<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cal9000</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cal9000"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Cal9000"/>
		<updated>2026-05-06T10:06:28Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=14065</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=14065"/>
				<updated>2006-12-08T19:00:47Z</updated>
		
		<summary type="html">&lt;p&gt;Cal9000: /* Downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
[[Image:httpRequests.jpg|thumb|300px|right|CAL9000 in action]]&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
CAL9000 is a collection of web application security testing tools that complement the feature set of current web proxies and automated scanners. CAL9000 gives you the flexibility and functionality you need for more effective manual testing efforts. Works best when used with Firefox or Internet Explorer.&lt;br /&gt;
&lt;br /&gt;
CAL9000 is written in Javascript, so you have full access to the source code. Feel free to modify it to best suit your particular needs. CAL9000 has some powerful features (like executing cross-domain xmlHttpRequests and writing to disk). It is purposefully designed to do some horribly insecure things. Therefore, I would strongly encourage that you only run it locally and NOT off of a server.&lt;br /&gt;
&lt;br /&gt;
Take a few moments to check out the CAL9000 built-in Help file for information about all of the new features and some potential gotchas (browser quirks, xmlHttpRequest limitations, etc.)&lt;br /&gt;
&lt;br /&gt;
Please only use this tool for testing your own applications or those that you have been authorized to test.&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* XSS Attacks - This is a listing of the XSS Attack Info from [http://ha.ckers.org/xss.html RSnake]. You can filter the listing based on which browsers the attacks work in, test them, apply RegEx filters and create/edit/save/delete your own attacks.&lt;br /&gt;
* Character Encoder/Decoder - Encodes and decodes the following types: URL, Standard Hex, Unicode, Html(Named), Html(Decimal), Html(Hex), Html(Hex Long), Javascript Escaped, XML Escaped, Straight Decimal, Straight Hex, IE Hex, IE Unicode, Base64 and MD5. Encode only with MD4 and SHA1. Specify Upper/Lowercase, Delimiters and Trailing Characters. You can add/remove wrappers around your results and encode/decode selected text instead of the entire contents of the window.&lt;br /&gt;
* Http Requests - Manually craft and send HTTP requests to servers. GET, POST, HEAD, TRACE, TRACK, OPTIONS, CONNECT, PUT, DELETE, COPY, LOCK, MKCOL, MOVE, PROPFIND, PROPPATCH, SEARCH and UNLOCK methods supported. Send single requests or launch automated attacks with more than one request at a time. All results are saved in a history file.&lt;br /&gt;
* Http Responses - View the status codes, response headers and body. Isolate the script, form and cookie information in the response.&lt;br /&gt;
* Scratchpad - A place to save code snippets, notes, results, etc.&lt;br /&gt;
* Cheatsheets - Collection of references for various web-related platforms and languages.&lt;br /&gt;
* IP Encode/Decode - Go to/from IP, Dword, Hex and Octal addresses.&lt;br /&gt;
* String Generator - Create character strings of almost any length.&lt;br /&gt;
* Scroogle Search - A privacy-friendly scrape of Google results w/Advanced Operators.&lt;br /&gt;
* Testing Tips - Collection of testing ideas for assessments.&lt;br /&gt;
* Testing Checklist - Track the progress of your testing efforts and record your findings. The checklist categories roughly correlate with the Manual Testing Techniques from the OWASP Testing Guide. Create/edit/save/delete your own checklist items.&lt;br /&gt;
* AutoAttack Editor - Create/edit/save/delete the AutoAttack Lists that are used to drive the automated multiple-request capabilities on the HTTP Requests page.&lt;br /&gt;
* Store/Restore - Temporarily hold and retrieve textarea and text field contents.&lt;br /&gt;
* Save/Load State - Allows you to save CAL9000 textarea and text field contents and reload them when you are ready to resume testing.&lt;br /&gt;
* Selected Text Processing - Allows you to process selected text inside of a textarea instead of the entire contents.&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
LATEST RELEASE - Version 2.0 released November 16, 2006. See the [[OWASP CAL9000 Project Roadmap]] for release notes.&lt;br /&gt;
&lt;br /&gt;
* Click [http://www.digilantesecurity.com/CAL9000/files/CAL9000.zip here] to download the CAL9000 tool.&lt;br /&gt;
* Click [http://owasp-code-central.googlecode.com/svn/trunk/labs/cal9000/ here] to view the CAL9000 source code.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
Chris Loomis wrote the CAL9000 tool and currently leads the project. Any and all questions, comments or suggestions are welcome and may be directed [mailto:cal9000tool@mac.com here] or submitted via the [http://lists.owasp.org/mailman/listinfo/owasp-cal9000 mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to everyone who has emailed me their comments and great suggestions for enhancing CAL9000. Keep the ideas coming! Special thanks to Achim Hoffmann for his significant contributions of code and time to the project.&lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation: ==&lt;br /&gt;
&lt;br /&gt;
We hope that you find the OWASP CAL9000 Project useful. Please contribute to the Project by volunteering for one of the Tasks and/or sending your comments, questions and suggestions to owasp@owasp.org. To join the OWASP CAL9000 Project mailing list or to view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-cal9000 subscription page].&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Cal9000</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Cross_site_scripting&amp;diff=13553</id>
		<title>Testing for Cross site scripting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Cross_site_scripting&amp;diff=13553"/>
				<updated>2006-11-22T16:59:39Z</updated>
		
		<summary type="html">&lt;p&gt;Cal9000: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
Cross Site Scripting (CSS for short, but sometimes abbreviated as XSS) is one of the most common application level attacks that hackers use to sneak into web applications today. It should be stressed that although the vulnerability exists at the web site, at no time is the web site directly harmed&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue ==&lt;br /&gt;
&lt;br /&gt;
Cross site scripting is an attack on the privacy of clients of a particular web site which can lead to a total breach of security when customer details are stolen or manipulated. Unlike most attacks, which involve two parties – the attacker, and the web site, or the attacker and the victim client, the CSS attack involves three parties – the attacker, a client and the web site. The goal of the CSS attack is to steal the client cookies, or any other sensitive information, which can authenticate the client to the web site. With the token of the legitimate user at hand, the attacker can proceed to act as the user in his/her interaction with the site –specifically, impersonate the user. - Identity theft!&lt;br /&gt;
&lt;br /&gt;
Online message boards, web logs, guestbooks, and user forums where messages can be permanently stored also facilitate Cross-Site Scripting attacks. In these cases, an attacker can post a message to the board with a link to a seemingly harmless site, which subtly encodes a script that attacks the user once they click the link. Attackers can use a wide-range of encoding techniques to hide or obfuscate the malicious script and, in some cases, can avoid explicit use of the &amp;lt;Script&amp;gt; tag. Typically, XSS attacks involve malicious JavaScript, but it can also involve any type of executable active content. Although the types of attacks vary in sophistication, there is a generally reliable method to detect XSS vulnerabilities.&lt;br /&gt;
Cross site scripting is used in many Phishing attacks.&lt;br /&gt;
&lt;br /&gt;
==Black Box testing and example==&lt;br /&gt;
&lt;br /&gt;
One way to test for XSS vulnerabilities is to verify whether an application or web server will respond to requests containing simple scripts with an HTTP response that could be executed by a browser. For example, Sambar Server (version 5.3) is a popular freeware web server with known XSS vulnerabilities. Sending the server a request such as the following generates a response from the server that will be executed by a web browser:&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''/testcgi.exe?&amp;lt;SCRIPT&amp;gt;alert(“Cookie”+document.cookie)&amp;lt;/SCRIPT&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
The script is executed by the browser because the application generates an error message containing the original script, and the browser interprets the response as an executable script originating from the server.&lt;br /&gt;
All web servers and web applications are potentially vulnerable to this type of misuse, and preventing such attacks is extremely difficult. Consider implementing the following recommendations if one or more XSS vulnerabilities have been detected in your application&lt;br /&gt;
&lt;br /&gt;
The following general recommendations can help mitigate the risk associated with Cross-Site Scripting vulnerabilities. This is a complex problem area so there is no one simple fix or solution:&lt;br /&gt;
* Ensure that your web application validates all forms, headers, cookie fields, hidden fields, and parameters, and converts scripts and script tags to a non-executable form.&lt;br /&gt;
* Ensure that any executables on your server do not return scripts in executable form when passed scripts as malformed command parameters.&lt;br /&gt;
* Consider converting JavaScript and HTML tags into alternate HTML encodings (such as “&amp;lt;” to “&amp;amp;lt;&amp;gt;.&lt;br /&gt;
* If your site runs online forums or message boards, disallow the use of HTML tags and Scripting in these areas.&lt;br /&gt;
* Keep up with the latest security vulnerabilities and bugs for all production applications and servers.&lt;br /&gt;
* Update your production servers with the latest XSS vulnerabilities by downloading current patches, and perform frequent security audits on all deployed applications.&lt;br /&gt;
The root cause of Cross-Site Scripting is a failure to filter hazardous characters from web application input and output. The two most critical programming practices you can institute to guard against Cross-Site Scripting are:&lt;br /&gt;
* Validate Input&lt;br /&gt;
* Encode output&lt;br /&gt;
Always filter data originating from outside your application by disallowing the use of special characters. Only display output to the browser that has been sufficiently encoded. When possible, avoid simple character filters and write routines that validate user input against a set of allowed, safe characters. Use regular expressions to confirm that data conforms to the allowed character set. This enhances application security and makes it harder to bypass input validation routines.&lt;br /&gt;
There are different tools you can use to validate and encode your data, depending upon your development environment. Your goal in remediating Cross-Site Scripting attacks is to filter and encode all potentially dangerous characters so that the application does not return data that the browser will interpret as executable.  Any unescaped or unecoded data that is returned to the browser is a potential security risk.&lt;br /&gt;
The following characters can be harmful and should be filtered whenever they appear in the application input or output. In output, you should translate these characters to their HTML equivalents before returning data to the browser.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''&amp;gt;     &amp;lt;   (     )     [     ]     '     &amp;quot;     ;     :     /     |'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;PHP&amp;lt;/b&amp;gt;&lt;br /&gt;
The following PHP functions help mitigate Cross-Site Scripting Vulnerabilities:&lt;br /&gt;
* '''Strip_tags()''' removes HTML and PHP scripting tags from a string.&lt;br /&gt;
* '''Utf8_decode()''' converts UTF-8 encoding to single byte ASCII characters. Decoding Unicode input prior to filtering it can help you detect attacks that the attacker has obfuscated with Unicode encoding.&lt;br /&gt;
* '''Htmlspecialcharacters()''' turns characters such as '''&amp;amp;,&amp;gt;,&amp;lt;,”''' into their HTML equivalents. Converting special characters to HTML prevents them from being executed within browsers when outputted by an application.&lt;br /&gt;
* '''Strtr()''' filters any characters you specify. Make sure to filter  “; : ( )” characters so that attackers cannot craft strings that generate alerts. Many XSS attacks are possible without the use of HTML characters, so filtering and encoding parentheses mitigates these attacks.&amp;lt;BR&amp;gt;For example:&lt;br /&gt;
'''&amp;quot; style=&amp;quot;background:url(JavaScript:alert(Malicious Content));'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;ASP.NET&amp;lt;/b&amp;gt;&lt;br /&gt;
With ASP.NET, you can use the following functions to help prevent Cross-Site Scripting:&lt;br /&gt;
* Constrain input submitted via server controls by using ASP.NET validater controls, such as '''RegularExpressionValidator''', '''RangeValidator''', and '''System.Text.RegularExpression.Regex'''. Using these methods as server-side controls to limit data input to only allowable character sequences by validating input type, length, format, and character range.&lt;br /&gt;
* Use the '''HtmlUtility.HtmlEncode''' method to encode data if it originates from either a user or from a database. HtmlEncode replaces special characters with their HTML equivalents, thus preventing the output from being executable in the browser. Use HtmlUtility.UrlEncode when writing URLs that may have originated from user input or stored database information.&lt;br /&gt;
* Use the '''HttpOnly cookie''' option for added protection.&lt;br /&gt;
* As a best practice, you should use regular expressions to constrain input to known safe characters. Do not rely solely on ASP.NET validateRequest, but use it in addition to your other input validation and encoding mechanisms.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Paul Lindner: &amp;quot;Preventing Cross-site Scripting Attacks&amp;quot; - http://www.perl.com/pub/a/2002/02/20/css.html&lt;br /&gt;
&lt;br /&gt;
* CERT: &amp;quot;CERT Advisory CA-2000-02 Malicious HTML Tags Embedded in Client Web Requests&amp;quot; - http://www.cert.org/advisories/CA-2000-02.html&lt;br /&gt;
&lt;br /&gt;
* RSnake: &amp;quot;XSS (Cross Site Scripting) Cheat Sheet&amp;quot; - http://ha.ckers.org/xss.html&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
* '''OWASP CAL9000''' - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br&amp;gt;&lt;br /&gt;
** CAL9000 includes a sortable implementation of RSnake's XSS Attacks, Character Encoder/Decoder, HTTP Request Generator and Response Evaluator, Testing Checklist, Automated Attack Editor and much more. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Cal9000</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Appendix_A:_Testing_Tools&amp;diff=13471</id>
		<title>Appendix A: Testing Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Appendix_A:_Testing_Tools&amp;diff=13471"/>
				<updated>2006-11-21T04:33:23Z</updated>
		
		<summary type="html">&lt;p&gt;Cal9000: /* Open Source Black Box Testing tools */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Open Source Black Box Testing tools==&lt;br /&gt;
&lt;br /&gt;
* '''OWASP WebScarab''' - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* '''OWASP CAL9000''' - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br&amp;gt;&lt;br /&gt;
** CAL9000 is a collection of browser-based tools that enable more effective and efficient manual testing efforts. Includes an XSS Attack Library, Character Encoder/Decoder, HTTP Request Generator and Response Evaluator, Testing Checklist, Automated Attack Editor and much more. &lt;br /&gt;
&lt;br /&gt;
* '''OWASP Pantera''' - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* SPIKE - http://www.immunitysec.com&lt;br /&gt;
* Paros - http://www.proofsecure.com&lt;br /&gt;
* Burp Proxy - http://www.portswigger.net&lt;br /&gt;
* Achilles Proxy - http://www.mavensecurity.com/achilles&lt;br /&gt;
* Odysseus Proxy - http://www.wastelands.gen.nz/odysseus/&lt;br /&gt;
* Webstretch Proxy - http://sourceforge.net/projects/webstretch&amp;lt;br&amp;gt;&lt;br /&gt;
* Firefox LiveHTTPHeaders, Tamper Data and Developer Tools- http://www.mozdev.org&lt;br /&gt;
* Sensepost Wikto (Google cached fault-finding) - http://www.sensepost.com/research/wikto/index2.html&lt;br /&gt;
&lt;br /&gt;
=== Testing for specific vulnerabilities ===&lt;br /&gt;
&lt;br /&gt;
'''Testing AJAX '''&amp;lt;br&amp;gt;&lt;br /&gt;
* OWASP SPRAJAX - http://www.owasp.org/index.php/Category:OWASP_Sprajax_Project&lt;br /&gt;
'''Testing for SQL Injection '''&amp;lt;br&amp;gt;&lt;br /&gt;
* OWASP SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&lt;br /&gt;
* Multiple DBMS Sql Injection tool - [SQL Power Injector]&lt;br /&gt;
* MySql Blind Injection Bruteforcing, Reversing.org - [sqlbftools]&lt;br /&gt;
* Antonio Parata: Dump Files by sql inference on Mysql - [SqlDumper]&lt;br /&gt;
* icesurfer: sqlninja &lt;br /&gt;
* SQLmap - http://www.linux.it/~belch/creations/sqlmap-0.0.1.tgz&lt;br /&gt;
* Absinthe 1.1 (formerly SQLSqueal) - http://www.0x90.org/releases/absinthe/&amp;lt;br&amp;gt;&lt;br /&gt;
'''Testing Oracle'''&lt;br /&gt;
* TNS Listener tool (Perl) - http://www.jammed.com/%7Ejwa/hacks/security/tnscmd/tnscmd-doc.html&lt;br /&gt;
* Toad for Oracle - http://www.quest.com/toad &lt;br /&gt;
'''Testing SSL '''&amp;lt;br&amp;gt;&lt;br /&gt;
* Foundstone SSL Digger - http://www.foundstone.com/resources/proddesc/ssldigger.htm&lt;br /&gt;
'''Testing for Brute Force Password'''&lt;br /&gt;
* THC Hydra - http://www.thc.org/thc-hydra/&lt;br /&gt;
* John the Ripper - http://www.openwall.com/john/&lt;br /&gt;
* Brutus - http://www.hoobie.net/brutus/ &lt;br /&gt;
'''Testing for HTTP Methods'''&lt;br /&gt;
* NetCat - http://www.vulnwatch.org/netcat&lt;br /&gt;
'''Testing Buffer Overflow'''&lt;br /&gt;
*  OllyDbg: &amp;quot;A windows based debugger used for analyzing buffer overflow vulnerabilities&amp;quot; - http://www.ollydbg.de&lt;br /&gt;
* Spike, A fuzzer framework that can be used to explore vulnerabilities and perform length testing - http://www.immunitysec.com/downloads/SPIKE2.9.tgz&lt;br /&gt;
* Brute Force Binary Tester (BFB), A proactive binary checker - http://bfbtester.sourceforge.net/&lt;br /&gt;
* Metasploit, A rapid exploit development and Testing frame work - http://www.metasploit.com/projects/Framework/ &lt;br /&gt;
'''Fuzzer'''&amp;lt;br&amp;gt;&lt;br /&gt;
* OWASP WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&lt;br /&gt;
'''Googling'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Foundstone Sitedigger (Google cached fault-finding) - http://www.foundstone.com/resources/proddesc/sitedigger.htm&lt;br /&gt;
&lt;br /&gt;
==Commercial Black Box Testing tools==&lt;br /&gt;
&lt;br /&gt;
* Watchfire AppScan - http://www.watchfire.com&lt;br /&gt;
* Cenzic Hailstorm - http://www.cenzic.com/products_services/cenzic_hailstorm.php&amp;lt;br&amp;gt;&lt;br /&gt;
* SPI Dynamics WebInspect - http://www.spidynamics.com&lt;br /&gt;
* Burp Intruder - http://portswigger.net/intruder&amp;lt;br&amp;gt;&lt;br /&gt;
* Acunetix Web Vulnerability Scanner - http://www.acunetix.com/&amp;lt;br&amp;gt;&lt;br /&gt;
* ScanDo - http://www.kavado.com&lt;br /&gt;
* WebSleuth - http://www.sandsprite.com&lt;br /&gt;
* NT Objectives NTOSpider - http://www.ntobjectives.com/products/ntospider.php&amp;lt;br&amp;gt;&lt;br /&gt;
* Fortify Pen Testing Team Tool - http://www.fortifysoftware.com/products/tester&amp;lt;br&amp;gt;&lt;br /&gt;
* Sandsprite Web Sleuth - http://sandsprite.com/Sleuth/&amp;lt;br&amp;gt;&lt;br /&gt;
* MaxPatrol Security Scanner - http://www.maxpatrol.com/&amp;lt;br&amp;gt;&lt;br /&gt;
* Ecyware GreenBlue Inspector - http://www.ecyware.com/&amp;lt;br&amp;gt;&lt;br /&gt;
* Parasoft WebKing (more QA-type tool)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Source Code Analyzers==&lt;br /&gt;
&lt;br /&gt;
===Open Source / Freeware===&lt;br /&gt;
&lt;br /&gt;
* http://www.securesoftware.com&lt;br /&gt;
* FlawFinder - http://www.dwheeler.com/flawfinder&lt;br /&gt;
* Microsoft’s FXCop - http://www.gotdotnet.com/team/fxcop&lt;br /&gt;
* Split - http://splint.org&lt;br /&gt;
* Boon - http://www.cs.berkeley.edu/~daw/boon&lt;br /&gt;
* Pscan - http://www.striker.ottawa.on.ca/~aland/pscan&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Commercial ===&lt;br /&gt;
&lt;br /&gt;
* Fortify - http://www.fortifysoftware.com&lt;br /&gt;
* Ounce labs Prexis - http://www.ouncelabs.com&lt;br /&gt;
* GrammaTech - http://www.grammatech.com&lt;br /&gt;
* ParaSoft - http://www.parasoft.com&lt;br /&gt;
* ITS4 - http://www.cigital.com/its4&lt;br /&gt;
* CodeWizard - http://www.parasoft.com/products/wizard&lt;br /&gt;
&lt;br /&gt;
==Other Tools==&lt;br /&gt;
&lt;br /&gt;
===Runtime Analysis===&lt;br /&gt;
&lt;br /&gt;
*  Rational PurifyPlus - http://www-306.ibm.com/software/awdtools&lt;br /&gt;
&lt;br /&gt;
===Binary Analysis===&lt;br /&gt;
&lt;br /&gt;
* BugScam - http://sourceforge.net/projects/bugscam&lt;br /&gt;
* BugScan - http://www.hbgary.com&lt;br /&gt;
&lt;br /&gt;
===Requirements Management===&lt;br /&gt;
&lt;br /&gt;
* Rational Requisite Pro - http://www-306.ibm.com/software/awdtools/reqpro&lt;br /&gt;
&lt;br /&gt;
'''Site Mirroring'''&lt;br /&gt;
* wget - http://www.gnu.org/software/wget, http://www.interlog.com/~tcharron/wgetwin.html&lt;br /&gt;
* curl - http://curl.haxx.se &lt;br /&gt;
* Sam Spade - http://www.samspade.org&lt;br /&gt;
* Xenu - http://home.snafu.de/tilman/xenulink.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Cal9000</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=13240</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=13240"/>
				<updated>2006-11-18T18:47:49Z</updated>
		
		<summary type="html">&lt;p&gt;Cal9000: /* Features */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
[[Image:httpRequests.jpg|thumb|300px|right|CAL9000 in action]]&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
CAL9000 is a collection of web application security testing tools that complement the feature set of current web proxies and automated scanners. CAL9000 gives you the flexibility and functionality you need for more effective manual testing efforts. Works best when used with Firefox or Internet Explorer.&lt;br /&gt;
&lt;br /&gt;
CAL9000 is written in Javascript, so you have full access to the source code. Feel free to modify it to best suit your particular needs. CAL9000 has some powerful features (like executing cross-domain xmlHttpRequests and writing to disk). It is purposefully designed to do some horribly insecure things. Therefore, I would strongly encourage that you only run it locally and NOT off of a server.&lt;br /&gt;
&lt;br /&gt;
Take a few moments to check out the CAL9000 built-in Help file for information about all of the new features and some potential gotchas (browser quirks, xmlHttpRequest limitations, etc.)&lt;br /&gt;
&lt;br /&gt;
Please only use this tool for testing your own applications or those that you have been authorized to test.&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* XSS Attacks - This is a listing of the XSS Attack Info from [http://ha.ckers.org/xss.html RSnake]. You can filter the listing based on which browsers the attacks work in, test them, apply RegEx filters and create/edit/save/delete your own attacks.&lt;br /&gt;
* Character Encoder/Decoder - Encodes and decodes the following types: URL, Standard Hex, Unicode, Html(Named), Html(Decimal), Html(Hex), Html(Hex Long), Javascript Escaped, XML Escaped, Straight Decimal, Straight Hex, IE Hex, IE Unicode, Base64 and MD5. Encode only with MD4 and SHA1. Specify Upper/Lowercase, Delimiters and Trailing Characters. You can add/remove wrappers around your results and encode/decode selected text instead of the entire contents of the window.&lt;br /&gt;
* Http Requests - Manually craft and send HTTP requests to servers. GET, POST, HEAD, TRACE, TRACK, OPTIONS, CONNECT, PUT, DELETE, COPY, LOCK, MKCOL, MOVE, PROPFIND, PROPPATCH, SEARCH and UNLOCK methods supported. Send single requests or launch automated attacks with more than one request at a time. All results are saved in a history file.&lt;br /&gt;
* Http Responses - View the status codes, response headers and body. Isolate the script, form and cookie information in the response.&lt;br /&gt;
* Scratchpad - A place to save code snippets, notes, results, etc.&lt;br /&gt;
* Cheatsheets - Collection of references for various web-related platforms and languages.&lt;br /&gt;
* IP Encode/Decode - Go to/from IP, Dword, Hex and Octal addresses.&lt;br /&gt;
* String Generator - Create character strings of almost any length.&lt;br /&gt;
* Scroogle Search - A privacy-friendly scrape of Google results w/Advanced Operators.&lt;br /&gt;
* Testing Tips - Collection of testing ideas for assessments.&lt;br /&gt;
* Testing Checklist - Track the progress of your testing efforts and record your findings. The checklist categories roughly correlate with the Manual Testing Techniques from the OWASP Testing Guide. Create/edit/save/delete your own checklist items.&lt;br /&gt;
* AutoAttack Editor - Create/edit/save/delete the AutoAttack Lists that are used to drive the automated multiple-request capabilities on the HTTP Requests page.&lt;br /&gt;
* Store/Restore - Temporarily hold and retrieve textarea and text field contents.&lt;br /&gt;
* Save/Load State - Allows you to save CAL9000 textarea and text field contents and reload them when you are ready to resume testing.&lt;br /&gt;
* Selected Text Processing - Allows you to process selected text inside of a textarea instead of the entire contents.&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
LATEST RELEASE - Version 2.0 released November 16, 2006. See the [[OWASP CAL9000 Project Roadmap]] for release notes.&lt;br /&gt;
&lt;br /&gt;
* Click [http://www.digilantesecurity.com/CAL9000/files/CAL9000.zip here] to download the CAL9000 tool.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
Chris Loomis wrote the CAL9000 tool and currently leads the project. Any and all questions, comments or suggestions are welcome and may be directed [mailto:cal9000tool@mac.com here] or submitted via the [http://lists.owasp.org/mailman/listinfo/owasp-cal9000 mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to everyone who has emailed me their comments and great suggestions for enhancing CAL9000. Keep the ideas coming! Special thanks to Achim Hoffmann for his significant contributions of code and time to the project.&lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation: ==&lt;br /&gt;
&lt;br /&gt;
We hope that you find the OWASP CAL9000 Project useful. Please contribute to the Project by volunteering for one of the Tasks and/or sending your comments, questions and suggestions to owasp@owasp.org. To join the OWASP CAL9000 Project mailing list or to view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-cal9000 subscription page].&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Cal9000</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Autumn_of_Code_2006_-_Projects:_CAL9000&amp;diff=13165</id>
		<title>OWASP Autumn of Code 2006 - Projects: CAL9000</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Autumn_of_Code_2006_-_Projects:_CAL9000&amp;diff=13165"/>
				<updated>2006-11-16T21:10:38Z</updated>
		
		<summary type="html">&lt;p&gt;Cal9000: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''AoC Candidate:''' Chris&lt;br /&gt;
&lt;br /&gt;
'''Project Coordinator:''' Andrew van der Stock &lt;br /&gt;
&lt;br /&gt;
'''Project Progress:''' 100% Complete - [[OWASP_Autumn_of_Code_2006_-_Projects:_CAL9000_-_Progress|Progress Page]]&lt;br /&gt;
&lt;br /&gt;
== Background and Motivation ==&lt;br /&gt;
&lt;br /&gt;
'''History Behind Project'''&lt;br /&gt;
* I got tired of hunting around for information and tools that I needed in order to do assessments, so I thought that it wouldn't be too hard (ha!) to put them all together into one tool.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Problem to be Addressed'''&lt;br /&gt;
* Helps take some of the monotony and guesswork out of manual testing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Benefit to OWASP Members and Community'''&lt;br /&gt;
* CAL9000 is a collection of web application security testing tools that complement the feature set of current web proxies and automated scanners. It gives testers flexibility and functionality for more effective manual testing efforts.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Goals and Deliverables == &lt;br /&gt;
&lt;br /&gt;
'''Plan of Approach'''&lt;br /&gt;
* Get up. Code. Drink. Sleep.   Repeat 100 times.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Deliverables'''&lt;br /&gt;
Listed below are the upgrades that I guarantee that I would be able to implement by year-end 2006.&lt;br /&gt;
&lt;br /&gt;
XSS Attack Library Page -&lt;br /&gt;
* Allow filtering of attacks based upon what browsers they are effective in.&lt;br /&gt;
* Allow users to create/edit/delete their own attacks that will persist even if the RSnake XSS attack file is updated.&lt;br /&gt;
* Allow display of all user-defined attacks in a print-ready format.&lt;br /&gt;
* Enhance RegEx testing functionality. At a minimum, allow user-defined regex flags and replacement strings. Include show/replace/split matches and the ability to test the regex against code.&lt;br /&gt;
&lt;br /&gt;
HTTP Requests Page -&lt;br /&gt;
* Give users (near)full control over generating and sending HTTP Requests. (There are some browser-dependent restrictions)&lt;br /&gt;
* Allow users to define HTTP Method Type,Authentication Type w/values, Schema, FQDN, Port, Absolute path of URL, Parameter, Query String, Request Headers/Body.&lt;br /&gt;
* Allow Quick encoding of an entire request field or selected text(Url, Hex, Unicode, Base64, Md5 encoding types).&lt;br /&gt;
* Allow users to quickly include from a list of Header Names and common Header Values, depending on the Name. (Or use their own)&lt;br /&gt;
* Allow users to quickly include Browser-specific Headers/Values.&lt;br /&gt;
* Allow users to quickly include Method-specific Headers/Values.&lt;br /&gt;
* Allow users to include Request Name/Value pairs and add them to the Query String or the Response Body.&lt;br /&gt;
* All Request/Response results will be saved in persistent History and easily redisplayed.&lt;br /&gt;
&lt;br /&gt;
HTTP Responses Page -&lt;br /&gt;
* Display Target URL, Response Status/Headers/Body.&lt;br /&gt;
* Allow users to view Response Body as it would appear in a browser.&lt;br /&gt;
* Allow users to extract and view Scripts/Forms/Cookies from the response.&lt;br /&gt;
* Allow users to delete Scripts and Forms from Response Body and view the effect on the rendering of the page.&lt;br /&gt;
* Allow display of Request/Response pairs in a print-ready format.&lt;br /&gt;
&lt;br /&gt;
Misc Tools Page -&lt;br /&gt;
* Allow user-defined characters for the String Generator.&lt;br /&gt;
&lt;br /&gt;
Testing Checklist Page -&lt;br /&gt;
* Retain the current testing tips and add a testing checklist based on the OWASP Testing Guide. Include the ability for users to create/edit/delete their own checklist items and also create/edit/delete their results/notes for each test.&lt;br /&gt;
* Allow display of all checklist items and results in a print-ready format.&lt;br /&gt;
&lt;br /&gt;
Automater Page -&lt;br /&gt;
* Allow users to create/edit/delete lists of attack strings and define the insertion points in a request. CAL9000 will automatically send a request for each attack string. Results will be available for review in the History. (Basically, this is a scanner where the user gets to define the tests)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Risks and Rewards == &lt;br /&gt;
&lt;br /&gt;
'''Main Risks'''&lt;br /&gt;
* No social life for several months.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Rewards of Successful Project'''&lt;br /&gt;
* Get an AoC t-shirt.&lt;/div&gt;</summary>
		<author><name>Cal9000</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_CAL9000_Project_Roadmap&amp;diff=13159</id>
		<title>OWASP CAL9000 Project Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_CAL9000_Project_Roadmap&amp;diff=13159"/>
				<updated>2006-11-16T19:42:57Z</updated>
		
		<summary type="html">&lt;p&gt;Cal9000: /* Version History */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Provide a centralized framework for the organization and use of a variety of tools that can&lt;br /&gt;
  assist web application security testers with their manual testing efforts.&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Gathering user feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Version History ==&lt;br /&gt;
&lt;br /&gt;
Nov 16, 2006 - v2.0:&lt;br /&gt;
* XSS Attacks Page:&lt;br /&gt;
** Filter attacks by browser support&lt;br /&gt;
** Create/edit/save/delete your own attacks&lt;br /&gt;
** Display user-defined attacks in print-ready list&lt;br /&gt;
** Expanded Regex functionality - Added show/replace/split on matches&lt;br /&gt;
* Encoder/Decoder:&lt;br /&gt;
** Added types md4 and sha1 (encode only)&lt;br /&gt;
** Define Base64 special characters and padding character&lt;br /&gt;
* HTTP Requests:&lt;br /&gt;
** Added (almost) total control of request components&lt;br /&gt;
** Quickly add request headers (single, by browser, by method)&lt;br /&gt;
** Split/concatenate request parameters and get character count&lt;br /&gt;
** Added AutoAttack feature (send multiple requests at once)&lt;br /&gt;
** Quick encode request components (Url, hex, Unicode, Base64, md5)&lt;br /&gt;
** Requests/responses saved to History file&lt;br /&gt;
** Added History list navigation and functions (delete, print-ready)&lt;br /&gt;
* HTTP Responses:&lt;br /&gt;
** Displays target Url, response status codes, headers and body&lt;br /&gt;
** Split out scripts, forms and cookies&lt;br /&gt;
** Display request body in new window as it would appear in browser&lt;br /&gt;
** Added History list navigation and functions (delete, print-ready)&lt;br /&gt;
* String Generator:&lt;br /&gt;
** Define character used for string generation&lt;br /&gt;
* Testing Checklist:&lt;br /&gt;
** Old testing checklist included as testing tips&lt;br /&gt;
** Added true testing checklist - Create/edit/save/delete checklist items&lt;br /&gt;
* AutoAttack List Editor:&lt;br /&gt;
** Create/edit/save/delete attack lists and items&lt;br /&gt;
** Display attack lists in print-ready format&lt;br /&gt;
** Quick encode checklist items (Url, hex, Unicode, Base64, md5)&lt;br /&gt;
&lt;br /&gt;
July 30, 2006 - v1.1:&lt;br /&gt;
* Focus of this Release: Upgrade Encode/Decode function.&lt;br /&gt;
* Added Uppercase check box&lt;br /&gt;
* Added Trailing Character text field&lt;br /&gt;
* Added Delimiter text field&lt;br /&gt;
* Added Include Unselected Text check box&lt;br /&gt;
* Added Wrappers&lt;br /&gt;
* Added several Encoding/Decoding types&lt;br /&gt;
* Added ability to Encode/Decode selected text only&lt;br /&gt;
* Added Store/Restore functionality&lt;br /&gt;
* Added Selected Text processing&lt;br /&gt;
* Added Error/Informational Message functionality&lt;br /&gt;
* String Generator can handle larger string sizes&lt;br /&gt;
* Minor Bugfixes w/ URL Encoding&lt;br /&gt;
* Minor Bugfixes w/ Save State processing&lt;br /&gt;
&lt;br /&gt;
May 18, 2006 - v1.0.&lt;br /&gt;
&lt;br /&gt;
== Wish List ==&lt;br /&gt;
* What features would you like to see added?&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP CAL9000 Project]]&lt;/div&gt;</summary>
		<author><name>Cal9000</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=13158</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=13158"/>
				<updated>2006-11-16T19:42:09Z</updated>
		
		<summary type="html">&lt;p&gt;Cal9000: /* Downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
[[Image:httpRequests.jpg|thumb|300px|right|CAL9000 in action]]&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
CAL9000 is a collection of web application security testing tools that complement the feature set of current web proxies and automated scanners. CAL9000 gives you the flexibility and functionality you need for more effective manual testing efforts. Works best when used with Firefox or Internet Explorer.&lt;br /&gt;
&lt;br /&gt;
CAL9000 is written in Javascript, so you have full access to the source code. Feel free to modify it to best suit your particular needs. CAL9000 has some powerful features (like executing cross-domain xmlHttpRequests and writing to disk). It is purposefully designed to do some horribly insecure things. Therefore, I would strongly encourage that you only run it locally and NOT off of a server.&lt;br /&gt;
&lt;br /&gt;
Take a few moments to check out the CAL9000 built-in Help file for information about all of the new features and some potential gotchas (browser quirks, xmlHttpRequest limitations, etc.)&lt;br /&gt;
&lt;br /&gt;
Please only use this tool for testing your own applications or those that you have been authorized to test.&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* XSS Attacks - This is a listing of the XSS Attack Info from [http://ha.ckers.org/xss.html RSnake]. You can filter the listing based on which browsers the attacks work in, test them, apply RegEx filters and create/edit/save/delete your own attacks.&lt;br /&gt;
* Character Encoder/Decoder - Encodes and decodes the following types: URL, Standard Hex, Unicode, Html(Named), Html(Decimal), Html(Hex), Html(Hex Long), Javascript Escaped, XML Escaped, Straight Decimal, Straight Hex, IE Hex, IE Unicode, Base64 and MD5. Encode only with MD4 and SHA1. Specify Upper/Lowercase, Delimiters and Trailing Characters. You can add/remove wrappers around your results and encode/decode selected text instead of the entire contents of the window.&lt;br /&gt;
* Http Requests - Manually craft and send HTTP requests to servers. GET, POST, HEAD, TRACE, TRACK, OPTIONS, CONNECT, PUT, DELETE, COPY, LOCK, MKCOL, MOVE, PROPFIND, PROPPATCH, SEARCH and UNLOCK methods supported. Send single requests or launch automated attacks with more than one request at a time. All results are saved in a history file.&lt;br /&gt;
* Http Responses - View the status codes, response headers and body. Isolate the script, form and cookie information in the response.&lt;br /&gt;
* Scratchpad - A place to save code snippets, notes, results, etc.&lt;br /&gt;
* Cheatsheets - Collection of references for various web-related platforms and languages.&lt;br /&gt;
* Page Info - Splits out the Forms in a target page, as well as the source for internal and external Scripts.&lt;br /&gt;
* IP Encode/Decode - Go to/from IP, Dword, Hex and Octal addresses.&lt;br /&gt;
* String Generator - Create character strings of almost any length.&lt;br /&gt;
* Scroogle Search - A privacy-friendly scrape of Google results w/Advanced Operators.&lt;br /&gt;
* Testing Tips - Collection of testing ideas for assessments.&lt;br /&gt;
* Testing Checklist - Track the progress of your testing efforts and record your findings. The checklist categories roughly correlate with the Manual Testing Techniques from the OWASP Testing Guide. Create/edit/save/delete your own checklist items.&lt;br /&gt;
* AutoAttack Editor - Create/edit/save/delete the AutoAttack Lists that are used to drive the automated multiple-request capabilities on the HTTP Requests page.&lt;br /&gt;
* Store/Restore - Temporarily hold and retrieve textarea and text field contents.&lt;br /&gt;
* Save/Load State - Allows you to save CAL9000 textarea and text field contents and reload them when you are ready to resume testing.&lt;br /&gt;
* Selected Text Processing - Allows you to process selected text inside of a textarea instead of the entire contents.&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
LATEST RELEASE - Version 2.0 released November 16, 2006. See the [[OWASP CAL9000 Project Roadmap]] for release notes.&lt;br /&gt;
&lt;br /&gt;
* Click [http://www.digilantesecurity.com/CAL9000/files/CAL9000.zip here] to download the CAL9000 tool.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
Chris Loomis wrote the CAL9000 tool and currently leads the project. Any and all questions, comments or suggestions are welcome and may be directed [mailto:cal9000tool@mac.com here] or submitted via the [http://lists.owasp.org/mailman/listinfo/owasp-cal9000 mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to everyone who has emailed me their comments and great suggestions for enhancing CAL9000. Keep the ideas coming! Special thanks to Achim Hoffmann for his significant contributions of code and time to the project.&lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation: ==&lt;br /&gt;
&lt;br /&gt;
We hope that you find the OWASP CAL9000 Project useful. Please contribute to the Project by volunteering for one of the Tasks and/or sending your comments, questions and suggestions to owasp@owasp.org. To join the OWASP CAL9000 Project mailing list or to view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-cal9000 subscription page].&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Cal9000</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=13157</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=13157"/>
				<updated>2006-11-16T19:39:57Z</updated>
		
		<summary type="html">&lt;p&gt;Cal9000: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
[[Image:httpRequests.jpg|thumb|300px|right|CAL9000 in action]]&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
CAL9000 is a collection of web application security testing tools that complement the feature set of current web proxies and automated scanners. CAL9000 gives you the flexibility and functionality you need for more effective manual testing efforts. Works best when used with Firefox or Internet Explorer.&lt;br /&gt;
&lt;br /&gt;
CAL9000 is written in Javascript, so you have full access to the source code. Feel free to modify it to best suit your particular needs. CAL9000 has some powerful features (like executing cross-domain xmlHttpRequests and writing to disk). It is purposefully designed to do some horribly insecure things. Therefore, I would strongly encourage that you only run it locally and NOT off of a server.&lt;br /&gt;
&lt;br /&gt;
Take a few moments to check out the CAL9000 built-in Help file for information about all of the new features and some potential gotchas (browser quirks, xmlHttpRequest limitations, etc.)&lt;br /&gt;
&lt;br /&gt;
Please only use this tool for testing your own applications or those that you have been authorized to test.&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* XSS Attacks - This is a listing of the XSS Attack Info from [http://ha.ckers.org/xss.html RSnake]. You can filter the listing based on which browsers the attacks work in, test them, apply RegEx filters and create/edit/save/delete your own attacks.&lt;br /&gt;
* Character Encoder/Decoder - Encodes and decodes the following types: URL, Standard Hex, Unicode, Html(Named), Html(Decimal), Html(Hex), Html(Hex Long), Javascript Escaped, XML Escaped, Straight Decimal, Straight Hex, IE Hex, IE Unicode, Base64 and MD5. Encode only with MD4 and SHA1. Specify Upper/Lowercase, Delimiters and Trailing Characters. You can add/remove wrappers around your results and encode/decode selected text instead of the entire contents of the window.&lt;br /&gt;
* Http Requests - Manually craft and send HTTP requests to servers. GET, POST, HEAD, TRACE, TRACK, OPTIONS, CONNECT, PUT, DELETE, COPY, LOCK, MKCOL, MOVE, PROPFIND, PROPPATCH, SEARCH and UNLOCK methods supported. Send single requests or launch automated attacks with more than one request at a time. All results are saved in a history file.&lt;br /&gt;
* Http Responses - View the status codes, response headers and body. Isolate the script, form and cookie information in the response.&lt;br /&gt;
* Scratchpad - A place to save code snippets, notes, results, etc.&lt;br /&gt;
* Cheatsheets - Collection of references for various web-related platforms and languages.&lt;br /&gt;
* Page Info - Splits out the Forms in a target page, as well as the source for internal and external Scripts.&lt;br /&gt;
* IP Encode/Decode - Go to/from IP, Dword, Hex and Octal addresses.&lt;br /&gt;
* String Generator - Create character strings of almost any length.&lt;br /&gt;
* Scroogle Search - A privacy-friendly scrape of Google results w/Advanced Operators.&lt;br /&gt;
* Testing Tips - Collection of testing ideas for assessments.&lt;br /&gt;
* Testing Checklist - Track the progress of your testing efforts and record your findings. The checklist categories roughly correlate with the Manual Testing Techniques from the OWASP Testing Guide. Create/edit/save/delete your own checklist items.&lt;br /&gt;
* AutoAttack Editor - Create/edit/save/delete the AutoAttack Lists that are used to drive the automated multiple-request capabilities on the HTTP Requests page.&lt;br /&gt;
* Store/Restore - Temporarily hold and retrieve textarea and text field contents.&lt;br /&gt;
* Save/Load State - Allows you to save CAL9000 textarea and text field contents and reload them when you are ready to resume testing.&lt;br /&gt;
* Selected Text Processing - Allows you to process selected text inside of a textarea instead of the entire contents.&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
LATEST RELEASE - Version 2.0 released November 16, 2006. See the [[OWASP CAL9000 Project Roadmap]] for release notes.&lt;br /&gt;
&lt;br /&gt;
* RightClick [http://www.digilantesecurity.com/CAL9000/files/CAL9000.zip here] to download the CAL9000 tool.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
Chris Loomis wrote the CAL9000 tool and currently leads the project. Any and all questions, comments or suggestions are welcome and may be directed [mailto:cal9000tool@mac.com here] or submitted via the [http://lists.owasp.org/mailman/listinfo/owasp-cal9000 mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to everyone who has emailed me their comments and great suggestions for enhancing CAL9000. Keep the ideas coming! Special thanks to Achim Hoffmann for his significant contributions of code and time to the project.&lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation: ==&lt;br /&gt;
&lt;br /&gt;
We hope that you find the OWASP CAL9000 Project useful. Please contribute to the Project by volunteering for one of the Tasks and/or sending your comments, questions and suggestions to owasp@owasp.org. To join the OWASP CAL9000 Project mailing list or to view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-cal9000 subscription page].&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Cal9000</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:HttpRequests.jpg&amp;diff=13155</id>
		<title>File:HttpRequests.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:HttpRequests.jpg&amp;diff=13155"/>
				<updated>2006-11-16T19:35:11Z</updated>
		
		<summary type="html">&lt;p&gt;Cal9000: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cal9000</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=12659</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=12659"/>
				<updated>2006-11-15T03:53:18Z</updated>
		
		<summary type="html">&lt;p&gt;Cal9000: /* Downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
[[Image:xssAttacks.jpg|thumb|300px|right|CAL9000 in action]]&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
CAL9000 brings together a host of web application security testing tools into one convenient package. It is designed to be used in the Firefox browser. CAL9000 functionality may be limited when used with other browsers.&lt;br /&gt;
&lt;br /&gt;
CAL9000 is written in Javascript, so you have full access to the source code. Feel free to modify it to best suit your particular needs. CAL9000 has some powerful features(like executing cross-domain XMLHttpRequests and writing to disk). It is purposefully designed to do some horribly insecure things. Therefore, I would strongly encourage that you only run it locally and NOT off of a web server.&lt;br /&gt;
&lt;br /&gt;
While using CAL9000, the Firefox browser may pop up windows asking you to grant exceptions to its security policy. These are normal and may be safely accepted. If you are reluctant to approve these requests, you can review the source code until you are comfortable with CAL9000's functionality. I can say with reasonable certainty that CAL9000 will not go crazy and try to kill you.&lt;br /&gt;
&lt;br /&gt;
Please only use this tool for testing your own applications or those that you have been authorized to test.&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* XSS Attacks - This is a library of the XSS Attack Info from [http://ha.ckers.org/xss.html RSnake]. You can also try testing the various attacks or using RegEx filters against them.&lt;br /&gt;
* Character Encoder/Decoder - Encodes and decodes the following types: URL, Standard Hex, Unicode, Html(Named), Html(Decimal), Html(Hex), Html(Hex Long), Javascript Escaped, XML Escaped, Straight Decimal, Straight Hex, IE Hex, IE Unicode, Base64 and MD5. Specify Upper/Lowercase, Delimiters and Trailing Characters. You can add/remove wrappers around your results and encode/decode selected text instead of the entire contents of the window.&lt;br /&gt;
* Simple Http Requests - Send GET, POST, HEAD, TRACE, OPTIONS, PUT and DELETE requests and see the results.&lt;br /&gt;
* Scratchpad - A place to save code snippets, notes, results, etc.&lt;br /&gt;
* Cheatsheets - Collection of references for various web-related platforms and languages.&lt;br /&gt;
* Page Info - Splits out the Forms in a target page, as well as the source for internal and external Scripts.&lt;br /&gt;
* IP Encoder/Decoder - Go to/from IP, Dword, Hex and Octal addresses.&lt;br /&gt;
* String Generator - Create alpha(i), numeric(1) or special(!) strings of almost any length.&lt;br /&gt;
* Scroogle Search - A privacy-friendly scrape of Google results w/Advanced Operators.&lt;br /&gt;
* Testing Checklist - Collection of testing ideas for assessments.&lt;br /&gt;
* Save State/Load State - Allows you to save CAL9000 textarea and text field contents and reload them when you are ready to resume testing.&lt;br /&gt;
* Selected Text Processing - Allows you to process selected text inside of a textarea instead of the entire contents of a textarea.&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
LATEST RELEASE - Version 1.1 released July 30, 2006. See the [[OWASP CAL9000 Project Roadmap]] for details.&lt;br /&gt;
&lt;br /&gt;
* RightClick [http://www.digilantesecurity.com/CAL9000/files/CAL9000.zip here] to download the CAL9000 tool.&lt;br /&gt;
* RightClick [http://ha.ckers.org/xssAttacks.xml here] to download the latest XSS Attack List XML file from [http://ha.ckers.org/xss.html RSnake's site]. Replace the file of the same name in your &amp;amp;quot;CAL9000/files/xml/&amp;amp;quot; folder.&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
Chris Loomis wrote the CAL9000 tool and currently leads the project. Any and all questions, comments or suggestions are welcome and may be directed [mailto:cal9000tool@mac.com here] or submitted via the [http://lists.owasp.org/mailman/listinfo/owasp-cal9000 mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to everyone who has emailed me their comments and great suggestions for enhancing CAL9000. Keep the ideas coming! Special thanks to Achim Hoffmann for his significant contributions of code and time to the project.&lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation: ==&lt;br /&gt;
&lt;br /&gt;
We hope you find the OWASP CAL9000 Project useful. Please contribute to the Project by volunteering for one of the Tasks, sending your comments, questions, and suggestions to owasp@owasp.org.  To join the OWASP CAL9000 Project mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-cal9000 subscription page.]&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Cal9000</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=12658</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=12658"/>
				<updated>2006-11-15T03:51:55Z</updated>
		
		<summary type="html">&lt;p&gt;Cal9000: /* Project Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
[[Image:xssAttacks.jpg|thumb|300px|right|CAL9000 in action]]&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
CAL9000 brings together a host of web application security testing tools into one convenient package. It is designed to be used in the Firefox browser. CAL9000 functionality may be limited when used with other browsers.&lt;br /&gt;
&lt;br /&gt;
CAL9000 is written in Javascript, so you have full access to the source code. Feel free to modify it to best suit your particular needs. CAL9000 has some powerful features(like executing cross-domain XMLHttpRequests and writing to disk). It is purposefully designed to do some horribly insecure things. Therefore, I would strongly encourage that you only run it locally and NOT off of a web server.&lt;br /&gt;
&lt;br /&gt;
While using CAL9000, the Firefox browser may pop up windows asking you to grant exceptions to its security policy. These are normal and may be safely accepted. If you are reluctant to approve these requests, you can review the source code until you are comfortable with CAL9000's functionality. I can say with reasonable certainty that CAL9000 will not go crazy and try to kill you.&lt;br /&gt;
&lt;br /&gt;
Please only use this tool for testing your own applications or those that you have been authorized to test.&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* XSS Attacks - This is a library of the XSS Attack Info from [http://ha.ckers.org/xss.html RSnake]. You can also try testing the various attacks or using RegEx filters against them.&lt;br /&gt;
* Character Encoder/Decoder - Encodes and decodes the following types: URL, Standard Hex, Unicode, Html(Named), Html(Decimal), Html(Hex), Html(Hex Long), Javascript Escaped, XML Escaped, Straight Decimal, Straight Hex, IE Hex, IE Unicode, Base64 and MD5. Specify Upper/Lowercase, Delimiters and Trailing Characters. You can add/remove wrappers around your results and encode/decode selected text instead of the entire contents of the window.&lt;br /&gt;
* Simple Http Requests - Send GET, POST, HEAD, TRACE, OPTIONS, PUT and DELETE requests and see the results.&lt;br /&gt;
* Scratchpad - A place to save code snippets, notes, results, etc.&lt;br /&gt;
* Cheatsheets - Collection of references for various web-related platforms and languages.&lt;br /&gt;
* Page Info - Splits out the Forms in a target page, as well as the source for internal and external Scripts.&lt;br /&gt;
* IP Encoder/Decoder - Go to/from IP, Dword, Hex and Octal addresses.&lt;br /&gt;
* String Generator - Create alpha(i), numeric(1) or special(!) strings of almost any length.&lt;br /&gt;
* Scroogle Search - A privacy-friendly scrape of Google results w/Advanced Operators.&lt;br /&gt;
* Testing Checklist - Collection of testing ideas for assessments.&lt;br /&gt;
* Save State/Load State - Allows you to save CAL9000 textarea and text field contents and reload them when you are ready to resume testing.&lt;br /&gt;
* Selected Text Processing - Allows you to process selected text inside of a textarea instead of the entire contents of a textarea.&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
LATEST RELEASE - Version 1.1 released July 30, 2006. See the [[OWASP CAL9000 Project Roadmap]] for details.&lt;br /&gt;
&lt;br /&gt;
* RightClick [http://www.digilantesecurity.com/CAL9000/files/CAL9000.zip here] to download the CAL9000 tool.&lt;br /&gt;
* RightClick [http://ha.ckers.org/xssAttacks.xml here] to download the latest XSS Attack List XML file from [http://ha.ckers.org/xss.html RSnake's site]. Replace the file of the same name in your &amp;amp;quot;CAL9000/files/xml/&amp;amp;quot; folder.&lt;br /&gt;
&lt;br /&gt;
The online help for CAL9000 can be found [http://www.digilantesecurity.com/CAL9000/help.html here].&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
Chris Loomis wrote the CAL9000 tool and currently leads the project. Any and all questions, comments or suggestions are welcome and may be directed [mailto:cal9000tool@mac.com here] or submitted via the [http://lists.owasp.org/mailman/listinfo/owasp-cal9000 mailing list].&lt;br /&gt;
&lt;br /&gt;
Thanks to everyone who has emailed me their comments and great suggestions for enhancing CAL9000. Keep the ideas coming! Special thanks to Achim Hoffmann for his significant contributions of code and time to the project.&lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation: ==&lt;br /&gt;
&lt;br /&gt;
We hope you find the OWASP CAL9000 Project useful. Please contribute to the Project by volunteering for one of the Tasks, sending your comments, questions, and suggestions to owasp@owasp.org.  To join the OWASP CAL9000 Project mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-cal9000 subscription page.]&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Cal9000</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_CAL9000_Project_Roadmap&amp;diff=12657</id>
		<title>OWASP CAL9000 Project Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_CAL9000_Project_Roadmap&amp;diff=12657"/>
				<updated>2006-11-15T03:42:30Z</updated>
		
		<summary type="html">&lt;p&gt;Cal9000: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Provide a centralized framework for the organization and use of a variety of tools that can&lt;br /&gt;
  assist web application security testers with their manual testing efforts.&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Gathering user feedback.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Version History ==&lt;br /&gt;
&lt;br /&gt;
Nov 15, 2006 - v2.0:&lt;br /&gt;
* XSS Attacks Page:&lt;br /&gt;
** Filter attacks by browser support&lt;br /&gt;
** Create/edit/save/delete your own attacks&lt;br /&gt;
** Display user-defined attacks in print-ready list&lt;br /&gt;
** Expanded Regex functionality - Added show/replace/split on matches&lt;br /&gt;
* Encoder/Decoder:&lt;br /&gt;
** Added types md4 and sha1 (encode only)&lt;br /&gt;
** Define Base64 special characters and padding character&lt;br /&gt;
* HTTP Requests:&lt;br /&gt;
** Added (almost) total control of request components&lt;br /&gt;
** Quickly add request headers (single, by browser, by method)&lt;br /&gt;
** Split/concatenate request parameters and get character count&lt;br /&gt;
** Added AutoAttack feature (send multiple requests at once)&lt;br /&gt;
** Quick encode request components (Url, hex, Unicode, Base64, md5)&lt;br /&gt;
** Requests/responses saved to History file&lt;br /&gt;
** Added History list navigation and functions (delete, print-ready)&lt;br /&gt;
* HTTP Responses:&lt;br /&gt;
** Displays target Url, response status codes, headers and body&lt;br /&gt;
** Split out scripts, forms and cookies&lt;br /&gt;
** Display request body in new window as it would appear in browser&lt;br /&gt;
** Added History list navigation and functions (delete, print-ready)&lt;br /&gt;
* String Generator:&lt;br /&gt;
** Define character used for string generation&lt;br /&gt;
* Testing Checklist:&lt;br /&gt;
** Old testing checklist included as testing tips&lt;br /&gt;
** Added true testing checklist - Create/edit/save/delete checklist items&lt;br /&gt;
* AutoAttack List Editor:&lt;br /&gt;
** Create/edit/save/delete attack lists and items&lt;br /&gt;
** Display attack lists in print-ready format&lt;br /&gt;
** Quick encode checklist items (Url, hex, Unicode, Base64, md5)&lt;br /&gt;
&lt;br /&gt;
July 30, 2006 - v1.1:&lt;br /&gt;
* Focus of this Release: Upgrade Encode/Decode function.&lt;br /&gt;
* Added Uppercase check box&lt;br /&gt;
* Added Trailing Character text field&lt;br /&gt;
* Added Delimiter text field&lt;br /&gt;
* Added Include Unselected Text check box&lt;br /&gt;
* Added Wrappers&lt;br /&gt;
* Added several Encoding/Decoding types&lt;br /&gt;
* Added ability to Encode/Decode selected text only&lt;br /&gt;
* Added Store/Restore functionality&lt;br /&gt;
* Added Selected Text processing&lt;br /&gt;
* Added Error/Informational Message functionality&lt;br /&gt;
* String Generator can handle larger string sizes&lt;br /&gt;
* Minor Bugfixes w/ URL Encoding&lt;br /&gt;
* Minor Bugfixes w/ Save State processing&lt;br /&gt;
&lt;br /&gt;
May 18, 2006 - v1.0.&lt;br /&gt;
&lt;br /&gt;
== Wish List ==&lt;br /&gt;
* What features would you like to see added?&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP CAL9000 Project]]&lt;/div&gt;</summary>
		<author><name>Cal9000</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_CAL9000_Project_Roadmap&amp;diff=12656</id>
		<title>OWASP CAL9000 Project Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_CAL9000_Project_Roadmap&amp;diff=12656"/>
				<updated>2006-11-15T03:40:54Z</updated>
		
		<summary type="html">&lt;p&gt;Cal9000: /* Version History */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Provide a centralized framework for the organization and use of a variety of tools that can&lt;br /&gt;
  assist web application security testers with their manual testing efforts.&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Implementing major upgrade to the HTTP Requests function.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Version History ==&lt;br /&gt;
&lt;br /&gt;
Nov 15, 2006 - v2.0:&lt;br /&gt;
* XSS Attacks Page:&lt;br /&gt;
** Filter attacks by browser support&lt;br /&gt;
** Create/edit/save/delete your own attacks&lt;br /&gt;
** Display user-defined attacks in print-ready list&lt;br /&gt;
** Expanded Regex functionality - Added show/replace/split on matches&lt;br /&gt;
* Encoder/Decoder:&lt;br /&gt;
** Added types md4 and sha1 (encode only)&lt;br /&gt;
** Define Base64 special characters and padding character&lt;br /&gt;
* HTTP Requests:&lt;br /&gt;
** Added (almost) total control of request components&lt;br /&gt;
** Quickly add request headers (single, by browser, by method)&lt;br /&gt;
** Split/concatenate request parameters and get character count&lt;br /&gt;
** Added AutoAttack feature (send multiple requests at once)&lt;br /&gt;
** Quick encode request components (Url, hex, Unicode, Base64, md5)&lt;br /&gt;
** Requests/responses saved to History file&lt;br /&gt;
** Added History list navigation and functions (delete, print-ready)&lt;br /&gt;
* HTTP Responses:&lt;br /&gt;
** Displays target Url, response status codes, headers and body&lt;br /&gt;
** Split out scripts, forms and cookies&lt;br /&gt;
** Display request body in new window as it would appear in browser&lt;br /&gt;
** Added History list navigation and functions (delete, print-ready)&lt;br /&gt;
* String Generator:&lt;br /&gt;
** Define character used for string generation&lt;br /&gt;
* Testing Checklist:&lt;br /&gt;
** Old testing checklist included as testing tips&lt;br /&gt;
** Added true testing checklist - Create/edit/save/delete checklist items&lt;br /&gt;
* AutoAttack List Editor:&lt;br /&gt;
** Create/edit/save/delete attack lists and items&lt;br /&gt;
** Display attack lists in print-ready format&lt;br /&gt;
** Quick encode checklist items (Url, hex, Unicode, Base64, md5)&lt;br /&gt;
&lt;br /&gt;
July 30, 2006 - v1.1:&lt;br /&gt;
* Focus of this Release: Upgrade Encode/Decode function.&lt;br /&gt;
* Added Uppercase check box&lt;br /&gt;
* Added Trailing Character text field&lt;br /&gt;
* Added Delimiter text field&lt;br /&gt;
* Added Include Unselected Text check box&lt;br /&gt;
* Added Wrappers&lt;br /&gt;
* Added several Encoding/Decoding types&lt;br /&gt;
* Added ability to Encode/Decode selected text only&lt;br /&gt;
* Added Store/Restore functionality&lt;br /&gt;
* Added Selected Text processing&lt;br /&gt;
* Added Error/Informational Message functionality&lt;br /&gt;
* String Generator can handle larger string sizes&lt;br /&gt;
* Minor Bugfixes w/ URL Encoding&lt;br /&gt;
* Minor Bugfixes w/ Save State processing&lt;br /&gt;
&lt;br /&gt;
May 18, 2006 - v1.0.&lt;br /&gt;
&lt;br /&gt;
== Wish List ==&lt;br /&gt;
* What features would you like to see added?&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP CAL9000 Project]]&lt;/div&gt;</summary>
		<author><name>Cal9000</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_CAL9000_Project_Roadmap&amp;diff=12655</id>
		<title>OWASP CAL9000 Project Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_CAL9000_Project_Roadmap&amp;diff=12655"/>
				<updated>2006-11-15T03:27:21Z</updated>
		
		<summary type="html">&lt;p&gt;Cal9000: /* Wish List */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Provide a centralized framework for the organization and use of a variety of tools that can&lt;br /&gt;
  assist web application security testers with their manual testing efforts.&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Implementing major upgrade to the HTTP Requests function.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Version History ==&lt;br /&gt;
&lt;br /&gt;
July 30, 2006 - v1.1:&lt;br /&gt;
* Focus of this Release: Upgrade Encode/Decode function.&lt;br /&gt;
* Added Uppercase check box&lt;br /&gt;
* Added Trailing Character text field&lt;br /&gt;
* Added Delimiter text field&lt;br /&gt;
* Added Include Unselected Text check box&lt;br /&gt;
* Added Wrappers&lt;br /&gt;
* Added several Encoding/Decoding types&lt;br /&gt;
* Added ability to Encode/Decode selected text only&lt;br /&gt;
* Added Store/Restore functionality&lt;br /&gt;
* Added Selected Text processing&lt;br /&gt;
* Added Error/Informational Message functionality&lt;br /&gt;
* String Generator can handle larger string sizes&lt;br /&gt;
* Minor Bugfixes w/ URL Encoding&lt;br /&gt;
* Minor Bugfixes w/ Save State processing&lt;br /&gt;
&lt;br /&gt;
May 18, 2006 - v1.0. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Wish List ==&lt;br /&gt;
* What features would you like to see added?&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP CAL9000 Project]]&lt;/div&gt;</summary>
		<author><name>Cal9000</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_CAL9000_Project_Roadmap&amp;diff=8451</id>
		<title>OWASP CAL9000 Project Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_CAL9000_Project_Roadmap&amp;diff=8451"/>
				<updated>2006-07-31T14:47:08Z</updated>
		
		<summary type="html">&lt;p&gt;Cal9000: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The project's overall goal is to...&lt;br /&gt;
&lt;br /&gt;
  Provide a centralized framework for the organization and use of a variety of tools that can&lt;br /&gt;
  assist web application security testers with their manual testing efforts.&lt;br /&gt;
&lt;br /&gt;
In the near term, we are focused on the following tactical goals...&lt;br /&gt;
&lt;br /&gt;
# Implementing major upgrade to the HTTP Requests function.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Version History ==&lt;br /&gt;
&lt;br /&gt;
July 30, 2006 - v1.1:&lt;br /&gt;
* Focus of this Release: Upgrade Encode/Decode function.&lt;br /&gt;
* Added Uppercase check box&lt;br /&gt;
* Added Trailing Character text field&lt;br /&gt;
* Added Delimiter text field&lt;br /&gt;
* Added Include Unselected Text check box&lt;br /&gt;
* Added Wrappers&lt;br /&gt;
* Added several Encoding/Decoding types&lt;br /&gt;
* Added ability to Encode/Decode selected text only&lt;br /&gt;
* Added Store/Restore functionality&lt;br /&gt;
* Added Selected Text processing&lt;br /&gt;
* Added Error/Informational Message functionality&lt;br /&gt;
* String Generator can handle larger string sizes&lt;br /&gt;
* Minor Bugfixes w/ URL Encoding&lt;br /&gt;
* Minor Bugfixes w/ Save State processing&lt;br /&gt;
&lt;br /&gt;
May 18, 2006 - v1.0. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Wish List ==&lt;br /&gt;
* Build/save/replay attack and processing sequences.&lt;br /&gt;
* Sort/view XSS Attacks by affected browser type.&lt;br /&gt;
* CAL9000 Editor: Front end to add/remove/edit XSS Attacks, Wrappers, Testing Tips, etc.&lt;br /&gt;
* Save HTTP Requests/Responses to XML file for viewing/replay.&lt;br /&gt;
* More robust Regex builder/tester.&lt;br /&gt;
* CAL9000 Report Builder.&lt;br /&gt;
* What features would you like to see added?&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP CAL9000 Project]]&lt;/div&gt;</summary>
		<author><name>Cal9000</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=8449</id>
		<title>Category:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_CAL9000_Project&amp;diff=8449"/>
				<updated>2006-07-31T14:31:23Z</updated>
		
		<summary type="html">&lt;p&gt;Cal9000: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to the OWASP CAL9000 project...'''&lt;br /&gt;
[[Image:xssAttacks.jpg|thumb|300px|right|CAL9000 in action]]&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
CAL9000 brings together a host of web application security testing tools into one convenient package. It is designed to be used in the Firefox browser. CAL9000 functionality may be limited when used with other browsers.&lt;br /&gt;
&lt;br /&gt;
CAL9000 is written in Javascript, so you have full access to the source code. Feel free to modify it to best suit your particular needs. CAL9000 has some powerful features(like executing cross-domain XMLHttpRequests and writing to disk). It is purposefully designed to do some horribly insecure things. Therefore, I would strongly encourage that you only run it locally and NOT off of a web server.&lt;br /&gt;
&lt;br /&gt;
While using CAL9000, the Firefox browser may pop up windows asking you to grant exceptions to its security policy. These are normal and may be safely accepted. If you are reluctant to approve these requests, you can review the source code until you are comfortable with CAL9000's functionality. I can say with reasonable certainty that CAL9000 will not go crazy and try to kill you.&lt;br /&gt;
&lt;br /&gt;
Please only use this tool for testing your own applications or those that you have been authorized to test.&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* XSS Attacks - This is a library of the XSS Attack Info from [http://ha.ckers.org/xss.html RSnake]. You can also try testing the various attacks or using RegEx filters against them.&lt;br /&gt;
* Character Encoder/Decoder - Encodes and decodes the following types: URL, Standard Hex, Unicode, Html(Named), Html(Decimal), Html(Hex), Html(Hex Long), Javascript Escaped, XML Escaped, Straight Decimal, Straight Hex, IE Hex, IE Unicode, Base64 and MD5. Specify Upper/Lowercase, Delimiters and Trailing Characters. You can add/remove wrappers around your results and encode/decode selected text instead of the entire contents of the window.&lt;br /&gt;
* Simple Http Requests - Send GET, POST, HEAD, TRACE, OPTIONS, PUT and DELETE requests and see the results.&lt;br /&gt;
* Scratchpad - A place to save code snippets, notes, results, etc.&lt;br /&gt;
* Cheatsheets - Collection of references for various web-related platforms and languages.&lt;br /&gt;
* Page Info - Splits out the Forms in a target page, as well as the source for internal and external Scripts.&lt;br /&gt;
* IP Encoder/Decoder - Go to/from IP, Dword, Hex and Octal addresses.&lt;br /&gt;
* String Generator - Create alpha(i), numeric(1) or special(!) strings of almost any length.&lt;br /&gt;
* Scroogle Search - A privacy-friendly scrape of Google results w/Advanced Operators.&lt;br /&gt;
* Testing Checklist - Collection of testing ideas for assessments.&lt;br /&gt;
* Save State/Load State - Allows you to save CAL9000 textarea and text field contents and reload them when you are ready to resume testing.&lt;br /&gt;
* Selected Text Processing - Allows you to process selected text inside of a textarea instead of the entire contents of a textarea.&lt;br /&gt;
&lt;br /&gt;
== Downloads ==&lt;br /&gt;
&lt;br /&gt;
LATEST RELEASE - Version 1.1 released July 30, 2006. See the [[OWASP CAL9000 Project Roadmap]] for details.&lt;br /&gt;
&lt;br /&gt;
* RightClick [http://www.digilantesecurity.com/CAL9000/files/CAL9000.zip here] to download the CAL9000 tool.&lt;br /&gt;
* RightClick [http://ha.ckers.org/xssAttacks.xml here] to download the latest XSS Attack List XML file from [http://ha.ckers.org/xss.html RSnake's site]. Replace the file of the same name in your &amp;amp;quot;CAL9000/files/xml/&amp;amp;quot; folder.&lt;br /&gt;
&lt;br /&gt;
The online help for CAL9000 can be found [http://www.digilantesecurity.com/CAL9000/help.html here].&lt;br /&gt;
&lt;br /&gt;
== Project Contributors ==&lt;br /&gt;
&lt;br /&gt;
Chris Loomis wrote the CAL9000 tool and currently leads the project. Any and all questions, comments or suggestions are welcome and may be directed [mailto:cal9000tool@mac.com here] or submitted via the Discussion Tab above. &lt;br /&gt;
&lt;br /&gt;
Thanks to everyone who has emailed me their comments and great suggestions for enhancing CAL9000. Keep the ideas coming! Special thanks to Achim Hoffmann for his significant contributions of code and time to the project.&lt;br /&gt;
&lt;br /&gt;
== Roadmap ==&lt;br /&gt;
Please refer to the [[OWASP CAL9000 Project Roadmap]] for current tasks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;/div&gt;</summary>
		<author><name>Cal9000</name></author>	</entry>

	</feed>