO-002) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing: Spiders, Robots, and Crawlers (OWASP-IG-001)|4.2.3 Review Webserver Metafiles for Information Leakage (OTG-INFO-003) ]] formerly &amp;quot;Spiders, Robots and Crawlers (OWASP-IG-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Application Discovery (OWASP-IG-005)|4.2.4 Enumerate Applications on Webserver (OTG-INFO-004) ]] formerly &amp;quot;Application Discovery (OWASP-IG-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Review webpage comments and metadata(OWASP-IG-007)|4.2.5 Review Webpage Comments and Metadata for Information Leakage (OTG-INFO-005) ]] formerly &amp;quot;Review webpage comments and metadata(OWASP-IG-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing: Identify application entry points (OWASP-IG-003)|4.2.6 Identify application entry points (OTG-INFO-006) ]] formerly &amp;quot;Identify application entry points (OWASP-IG-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Identify application exit/handover points (OWASP-IG-008)|4.2.7 Identify application exit/handover points (OTG-INFO-007) ]] formerly &amp;quot;Identify application exit/handover points (OWASP-IG-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing Map execution paths through application (OWASP-IG-009)|4.2.8 Map execution paths through application (OTG-INFO-008)]] formerly &amp;quot;Map execution paths through application (OWASP-IG-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Fingerprint Web Application Framework (OTG-INFO-009)|4.2.9 Fingerprint Web Application Framework (OTG-INFO-009) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-010)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Web Application (OTG-INFO-011)|4.2.10 Fingerprint Web Application (OTG-INFO-010) ]] formerly &amp;quot;Testing for Web Application Fingerprint (OWASP-IG-010)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[Map Network and Application Architecture (OTG-INFO-012)|4.2.11 Map Network and Application Architecture (OTG-INFO-011) ]] formerly &amp;quot;Testing for Infrastructure Configuration Management Testing weakness (OWASP-CM-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for configuration management|'''4.3 Configuration and Deploy Management Testing ''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for infrastructure configuration management (OWASP-CM-003)|4.3.1 Test Network/Infrastructure Configuration (OTG-CONFIG-001) ]] formerly &amp;quot;Testing for Infrastructure Configuration Management Testing weakness (OWASP-CM-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for application configuration management (OWASP-CM-004)|4.3.2 Test Application Platform Configuration (OTG-CONFIG-002) ]] formerly &amp;quot;Testing for Application Configuration Management weakness (OWASP-CM-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for file extensions handling  (OWASP-CM-005)|4.3.3 Test File Extensions Handling for Sensitive Information (OTG-CONFIG-003) ]] formerly &amp;quot;Testing for File Extensions Handling  (OWASP-CM-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Old, Backup and Unreferenced Files (OWASP-CM-006)|4.3.4 Review Old, Backup and Unreferenced Files for Sensitive Information (OTG-CONFIG-004) ]] formerly &amp;quot;Old, Backup and Unreferenced Files (OWASP-CM-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Admin Interfaces  (OWASP-CM-007)|4.3.5 Enumerate Infrastructure and Application Admin Interfaces (OTG-CONFIG-005) ]] formerly &amp;quot;Infrastructure and Application Admin Interfaces  (OWASP-CM-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Methods and XST  (OWASP-CM-008)|4.3.6 Test HTTP Methods (OTG-CONFIG-006) ]] formerly &amp;quot;Testing for Bad HTTP Methods (OWASP-CM-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Database credentials/connection strings available|4.3.7 Testing for Database credentials/connection strings available (OTG-CONFIG-007) ]] formerly &amp;quot;Testing for Database credentials/connection strings available (OWASP-CM-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Content Security Policy weakness|4.3.8 Test Content Security Policy (OTG-CONFIG-008) ]] formerly &amp;quot;Testing for Content Security Policy weakness (OWASP-CM-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Missing HSTS header|4.3.9 Test HTTP Strict Transport Security (OTG-CONFIG-009) ]] formerly &amp;quot;Testing for Missing HSTS header (OWASP-CM-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Frame Options|4.3.10 Test Frame Options (OTG-CONFIG-010) ]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for RIA policy files weakness|4.3.11 Test RIA cross domain policy (OTG-CONFIG-011) ]] formerly &amp;quot;Testing for RIA policy files weakness (OWASP-CM-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Content Type Options|4.3.12 Test Content Type Options (OTG-CONFIG-012) ]] new&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing Identity Management|'''4.4 Identity Management Testing''']]&lt;br /&gt;
&lt;br /&gt;
[[Test Role Definitions (OTG-IDENT-001)|4.4.1 Test Role Definitions (OTG-IDENT-001)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test User Registration Process (OTG-IDENT-002)|4.4.2 Test User Registration Process (OTG-IDENT-002)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Provisioning Process (OTG-IDENT-003)|4.4.3 Test Account Provisioning Process (OTG-IDENT-003)]] New&lt;br /&gt;
&lt;br /&gt;
[[Testing for Account Enumeration and Guessable User Account (OWASP-AT-002)|4.4.4 Testing for Account Enumeration and Guessable User Account (OTG-IDENT-004) ]] formerly &amp;quot;Testing for Account Enumeration and Guessable User Account (OWASP-AT-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak or unenforced username policy (OWASP-AT-009)| 4.4.5 Testing for Weak or unenforced username policy (OTG-IDENT-005)]] formerly &amp;quot;Testing for Weak or unenforced username policy (OWASP-AT-009)&lt;br /&gt;
&lt;br /&gt;
[[Test Permissions of Guest/Training Accounts (OTG-IDENT-006)|4.4.6 Test Permissions of Guest/Training Accounts (OTG-IDENT-006)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Suspension/Resumption Process (OTG-IDENT-007)|4.4.7 Test Account Suspension/Resumption Process (OTG-IDENT-007)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test User Deregistration Process (OTG-IDENT-008)|4.4.8 Test User Deregistration Process (OTG-IDENT-008)]] New&lt;br /&gt;
&lt;br /&gt;
[[Test Account Deregistration Process (OTG-IDENT-009)|4.4.9 Test Account Deregistration Process (OTG-IDENT-009)]] New&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for authentication|'''4.5 Authentication Testing ''']] &lt;br /&gt;
&lt;br /&gt;
[[Testing for Credentials Transported over an Encrypted Channel (OWASP-AT-001)|4.5.1 Testing for Credentials Transported over an Encrypted Channel  (OTG-AUTHN-001)]] formerly &amp;quot;Testing for Credentials Transported over an Encrypted Channel  (OWASP-AT-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for default credentials (OWASP-AT-003)|4.5.2 Testing for default credentials (OTG-AUTHN-002)]] formerly &amp;quot;Testing for default credentials (OWASP-AT-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak lock out mechanism (OWASP-AT-004)|4.5.3 Testing for Weak lock out mechanism (OTG-AUTHN-003)]] formerly &amp;quot;Testing for Weak lock out mechanism (OWASP-AT-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Bypassing Authentication Schema (OWASP-AT-005)|4.5.4 Testing for bypassing authentication schema (OTG-AUTHN-004)]] formerly &amp;quot;Testing for bypassing authentication schema (OWASP-AT-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Vulnerable Remember Password (OWASP-AT-006)|4.5.5 Test remember password functionality (OTG-AUTHN-005)]] formerly &amp;quot;Testing for vulnerable remember password functionality (OWASP-AT-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Browser cache weakness (OWASP-AT-007)|4.5.6 Testing for Browser cache weakness (OTG-AUTHN-006)]] formerly &amp;quot;Testing for Browser cache weakness (OWASP-AT-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak password policy (OWASP-AT-008)|4.5.7 Testing for Weak password policy (OTG-AUTHN-007)]] formerly &amp;quot;Testing for Weak password policy (OWASP-AT-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak security question/answer (OTG-AUTHN-008)|4.5.8 Testing for Weak security question/answer (OTG-AUTHN-008)]] New! - Robert Winkel&lt;br /&gt;
&lt;br /&gt;
[[Testing for weak password change or reset functionalities (OWASP-AT-011)|4.5.9 Testing for weak password change or reset functionalities (OTG-AUTHN-009)]] formerly &amp;quot;Testing for weak password change or reset functionalities (OWASP-AT-011)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weaker authentication in alternative channel (OTG-AUTHN-010)|4.5.10 Testing for Weaker authentication in alternative channel (OTG-AUTHN-010)]] (e.g. mobile app, IVR, help desk)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Authorization|'''4.6 Authorization Testing''']] &lt;br /&gt;
&lt;br /&gt;
[[Test Management of Account Permissions (OTG-AUTHZ-001)|4.6.1 Test Management of Account Permissions (OTG-AUTHZ-001)]] New&lt;br /&gt;
&lt;br /&gt;
[[Testing for Path Traversal  (OWASP-AZ-001)|4.6.2 Testing Directory traversal/file include (OTG-AUTHZ-002)]] formerly &amp;quot;Testing Directory traversal/file include (OWASP-AZ-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Bypassing Authorization Schema  (OWASP-AZ-002)|4.6.3 Testing for bypassing authorization schema (OTG-AUTHZ-003)]] formerly &amp;quot;Testing for bypassing authorization schema  (OWASP-AZ-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Privilege escalation  (OWASP-AZ-003)|4.6.4 Testing for Privilege Escalation (OTG-AUTHZ-004)]] formerly &amp;quot;Testing for Privilege Escalation  (OWASP-AZ-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure Direct Object References (OWASP-AZ-004)|4.6.5 Testing for Insecure Direct Object References (OTG-AUTHZ-005)]] formerly &amp;quot;Testing for Insecure Direct Object References (OWASP-AZ-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Failure to Restrict access to authorized resource (OWASP-AZ-005)|4.6.6 Testing for Failure to Restrict access to authorized resource (OTG-AUTHZ-006)]] formerly &amp;quot;Testing for Failure to Restrict access to authorized resource (OWASP-AZ-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test privileges of server components (OTG-AUTHZ-007)|4.6.7 Test privileges of server components (OTG-AUTHZ-007)]] (e.g. indexing service, reporting interface, file generator)&lt;br /&gt;
&lt;br /&gt;
[[Test enforcement of application entry points (OTG-AUTHZ-008)|4.6.8 Test enforcement of application entry points (OTG-AUTHZ-008)]] (including exposure of objects)&lt;br /&gt;
&lt;br /&gt;
[[Testing for failure to restrict access to authenticated resource(OWASP-AT-010)|4.6.9 Testing for failure to restrict access to authenticated resource (OTG-AUTHZ-009)]] formerly &amp;quot;Testing for failure to restrict access to authenticated resource (OWASP-AT-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session Management|'''4.7 Session Management Testing''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session_Management_Schema (OWASP-SM-001)|4.7.1 Testing for Bypassing Session Management Schema (OTG-SESS-001)]] formerly &amp;quot;Testing for Bypassing Session Management Schema (OWASP-SM-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for cookies attributes  (OWASP-SM-002)|4.7.2 Testing for Cookies attributes (OTG-SESS-002)]] formerly &amp;quot;Testing for Cookies attributes (OWASP-SM-002)&amp;quot; (Cookies are set not ‘HTTP Only’, ‘Secure’,  and no time validity)&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session Fixation  (OWASP-SM-003)|4.7.3 Testing for Session Fixation (OTG-SESS-003)]] formerly &amp;quot;Testing for Session Fixation  (OWASP-SM-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Exposed Session Variables  (OWASP-SM-004)|4.7.4 Testing for Exposed Session Variables (OTG-SESS-004)]] formerly &amp;quot;Testing for Exposed Session Variables (OWASP-SM-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for CSRF  (OWASP-SM-005)|4.7.5 Testing for Cross Site Request Forgery (CSRF) (OTG-SESS-005)]] formerly &amp;quot;Testing for Cross Site Request Forgery (CSRF) (OWASP-SM-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test Session Token Strength (OTG-SESS-006)|4.7.6 Test Session Token Strength (OTG-SESS-006)]]&lt;br /&gt;
 &lt;br /&gt;
[[Testing for logout functionality (OWASP-SM-007)|4.7.7 Testing for logout functionality (OTG-SESS-007)]] formerly &amp;quot;Testing for logout functionality (OWASP-SM-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session puzzling (OWASP-SM-008)|4.7.8 Testing for Session puzzling (OWASP-SM-008)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Session Timeout (OTG-SESS-008)|4.7.8 Test Session Timeout (OTG-SESS-008)]]&lt;br /&gt;
&lt;br /&gt;
[[Test multiple concurrent sessions (OTG-SESS-009)|4.7.9 Test multiple concurrent sessions (OTG-SESS-009)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for Data Validation|'''4.8 Data Validation Testing''']] &lt;br /&gt;
&lt;br /&gt;
[[Testing for Reflected Cross site scripting (OWASP-DV-001) |4.8.1 Testing for Reflected Cross Site Scripting (OTG-INPVAL-001)]] formerly &amp;quot;Testing for Reflected Cross Site Scripting (OWASP-DV-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stored Cross site scripting (OWASP-DV-002) |4.8.2 Testing for Stored Cross Site Scripting (OTG-INPVAL-002)]] formerly &amp;quot;Testing for Stored Cross Site Scripting (OWASP-DV-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Verb Tampering (OWASP-DV-003)|4.8.3 Testing for HTTP Verb Tampering (OTG-INPVAL-003)]] formerly &amp;quot;Testing for HTTP Verb Tampering (OWASP-DV-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Parameter pollution (OWASP-DV-004)|4.8.4 Testing for HTTP Parameter pollution (OTG-INPVAL-004) ]] formerly &amp;quot;Testing for HTTP Parameter pollution (OWASP-DV-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Unvalidated Redirects and Forwards (OWASP-DV-004)|4.8.5 Testing for Unvalidated Redirects and Forwards (OTG-INPVAL-005) ]] formerly &amp;quot;Testing for Unvalidated Redirects and Forwards (OWASP-DV-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for SQL Injection (OWASP-DV-005)| 4.8.6 Testing for SQL Injection (OTG-INPVAL-006)]] formerly &amp;quot;Testing for SQL Injection (OWASP-DV-005)&amp;quot; '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
[[Testing for Oracle|4.8.6.1 Oracle Testing]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for MySQL|4.8.6.2 MySQL Testing [Ismael Gonçalves]]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for SQL Server|4.8.6.3 SQL Server Testing]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Backend_Security_Project_Testing_PostgreSQL|4.8.6.4 Testing PostgreSQL (from OWASP BSP) ]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for MS Access |4.8.6.5 MS Access Testing]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for NoSQL injection|4.8.6.6 Testing for NoSQL injection [New!]]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for LDAP Injection  (OWASP-DV-006)|4.8.7 Testing for LDAP Injection  (OTG-INPVAL-007)]] formerly &amp;quot;Testing for LDAP Injection  (OWASP-DV-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for ORM Injection   (OWASP-DV-007)|4.8.8 Testing for ORM Injection   (OTG-INPVAL-008)]] formerly &amp;quot;Testing for ORM Injection   (OWASP-DV-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for XML Injection (OWASP-DV-008)|4.8.9 Testing for XML Injection (OTG-INPVAL-009)]] formerly &amp;quot;Testing for XML Injection (OWASP-DV-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for SSI Injection  (OWASP-DV-009)|4.8.10 Testing for SSI Injection  (OTG-INPVAL-010)]] formerly &amp;quot;Testing for SSI Injection  (OWASP-DV-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for XPath Injection  (OWASP-DV-010)|4.8.11 Testing for XPath Injection  (OTG-INPVAL-011)]] formerly &amp;quot;Testing for XPath Injection  (OWASP-DV-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for IMAP/SMTP Injection  (OWASP-DV-011)|4.8.12 IMAP/SMTP Injection  (OTG-INPVAL-012)]] formerly &amp;quot;IMAP/SMTP Injection  (OWASP-DV-011)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Code Injection  (OWASP-DV-012)|4.8.13 Testing for Code Injection  (OTG-INPVAL-013)]] formerly &amp;quot;Testing for Code Injection  (OWASP-DV-012)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Local File Inclusion|4.8.13.1 Testing for Local File Inclusion]] [Alexander Antukh]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Remote File Inclusion|4.8.13.2 Testing for Remote File Inclusion]] [Alexander Antukh]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Command Injection   (OWASP-DV-013)|4.8.14 Testing for Command Injection   (OTG-INPVAL-014)]] formerly &amp;quot;Testing for Command Injection   (OWASP-DV-013)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Buffer Overflow (OWASP-DV-014)|4.8.15 Testing for Buffer overflow (OTG-INPVAL-015)]] formerly &amp;quot;Testing for Buffer overflow (OWASP-DV-014)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Heap Overflow|4.8.15.1 Testing for Heap overflow]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stack Overflow|4.8.15.2 Testing for Stack overflow]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Format String|4.8.15.3 Testing for Format string]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Incubated Vulnerability (OWASP-DV-015)|4.8.16 Testing for incubated vulnerabilities (OTG-INPVAL-016)]] formerly &amp;quot;Testing for incubated vulnerabilities (OWASP-DV-015)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for HTTP Splitting/Smuggling  (OWASP-DV-016)|4.8.17 Testing for HTTP Splitting/Smuggling  (OTG-INPVAL-017) ]] formerly &amp;quot;Testing for HTTP Splitting/Smuggling  (OWASP-DV-016)&amp;quot; [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Error Handling|'''4.9 Error Handling''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Error Code (OWASP-IG-006)|4.9.1 Analysis of Error Codes (OTG-ERR-001)]] formerly &amp;quot;Analysis of Error Codes (OWASP-IG-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Stack Traces (OWASP-IG-XXX)|4.9.2 Analysis of Stack Traces (OTG-ERR-002)]] formerly &amp;quot;Analysis of Stack Traces&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Cryptography|'''4.10 Cryptography''']]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure encryption usage (OWASP-EN-001)| 4.10.1  Testing for Insecure encryption usage (OTG-CRYPST-001)]] formerly &amp;quot;Testing for Insecure encryption usage (OWASP-EN-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OWASP-EN-002)| 4.10.2 Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OTG-CRYPST-002)]] formerly &amp;quot;Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OWASP-EN-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Padding Oracle (OWASP-EN-003)| 4.10.3 Testing for Padding Oracle (OTG-CRYPST-003)]] formerly &amp;quot;Testing for Padding Oracle (OWASP-EN-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Cacheable HTTPS Response (OTG-CRYPST-004)| 4.10.4 Testing for Cacheable HTTPS Response (OTG-CRYPST-004)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Cache Directives (OTG-CRYPST-005)|4.10.5 Test Cache Directives (OTG-CRYPST-005)]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Insecure Cryptographic Storage (OTG-CRYPST-006)|4.10.6 Testing for Insecure Cryptographic Storage (OTG-CRYPST-006)]]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-007)|4.10.7 Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-007)]]&lt;br /&gt;
&lt;br /&gt;
[[Test Cryptographic Key Management (OTG-CRYPST-008)|4.10.8 Test Cryptographic Key Management (OTG-CRYPST-008)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Logging|'''4.11 Logging''']] Not convinced Logging should be included as it requires access to logs to test&lt;br /&gt;
&lt;br /&gt;
[[Test time synchronisation (OTG-LOG-001)|4.11.1 Test time synchronisation (OTG-LOG-001) ]] formerly &amp;quot;Incorrect time&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Test user-viewable log of authentication events (OTG-LOG-002)|4.11.2 Test user-viewable log of authentication events (OTG-LOG-002)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Testing for business logic   (OWASP-BL-001)|'''4.12 Business Logic Testing  (OWASP-BL-001)''']] [To review--&amp;gt; David Fern]&lt;br /&gt;
Business Logic&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Test business logic data validation (OTG-BUSLOGIC-001)|4.12.1 Test business logic data validation (OTG-BUSLOGIC-001)]] [New!] NOTE MAT: to discuss this section&lt;br /&gt;
&lt;br /&gt;
[[Test Ability to forge requests (OTG-BUSLOGIC-002)|4.12.2 Test Ability to forge requests (OTG-BUSLOGIC-002)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test integrity checks (OTG-BUSLOGIC-003)|4.12.3 Test integrity checks (OTG-BUSLOGIC-003)]] (e.g. overwriting updates) [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test tamper evidence (OTG-BUSLOGIC-004)|4.12.4 Test tamper evidence (OTG-BUSLOGIC-004)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test excessive rate (speed) of use limits (OTG-BUSLOGIC-005)|4.12.5 Test excessive rate (speed) of use limits (OTG-BUSLOGIC-005)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test size of request limits (OTG-BUSLOGIC-006)|4.12.6 Test size of request limits (OTG-BUSLOGIC-006)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test number of times a function can be used limits (OTG-BUSLOGIC-007)|4.12.7 Test number of times a function can be used limits (OTG-BUSLOGIC-002)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test bypass of correct sequence (OTG-BUSLOGIC-008)|4.12.8 Test bypass of correct sequence (OTG-BUSLOGIC-008)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test self-hosted payment cardholder data processing (OTG-BUSLOGIC-009)|4.12.9 Test self-hosted payment cardholder data processing (OTG-BUSLOGIC-009)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test security incident reporting information (OTG-BUSLOGIC-010)|4.12.10 Test security incident reporting information (OTG-BUSLOGIC-010)]] [New!]&lt;br /&gt;
&lt;br /&gt;
[[Test defenses against application mis-use (OTG-BUSLOGIC-011)|4.12.11 Test defenses against application mis-use (OTG-BUSLOGIC-011)]] [New!]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Denial of Service|'''4.13 Denial of Service''']]&lt;br /&gt;
&lt;br /&gt;
[[Test Regular expression DoS (OTG-DOS-001)| 4.13.1 Test Regular expression DoS (OTG-DOS-001)]] [New!] note: to understand better&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Test XML DoS (OTG-DOS-002)| 4.13.2 Test XML DoS (OTG-DOS-002)]] [New! - Andrew Muller]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Captcha (OWASP-AT-012)|4.13.3 Testing for CAPTCHA (OTG-DOS-003)]] formerly &amp;quot;Testing for CAPTCHA (OWASP-AT-012)&amp;quot; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Web Service (XML Interpreter)|'''4.14 Web Service Testing''']] [Tom Eston] &lt;br /&gt;
&lt;br /&gt;
[[Scoping a Web Service Test (OWASP-WS-001)|4.14.1 Scoping a Web Service Test (OTG-WEBSVC-001)]] formerly &amp;quot;Scoping a Web Service Test (OWASP-WS-001)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Information Gathering (OWASP-WS-002)|4.14.2 WS Information Gathering (OTG-WEBSVC-002)]] formerly &amp;quot;WS Information Gathering (OWASP-WS-002)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Authentication Testing (OWASP-WS-003)|4.14.3 WS Authentication Testing (OTG-WEBSVC-003)]] formerly &amp;quot;WS Authentication Testing (OWASP-WS-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Management Interface Testing (OWASP-WS-004)|4.14.4 WS Management Interface Testing (OTG-WEBSVC-004)]] formerly &amp;quot;WS Management Interface Testing (OWASP-WS-004)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Weak XML Structure Testing (OWASP-WS-005)|4.14.5 Weak XML Structure Testing (OTG-WEBSVC-005)]] formerly &amp;quot;Weak XML Structure Testing (OWASP-WS-005)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[XML Content-Level Testing (OWASP-WS-006)|4.14.6 XML Content-Level Testing (OTG-WEBSVC-006)]] formerly &amp;quot;XML Content-Level Testing (OWASP-WS-006)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS HTTP GET Parameters/REST Testing (OWASP-WS-007)|4.14.7 WS HTTP GET Parameters/REST Testing (OTG-WEBSVC-007)]] formerly &amp;quot;WS HTTP GET Parameters/REST Testing (OWASP-WS-007)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Naughty SOAP Attachment Testing (OWASP-WS-008)|4.14.8 WS Naughty SOAP Attachment Testing (OTG-WEBSVC-008)]] formerly &amp;quot;WS Naughty SOAP Attachment Testing (OWASP-WS-008)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS Replay/MiTM Testing (OWASP-WS-009)|4.14.9 WS Replay/MiTM Testing (OTG-WEBSVC-009)]] formerly &amp;quot;WS Replay/MiTM Testing (OWASP-WS-009)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[WS BEPL Testing (OWASP-WS-010)|4.14.10 WS BEPL Testing (OTG-WEBSVC-010)]] formerly &amp;quot;WS BEPL Testing (OWASP-WS-010)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Client Side Testing|'''4.15 Client Side Testing''']] [New!] &lt;br /&gt;
&lt;br /&gt;
[[Testing for DOM-based Cross site scripting  (OWASP-DV-003)|4.15.1 Testing for DOM based Cross Site Scripting  (OTG-CLIENT-001)]] formerly &amp;quot;Testing for DOM based Cross Site Scripting  (OWASP-CS-001)&amp;quot; [Stefano Di Paola]&lt;br /&gt;
&lt;br /&gt;
[[Testing Cross Origin Resource Sharing (OWASP CS-002)|4.15.2 Testing Cross Origin Resource Sharing  (OTG-CLIENT-002)]] formerly &amp;quot;Testing for HTML5 (OWASP CS-002)&amp;quot; [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
[[Testing for Cross site flashing (OWASP-DV-004)|4.15.3 Testing for Cross Site Flashing   (OTG-CLIENT-003)]] formerly &amp;quot;Testing for Cross Site Flashing   (OWASP-CS-003)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Clickjacking (OWASP-CS-004)|4.15.4 Testing for Clickjacking (OTG-CLIENT-004)]] formerly &amp;quot;Testing for Clickjacking (OWASP-CS-004)&amp;quot; [Davide Danelon]&lt;br /&gt;
&lt;br /&gt;
[[Testing WebSockets (OTG-CLIENT-005)|4.15.5 Testing WebSockets (OTG-CLIENT-005)]] [Ryan Dewhurst]&lt;br /&gt;
&lt;br /&gt;
[[Testing Web Messaging (OWASP CS-006)|4.15.6 Testing Web Messaging (OTG-CLIENT-006)]] [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
[[Testing Local Storage (OWASP CS-007)|4.15.7 Testing Local Storage (OTG-CLIENT-007)]] [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
[[Testing Sandboxed Iframes (OWASP CS-008)|4.15.8 Testing Sandboxed Iframes (OTG-CLIENT-008)]] [Juan Galiana]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[Writing Reports: value the real risk |5. Writing Reports: value the real risk ]]==&lt;br /&gt;
&lt;br /&gt;
[[How to value the real risk |5.1 How to value the real risk]] [To review--&amp;gt; Amro AlOlaqi]&lt;br /&gt;
&lt;br /&gt;
[[How to write the report of the testing |5.2 How to write the report of the testing]] [To review--&amp;gt; Amro AlOlaqi]&lt;br /&gt;
&lt;br /&gt;
==[[Appendix A: Testing Tools |Appendix A: Testing Tools ]]==&lt;br /&gt;
&lt;br /&gt;
* Black Box Testing Tools [To review--&amp;gt; Amro AlOlaqi] '''Ready to be reviewed'''&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix B: Suggested Reading | Appendix B: Suggested Reading]]==&lt;br /&gt;
* Whitepapers [To review--&amp;gt; David Fern]&lt;br /&gt;
* Books [To review--&amp;gt; David Fern]&lt;br /&gt;
* Useful Websites [To review--&amp;gt; David Fern]&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix C: Fuzz Vectors | Appendix C: Fuzz Vectors]]==&lt;br /&gt;
&lt;br /&gt;
* Fuzz Categories [To review--&amp;gt; Amro AlOlaqi]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix D: Encoded Injection | Appendix D: Encoded Injection]]==&lt;br /&gt;
&lt;br /&gt;
[To review--&amp;gt; Amro AlOlaqi]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Testing Project]]&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Appendix_A:_Testing_Tools&amp;diff=159361</id>
		<title>Appendix A: Testing Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Appendix_A:_Testing_Tools&amp;diff=159361"/>
				<updated>2013-09-27T17:38:05Z</updated>
		
		<summary type="html">&lt;p&gt;Amro Ahmed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
==Open Source Black Box Testing tools==&lt;br /&gt;
&lt;br /&gt;
=== General Testing ===&lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_WebScarab_Project|OWASP WebScarab]]'''&lt;br /&gt;
** WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins.&lt;br /&gt;
* '''[[OWASP_CAL9000_Project|OWASP CAL9000]]'''&lt;br /&gt;
** CAL9000 is a collection of browser-based tools that enable more effective and efficient manual testing efforts.&lt;br /&gt;
** Includes an XSS Attack Library, Character Encoder/Decoder, HTTP Request Generator and Response Evaluator, Testing Checklist, Automated Attack Editor and much more.&lt;br /&gt;
*  '''[[:Category:OWASP Pantera Web Assessment Studio Project|OWASP Pantera Web Assessment Studio Project]]'''&lt;br /&gt;
** Pantera uses an improved version of SpikeProxy to provide a powerful web application analysis engine. The primary goal of Pantera is to combine automated capabilities with complete manual testing to get the best penetration testing results.&lt;br /&gt;
* '''[[:OWASP Zed Attack Proxy Project]]'''&lt;br /&gt;
** The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.&lt;br /&gt;
** ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.&lt;br /&gt;
* '''[[:OWASP Mantra - Security Framework]]'''&lt;br /&gt;
**Mantra is a web application security testing framework built on top of a browser. It supports Windows, Linux(both 32 and 64 bit) and Macintosh, in addition, it can work with other software like ZAP using built in proxy management function which makes it much more convenient. Mantra is available in 9 languages: Arabic, Chinese - Simplified, Chinese - Traditional, English, French, Portuguese, Russian, Spanish and Turkish.&lt;br /&gt;
* '''SPIKE''' - http://www.immunitysec.com/resources-freesoftware.shtml&lt;br /&gt;
** SPIKE designed to analyze new network protocols for buffer overflows or similar weaknesses. It requires a strong knowledge of C to use and only available for the Linux platform.&lt;br /&gt;
* '''Burp Proxy''' - http://www.portswigger.net/Burp/&lt;br /&gt;
** Burp Proxy is an intercepting proxy server for security testing of web applications it allows Intercepting and modifying all HTTP/S traffic passing in both directions, it can work with custom SSL certificates and non-proxy-aware clients.&lt;br /&gt;
* '''Odysseus Proxy''' - http://www.wastelands.gen.nz/odysseus/&lt;br /&gt;
** Odysseus is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical HTTP proxy will relay packets to and from a client browser and a web server. It will intercept an HTTP session's data in either direction.&lt;br /&gt;
* '''Webstretch Proxy''' - http://sourceforge.net/projects/webstretch&lt;br /&gt;
** Webstretch Proxy enable users to view and alter all aspects of communications with a web site via a proxy. It can also be used for debugging during development. &lt;br /&gt;
*  '''WATOBO''' - http://sourceforge.net/apps/mediawiki/watobo/index.php?title=Main_Page&lt;br /&gt;
** WATOBO works like a local proxy, similar to Webscarab, ZAP or BurpSuite and it supports passive and active checks.&lt;br /&gt;
* '''Firefox LiveHTTPHeaders''' - https://addons.mozilla.org/en-US/firefox/addon/live-http-headers/&lt;br /&gt;
** View HTTP headers of a page and while browsing.&lt;br /&gt;
* '''Firefox Tamper Data''' - https://addons.mozilla.org/en-US/firefox/addon/tamper-data/&lt;br /&gt;
** Use tamperdata to view and modify HTTP/HTTPS headers and post parameters&lt;br /&gt;
* '''Firefox Web Developer Tools''' - https://addons.mozilla.org/en-US/firefox/addon/web-developer/&lt;br /&gt;
** The Web Developer extension adds various web developer tools to the browser.&lt;br /&gt;
* '''DOM Inspector''' - https://developer.mozilla.org/en/docs/DOM_Inspector&lt;br /&gt;
**  DOM Inspector is a developer tool used to inspect, browse, and edit the Document Object Model (DOM)&lt;br /&gt;
* '''Firefox Firebug''' - http://getfirebug.com/&lt;br /&gt;
** Firebug integrates with Firefox to edit, debug, and monitor CSS, HTML, and JavaScript.&lt;br /&gt;
* '''Grendel-Scan''' - http://securitytube-tools.net/index.php?title=Grendel_Scan&lt;br /&gt;
** Grendel-Scan is an automated security scanning of web applications and also supports manual penetration testing.&lt;br /&gt;
*  '''OWASP SWFIntruder''' - http://www.mindedsecurity.com/swfintruder.html&lt;br /&gt;
** SWFIntruder (pronounced Swiff Intruder) is the first tool specifically developed for analyzing and testing security of Flash applications at runtime.&lt;br /&gt;
* '''SWFScan''' - http://h30499.www3.hp.com/t5/Following-the-Wh1t3-Rabbit/SWFScan-FREE-Flash-decompiler/ba-p/5440167 &lt;br /&gt;
** Flash decompiler&lt;br /&gt;
*  '''Wikto''' - http://www.sensepost.com/labs/tools/pentest/wikto&lt;br /&gt;
** Wikto features including fuzzy logic error code checking, a back-end miner, Google-assisted directory mining and real time HTTP request/response monitoring.&lt;br /&gt;
* '''w3af''' - http://w3af.org&lt;br /&gt;
** w3af is a Web Application Attack and Audit Framework. The project’s goal is finding and exploiting web application vulnerabilities.&lt;br /&gt;
* '''skipfish''' - http://code.google.com/p/skipfish/&lt;br /&gt;
** Skipfish is an active web application security reconnaissance tool.&lt;br /&gt;
* '''Web Developer toolbar''' - https://chrome.google.com/webstore/detail/bfbameneiokkgbdmiekhjnmfkcnldhhm&lt;br /&gt;
** The Web Developer extension adds a toolbar button to the browser with various web developer tools. This is the official port of the Web Developer extension for Firefox.&lt;br /&gt;
** '''HTTP Request Maker''' - https://chrome.google.com/webstore/detail/kajfghlhfkcocafkcjlajldicbikpgnp?hl=en-US&lt;br /&gt;
* Request Maker is a tool for penetration testing. With it you can easily capture requests made by web pages, tamper with the URL, headers and POST data and, of course, make new requests&lt;br /&gt;
** '''Cookie Editor''' - https://chrome.google.com/webstore/detail/fngmhnnpilhplaeedifhccceomclgfbg?hl=en-US&lt;br /&gt;
* Edit This Cookie is a cookie manager. You can add, delete, edit, search, protect and block cookies&lt;br /&gt;
** '''Cookie swap''' - https://chrome.google.com/webstore/detail/dffhipnliikkblkhpjapbecpmoilcama?hl=en-US&lt;br /&gt;
* Swap My Cookies is a session manager, it manages cookies, letting you login on any website with several different accounts. &lt;br /&gt;
** '''Firebug lite for Chrome&amp;quot;&amp;quot; -  https://chrome.google.com/webstore/detail/bmagokdooijbeehmkpknfglimnifench&lt;br /&gt;
*Firebug Lite is not a substitute for Firebug, or Chrome Developer Tools. It is a tool to be used in conjunction with these tools. Firebug Lite provides the rich visual representation we are used to see in Firebug when it comes to HTML elements, DOM elements, and Box Model shading. It provides also some cool features like inspecting HTML elemements with your mouse, and live editing CSS properties&lt;br /&gt;
** '''Session Manager&amp;quot;&amp;quot; -  https://chrome.google.com/webstore/detail/bbcnbpafconjjigibnhbfmmgdbbkcjfi&lt;br /&gt;
*With Session Manager you can quickly save your current browser state and reload it whenever necessary. You can manage multiple sessions, rename or remove them from the session library. Each session remembers the state of the browser at its creation time, i.e the opened tabs and windows.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Testing for specific vulnerabilities ===&lt;br /&gt;
&lt;br /&gt;
==== Testing for DOM XSS ====&lt;br /&gt;
* DOMinator Pro - https://dominator.mindedsecurity.com&lt;br /&gt;
&lt;br /&gt;
==== Testing AJAX ====&lt;br /&gt;
* '''[[:Category:OWASP Sprajax Project|OWASP Sprajax Project]]'''&lt;br /&gt;
==== Testing for SQL Injection ====&lt;br /&gt;
* '''[[:Category:OWASP_SQLiX_Project|OWASP SQLiX]]'''&lt;br /&gt;
* Sqlninja: a SQL Server Injection &amp;amp; Takeover Tool - http://sqlninja.sourceforge.net&lt;br /&gt;
* Bernardo Damele A. G.: sqlmap, automatic SQL injection tool - http://sqlmap.org/&lt;br /&gt;
* Absinthe 1.1 (formerly SQLSqueal) - http://sourceforge.net/projects/absinthe/&lt;br /&gt;
* SQLInjector - Uses inference techniques to extract data and determine the backend database server.  http://www.databasesecurity.com/sql-injector.htm&lt;br /&gt;
* Bsqlbf-v2: A perl script allows extraction of data from Blind SQL Injections - http://code.google.com/p/bsqlbf-v2/&lt;br /&gt;
* Pangolin: An automatic SQL injection penetration testing tool - http://www.darknet.org.uk/2009/05/pangolin-automatic-sql-injection-tool/&lt;br /&gt;
* Antonio Parata: Dump Files by sql inference on Mysql - SqlDumper - http://www.ruizata.com/&lt;br /&gt;
* Multiple DBMS Sql Injection tool - SQL Power Injector - http://www.sqlpowerinjector.com/&lt;br /&gt;
* MySql Blind Injection Bruteforcing, Reversing.org - sqlbftools - http://packetstormsecurity.org/files/43795/sqlbftools-1.2.tar.gz.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Testing Oracle ====&lt;br /&gt;
* TNS Listener tool (Perl) - http://www.jammed.com/%7Ejwa/hacks/security/tnscmd/tnscmd-doc.html&lt;br /&gt;
* Toad for Oracle - http://www.quest.com/toad &lt;br /&gt;
==== Testing SSL ====&lt;br /&gt;
* Foundstone SSL Digger - http://www.mcafee.com/us/downloads/free-tools/ssldigger.aspx&lt;br /&gt;
==== Testing for Brute Force Password ====&lt;br /&gt;
* THC Hydra - http://www.thc.org/thc-hydra/&lt;br /&gt;
* John the Ripper - http://www.openwall.com/john/&lt;br /&gt;
* Brutus - http://www.hoobie.net/brutus/ &lt;br /&gt;
* Medusa - http://www.foofus.net/~jmk/medusa/medusa.html&lt;br /&gt;
*Ncat - http://nmap.org/ncat/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Testing Buffer Overflow ====&lt;br /&gt;
*  OllyDbg - http://www.ollydbg.de&lt;br /&gt;
** &amp;quot;A windows based debugger used for analyzing buffer overflow vulnerabilities&amp;quot;&lt;br /&gt;
* Spike - http://www.immunitysec.com/downloads/SPIKE2.9.tgz&lt;br /&gt;
** A fuzzer framework that can be used to explore vulnerabilities and perform length testing&lt;br /&gt;
* Brute Force Binary Tester (BFB) - http://bfbtester.sourceforge.net&lt;br /&gt;
** A proactive binary checker&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|link not working&lt;br /&gt;
&lt;br /&gt;
* Metasploit - http://www.metasploit.com/projects/Framework/&lt;br /&gt;
** A rapid exploit development and Testing frame work&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
==== Fuzzer  ====&lt;br /&gt;
* '''[[:Category:OWASP_WSFuzzer_Project|OWASP WSFuzzer]]'''&lt;br /&gt;
* Wfuzz - http://www.darknet.org.uk/2007/07/wfuzz-a-tool-for-bruteforcingfuzzing-web-applications/&lt;br /&gt;
&lt;br /&gt;
==== Googling ====&lt;br /&gt;
* Stach &amp;amp; Liu's Google Hacking Diggity Project - http://www.stachliu.com/resources/tools/google-hacking-diggity-project/&lt;br /&gt;
* Foundstone Sitedigger (Google cached fault-finding) - http://www.mcafee.com/us/downloads/free-tools/sitedigger.aspx&lt;br /&gt;
&lt;br /&gt;
==Commercial Black Box Testing tools==&lt;br /&gt;
&lt;br /&gt;
* NGS Typhon III - http://www.nccgroup.com/en/our-services/security-testing-audit-compliance/information-security-software/ngs-typhon-iii/&lt;br /&gt;
* NGSSQuirreL - http://www.nccgroup.com/en/our-services/security-testing-audit-compliance/information-security-software/ngs-squirrel-vulnerability-scanners/&lt;br /&gt;
* IBM AppScan - http://www-01.ibm.com/software/awdtools/appscan/&lt;br /&gt;
* Cenzic Hailstorm - http://www.cenzic.com/products_services/cenzic_hailstorm.php&lt;br /&gt;
* Burp Intruder - http://www.portswigger.net/burp/intruder.html&lt;br /&gt;
* Acunetix Web Vulnerability Scanner - http://www.acunetix.com&lt;br /&gt;
* Sleuth - http://www.sandsprite.com&lt;br /&gt;
* NT Objectives NTOSpider - http://www.ntobjectives.com/products/ntospider.php&lt;br /&gt;
* MaxPatrol Security Scanner - http://www.maxpatrol.com&lt;br /&gt;
* Ecyware GreenBlue Inspector - http://www.ecyware.com&lt;br /&gt;
* Parasoft SOAtest (more QA-type tool)- http://www.parasoft.com/jsp/products/soatest.jsp?itemId=101&lt;br /&gt;
* MatriXay - http://www.dbappsecurity.com/webscan.html&lt;br /&gt;
* N-Stalker Web Application Security Scanner - http://www.nstalker.com&lt;br /&gt;
* HP WebInspect - http://www.hpenterprisesecurity.com/products/hp-fortify-software-security-center/hp-webinspect&lt;br /&gt;
* SoapUI (Web Service security testing) - http://www.soapui.org/Security/getting-started.html&lt;br /&gt;
* Netsparker - http://www.mavitunasecurity.com/netsparker/&lt;br /&gt;
* SAINT - http://www.saintcorporation.com/&lt;br /&gt;
* QualysGuard WAS - http://www.qualys.com/enterprises/qualysguard/web-application-scanning/&lt;br /&gt;
* Retina Web - http://www.eeye.com/Products/Retina/Web-Security-Scanner.aspx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|check these links&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Cenzic Hailstorm - http://www.cenzic.com/products_services/cenzic_hailstorm.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
link broken:&lt;br /&gt;
&lt;br /&gt;
* ScanDo - http://www.kavado.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
==Source Code Analyzers==&lt;br /&gt;
&lt;br /&gt;
===Open Source / Freeware===&lt;br /&gt;
* [[:Category:OWASP_Orizon_Project|Owasp Orizon]]&lt;br /&gt;
* '''[[:Category:OWASP_LAPSE_Project|OWASP LAPSE]]''' &lt;br /&gt;
* [[OWASP O2 Platform]]&lt;br /&gt;
* Google CodeSearchDiggity - http://www.stachliu.com/resources/tools/google-hacking-diggity-project/attack-tools/&lt;br /&gt;
* PMD - http://pmd.sourceforge.net/&lt;br /&gt;
* FlawFinder - http://www.dwheeler.com/flawfinder&lt;br /&gt;
* Microsoft’s [[FxCop]]&lt;br /&gt;
* Splint - http://splint.org&lt;br /&gt;
* Boon - http://www.cs.berkeley.edu/~daw/boon&lt;br /&gt;
* FindBugs - http://findbugs.sourceforge.net&lt;br /&gt;
* Oedipus - http://www.darknet.org.uk/2006/06/oedipus-open-source-web-application-security-analysis/&lt;br /&gt;
* W3af - http://w3af.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|broken link&lt;br /&gt;
&lt;br /&gt;
* Pscan - http://www.striker.ottawa.on.ca/~aland/pscan&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
===Commercial ===&lt;br /&gt;
&lt;br /&gt;
* Armorize CodeSecure - http://www.armorize.com/index.php?link_id=codesecure&lt;br /&gt;
* Parasoft C/C++ test - http://www.parasoft.com/jsp/products/cpptest.jsp/index.htm&lt;br /&gt;
* Checkmarx CxSuite  - http://www.checkmarx.com&lt;br /&gt;
* HP Fortify - http://www.hpenterprisesecurity.com/products/hp-fortify-software-security-center/hp-fortify-static-code-analyzer&lt;br /&gt;
* GrammaTech - http://www.grammatech.com&lt;br /&gt;
* ITS4 - http://seclab.cs.ucdavis.edu/projects/testing/tools/its4.html&lt;br /&gt;
* Appscan - http://www-01.ibm.com/software/rational/products/appscan/source/&lt;br /&gt;
* ParaSoft - http://www.parasoft.com&lt;br /&gt;
* Virtual Forge CodeProfiler for ABAP - http://www.virtualforge.de&lt;br /&gt;
* Veracode - http://www.veracode.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|link not working&lt;br /&gt;
&lt;br /&gt;
* Armorize CodeSecure - http://www.armorize.com/product/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
==Acceptance Testing Tools==&lt;br /&gt;
Acceptance testing tools are used to validate the functionality of web applications.  Some follow a scripted approach and typically make use of a Unit Testing framework to construct test suites and test cases.  Most, if not all, can be adapted to perform security specific tests in addition to functional tests.&lt;br /&gt;
&lt;br /&gt;
===Open Source Tools===&lt;br /&gt;
&lt;br /&gt;
* WATIR - http://wtr.rubyforge.org&lt;br /&gt;
** A Ruby based web testing framework that provides an interface into Internet Explorer.&lt;br /&gt;
** Windows only.&lt;br /&gt;
* HtmlUnit - http://htmlunit.sourceforge.net &lt;br /&gt;
** A Java and JUnit based framework that uses the Apache HttpClient as the transport.&lt;br /&gt;
** Very robust and configurable and is used as the engine for a number of other testing tools.&lt;br /&gt;
* jWebUnit - http://jwebunit.sourceforge.net&lt;br /&gt;
** A Java based meta-framework that uses htmlunit or selenium as the testing engine.&lt;br /&gt;
* Canoo Webtest - http://webtest.canoo.com&lt;br /&gt;
** An XML based testing tool that provides a facade on top of htmlunit.&lt;br /&gt;
** No coding is necessary as the tests are completely specified in XML.&lt;br /&gt;
** There is the option of scripting some elements in Groovy if XML does not suffice.&lt;br /&gt;
** Very actively maintained.&lt;br /&gt;
* HttpUnit - http://httpunit.sourceforge.net&lt;br /&gt;
** One of the first web testing frameworks, suffers from using the native JDK provided HTTP transport, which can be a bit limiting for security testing.&lt;br /&gt;
* Watij - http://watij.com&lt;br /&gt;
** A Java implementation of WATIR.&lt;br /&gt;
** Windows only because it uses IE for its tests (Mozilla integration is in the works).&lt;br /&gt;
* Solex - http://solex.sourceforge.net&lt;br /&gt;
** An Eclipse plugin that provides a graphical tool to record HTTP sessions and make assertions based on the results.&lt;br /&gt;
* Selenium - http://seleniumhq.org/&lt;br /&gt;
** JavaScript based testing framework, cross-platform and provides a GUI for creating tests.&lt;br /&gt;
** Mature and popular tool, but the use of JavaScript could hamper certain security tests.&lt;br /&gt;
&lt;br /&gt;
==Other Tools==&lt;br /&gt;
&lt;br /&gt;
===Runtime Analysis===&lt;br /&gt;
&lt;br /&gt;
*  Rational PurifyPlus - http://www-01.ibm.com/software/awdtools/purify/&lt;br /&gt;
&lt;br /&gt;
===Binary Analysis===&lt;br /&gt;
&lt;br /&gt;
* BugScam IDC Package - http://sourceforge.net/projects/bugscam&lt;br /&gt;
* Veracode - http://www.veracode.com&lt;br /&gt;
&lt;br /&gt;
===Requirements Management===&lt;br /&gt;
&lt;br /&gt;
* Rational Requisite Pro - http://www-306.ibm.com/software/awdtools/reqpro&lt;br /&gt;
&lt;br /&gt;
===Site Mirroring===&lt;br /&gt;
* wget - http://www.gnu.org/software/wget, http://www.interlog.com/~tcharron/wgetwin.html&lt;br /&gt;
* curl - http://curl.haxx.se &lt;br /&gt;
* Sam Spade - http://www.samspade.org&lt;br /&gt;
* Xenu's Link Sleuth - http://home.snafu.de/tilman/xenulink.html&lt;/div&gt;</summary>
		<author><name>Amro Ahmed</name></author>	</entry>

	</feed>