<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Clerkendweller</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Clerkendweller"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Clerkendweller"/>
		<updated>2026-04-26T00:15:36Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Snakes_and_Ladders&amp;diff=249168</id>
		<title>OWASP Snakes and Ladders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Snakes_and_Ladders&amp;diff=249168"/>
				<updated>2019-03-22T09:45:59Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: Added note about missing mailing list&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders-header.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Snakes and Ladders==&lt;br /&gt;
&lt;br /&gt;
Snakes and Ladders is an educational project. It uses gamification to promote awareness of application security controls and risks, and in particular knowledge of other OWASP documents and tools.&lt;br /&gt;
&lt;br /&gt;
== Editions==&lt;br /&gt;
&lt;br /&gt;
''Web Applications''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;div style=&amp;quot;height:75px;max-width:375px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_webapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;--&amp;gt;In the board game for {{#switchtablink:Web Applications Edition|web applications}}, the virtuous behaviours (ladders) are secure coding practices (from [[OWASP Proactive Controls|OWASP Proactive Controls project]] 2014-2018) and the vices (snakes) are application security risks (from [[:Category:OWASP Top Ten Project|OWASP Top Ten Project]] 2013-2017). See also a [https://www.owasp.org/index.php/OWASP_Proactive_Controls#tab=Top_Ten_Mapping mapping between these two lists].&lt;br /&gt;
&lt;br /&gt;
''Mobile Apps''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;div style=&amp;quot;height:75px;max-width:375px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_mobapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;--&amp;gt;The identical board game for {{#switchtablink:Mobile Apps Edition|mobile apps}} uses mobile controls (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Controls Mobile Security Project Top Ten Controls] 2013) as the virtuous behaviours and mobile risks (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks Top Ten Mobile Risks] 2014 from the same project) as the vices.&lt;br /&gt;
&lt;br /&gt;
== Background ==&lt;br /&gt;
&lt;br /&gt;
This board game was created to use as an ice-breaker in application security training, but it potentially has wider appeal simply as a promotional hand-out, and maybe also more usefully as learning materials for younger coders. To cover all of that, we use the phrase &amp;quot;OWASP Snakes and Ladders is meant to be used by software programmers, big and small&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The game is quite lightweight, and does not have the same rigour or depth as the card game Cornucopia, but it is meant to be just some fun with some learning attached.&lt;br /&gt;
&lt;br /&gt;
Print-ready PDFs have been published - these are poster sized A2 (international ISO 216 [https://en.wikipedia.org/wiki/Paper_size paper size] 420×594mm, approximately 16.5×23.4in, with 3mm bleed and printers' marks). But the original files are in Adobe Illustrator, so these are also available for anyone to use and improve upon. We recommend playing using a real die and counters (markers), but you can cut out and make these from the paper sheet itself if you have scissor and glue skills.&lt;br /&gt;
&lt;br /&gt;
We hope it may be of use in any upcoming office party, celebration, festival, seasonal event, application security awareness or training exercise. Or just to help spread the word about controls and risks at work, at college or at school. If you are training anyone about the OWASP Top Ten, OWASP Proactive Controls or the OWASP Mobile projects, please consider giving each attendee a printed copy of the game as a take away.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP Snakes and Ladders is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [https://www.owasp.org/index.php/OWASP_Cornucopia OWASP Cornucopia], [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game], [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is This? ==&lt;br /&gt;
&lt;br /&gt;
Snakes and Ladders is a popular board game, with [http://en.wikipedia.org/wiki/Snakes_and_Ladders ancient provenance] imported into [http://sandradodd.com/game/snakesandladders Great Britain from Asia] in the 19th century. The original game showed the effects of good and evil, or virtues and vices. This OWASP game is a poster-sized ''print-your-own'' paper sheet with the game board on it. Just get some players together with a die and counters. The virtues are application security controls, and the vices are risks.&lt;br /&gt;
&lt;br /&gt;
==How to Play==&lt;br /&gt;
&lt;br /&gt;
* The game is for 2-6 players. &lt;br /&gt;
* Firstly print the sheet out.&lt;br /&gt;
* Give each player a coloured counter (marker). To begin, each player should throw the die to determine who plays first; the highest can lead.&lt;br /&gt;
* Put all the players' counters onto the first square labelled “Start 1”.&lt;br /&gt;
* In turn, each player rolls the die and moves their counter by the number of squares indicated on the die. At the end of the move, if a player’s counter is at the bottom end of a ladder, the counter must be moved up the ladder to the square at its higher end. Conversely, if the player’s counter is located at the mouth of a snake, the counter must be moved down to the end of the snake’s tail.&lt;br /&gt;
* ''As a better alternative to enhance learning, either require the participants to discuss the risk/control when a player reaches each square, or only allow players to climb up a ladder after a quest about the control (e.g. simply describing the control, explain the risk (one example) the named control addresses and how the control (one example) could help prevent the named it''&lt;br /&gt;
*The first player to reach “100” at the top left wins. Give a prize.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Katyanton Katy Anton] [mailto:katy.anton@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Proactive Controls]]&lt;br /&gt;
* [[:Category:OWASP Top Ten Project|OWASP Top Ten]]&lt;br /&gt;
* [[OWASP Mobile Security Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*  Web Applications v1.0/v1.1&lt;br /&gt;
** [[media:OWASP-SnakesAndLadders-WebApplications-BR.pdf|BR]], [[media:OWASP-SnakesAndLadders-WebApplications-DE.pdf|DE]], [[media:OWASP-SnakesAndLadders-WebApplications-EN.pdf|EN]], [[media:OWASP-SnakesAndLadders-WebApplications-ES.pdf|ES]], [[media:OWASP-SnakesAndLadders-WebApplications-FR.pdf|FR]], [[media:OWASP-SnakesAndLadders-WebApplications-JA.pdf|JA]],  [[media:OWASP-SnakesAndLadders-WebApplications-TR.pdf|TR]], [[media:OWASP-SnakesAndLadders-WebApplications-ZH.pdf|ZH]]&lt;br /&gt;
** {{#switchtablink:Web Applications Edition|More options...}}&lt;br /&gt;
&lt;br /&gt;
*  Mobile Apps v1.0&lt;br /&gt;
** [[media:OWASP-SnakesAndLadders-MobileApps-EN.pdf|EN]], [[media:OWASP-SnakesAndLadders-MobileApps-JA.pdf|JA]]&lt;br /&gt;
** {{#switchtablink:Mobile Apps Edition|More options...}}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [09 May 2018] Web Applications v1.20 released in EN&lt;br /&gt;
* [12 May 2017] Web Applications TR&lt;br /&gt;
* [30 Jun 2016] Free copies at OWASP AppSec EU Rome 2017&lt;br /&gt;
* [05 Jun 2016] Web Applications v1.10 released in EN&lt;br /&gt;
* [30 Dec 2015] Katy Anton becomes project co-leader&lt;br /&gt;
* [01 Dec 2015] Free copies at PHP North West user group&lt;br /&gt;
* [24 Nov 2015] Free copies at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [12 Oct 2015] Free copies at PHP Hampshire user group&lt;br /&gt;
* [29 Sep 2015] Web Application v1.0 released in PT-BR&lt;br /&gt;
* [19 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - Dutch translation&lt;br /&gt;
* [11 May 2015] Lightning talk at the [http://tickets.digitalshoreditch.com/make/#session-53 Digital Shoreditch Festival]&lt;br /&gt;
* [04 Dec 2014] Free copies at [https://www.owasp.org/index.php/London OWASP London]&lt;br /&gt;
* [02 Dec 2014] Free copies at [https://www.owasp.org/index.php/Cambridge OWASP Cambridge]&lt;br /&gt;
* [02 Dec 2014] Mobile Apps JA&lt;br /&gt;
* [25 Nov 2014] Web Applications FR, JA and ZH&lt;br /&gt;
* [31 Oct 2014] Web Applications v1.0 released in DE, EN and ES&lt;br /&gt;
* [31 Oct 2014] Mobile Apps v1.0 released in EN&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
&lt;br /&gt;
[[File:OWASPSnakesWeb-profile-small.jpg|link=]]&lt;br /&gt;
Follow two mock games running on Twitter:&lt;br /&gt;
* [https://twitter.com/OWASPSnakesWeb @OWASPSnakesWeb]&lt;br /&gt;
* [https://twitter.com/OWASPSnakesMob @OWASPSnakesMob]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Web Applications Edition =&lt;br /&gt;
&lt;br /&gt;
== OWASP Snakes and Ladders - Web Applications ==&lt;br /&gt;
&lt;br /&gt;
This was the first edition created. The objective is to raise awareness of the security controls that every web application should have, but link that with the much more widely known Top Ten Risks. The virtuous behaviours (ladders) are secure coding practices (from [[OWASP Proactive Controls|OWASP Proactive Controls project]] 2014-2018) and the vices (snakes) are application security risks (from [[:Category:OWASP Top Ten Project|OWASP Top Ten Project]] 2013-2017).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:539px;max-width:750px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Osn-poster-web-de.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Current Release ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| &lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-BR.pdf BR: Português Brasileiro]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-DE.pdf DE: Deutsch]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-EN.pdf EN: English]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-BR.png|link=File:OWASP-SnakesAndLadders-WebApplications-BR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-DE.png|link=File:OWASP-SnakesAndLadders-WebApplications-DE.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; |[[Image:Osn-webapp-EN.png|link=File:OWASP-SnakesAndLadders-WebApplications-EN.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpentes e Escadas&amp;lt;br&amp;gt;Aplicativos da Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Schlangen und Leitern&amp;lt;br&amp;gt;Web Anwendungen&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Snakes and Ladders&amp;lt;br&amp;gt;Web Applications&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-ES.pdf ES: Español]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-FR.pdf FR: Français]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-JA.pdf JA: 日本語]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-ES.png|link=File:OWASP-SnakesAndLadders-WebApplications-ES.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-FR.png|link=File:OWASP-SnakesAndLadders-WebApplications-FR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-JA.png|link=File:OWASP-SnakesAndLadders-WebApplications-JA.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpientes y Escaleras&amp;lt;br&amp;gt;Aplicaciones Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpents et Échelles&amp;lt;br&amp;gt;Application Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇とはしご&amp;lt;br&amp;gt;ウェブアプリケーション&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-TR.pdf TR: Türkçe]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-ZH.pdf ZH: 中文]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-TR.png|link=File:OWASP-SnakesAndLadders-WebApplications-TR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-ZH.png|link=File:OWASP-SnakesAndLadders-WebApplications-ZH.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Yılanlar ve Merdivenler&amp;lt;br&amp;gt;Web Uygulamaları&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇梯棋&amp;lt;br&amp;gt;WEB应用程序&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Note that some languages choose not to change the EN text for risk and control names.&lt;br /&gt;
&lt;br /&gt;
([https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-Illustrator.zip Source Adobe Illustrator file])&lt;br /&gt;
&lt;br /&gt;
== Release History ==&lt;br /&gt;
&lt;br /&gt;
* [09 May 2018] 1.2 - EN version updated&lt;br /&gt;
* [12 May 2017] 1.11 - TR version release&lt;br /&gt;
* [15 Jun 2016] 1.1 - EN version updated&lt;br /&gt;
* [29 Sep 2015] 1.0.2 - BR version release&lt;br /&gt;
* [25 Nov 2014] 1.0.2 - Additional contributors added, FR, JA and ZH versions released&lt;br /&gt;
* [05 Nov 2014] 1.0.1 - Correction to paths in source Illustrator file; PDFs regenerated&lt;br /&gt;
* [31 Oct 2014] 1.0 - First release&lt;br /&gt;
&lt;br /&gt;
== Colour Scheme 'Classic' ==&lt;br /&gt;
&lt;br /&gt;
This edition uses simple primary colours, like [https://search.disconnect.me/searchTerms/serp?search=c45431fe-9ce8-415a-ac25-1e511f45ef51 many versions] that can be seen in pictures of Snakes and Ladders games. The colours used in 'Classic' are:&lt;br /&gt;
&lt;br /&gt;
* Green&lt;br /&gt;
* Yellow&lt;br /&gt;
* White&lt;br /&gt;
* Red&lt;br /&gt;
* Blue&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:75px;max-width:100%;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_webapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The start square (1) is yellow and the final square (100) is red.&lt;br /&gt;
&lt;br /&gt;
= Mobile Apps Edition =&lt;br /&gt;
&lt;br /&gt;
== OWASP Snakes and Ladders - Mobile Apps ==&lt;br /&gt;
&lt;br /&gt;
The edition for Mobile Apps was created after working out the idea and design for the web application version of the board game. It seemed easy to replicate the idea since the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Project] lists both security controls and risks. The virtuous behaviours (ladders) are mobile controls (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Controls Mobile Security Project Top Ten Controls] 2013) and the vices (snakes) are mobile risks (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks Top Ten Mobile Risks] 2014).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:539px;max-width:750px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Osn-poster-mob-ja.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Current Release ==&lt;br /&gt;
&lt;br /&gt;
{| &lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-MobileApps-EN.pdf EN: English]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-JA.pdf JA: 日本語]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-mobapp-EN.png|link=File:OWASP-SnakesAndLadders-MobileApps-EN.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-mobapp-JA.png|link=File:OWASP-SnakesAndLadders-MobileApps-JA.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Snakes and Ladders&amp;lt;br&amp;gt;Mobile Apps&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇とはしご&amp;lt;br&amp;gt; モバイルアプリ版&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
([https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-MobileApps-Illustrator.zip Source Adobe Illustrator file])&lt;br /&gt;
&lt;br /&gt;
== Release History ==&lt;br /&gt;
&lt;br /&gt;
* [02 Dec 2014] 1.0.2 - Additional contributor added, JA version released&lt;br /&gt;
* [05 Nov 2014] 1.0.1 - Correction to paths in source Illustrator file; EN PDF regenerated&lt;br /&gt;
* [31 Oct 2014] 1.0 - First release&lt;br /&gt;
&lt;br /&gt;
== Colour Scheme 'Farringdon' ==&lt;br /&gt;
&lt;br /&gt;
Other people's versions of Snakes and Ladders [https://search.disconnect.me/searchTerms/serp?search=c45431fe-9ce8-415a-ac25-1e511f45ef51 use a wide variety of designs and colour schemes]. Thus to make a complete contrast to the edition for web applications, the colours used are the designatory colours of the underground and mainline train services that run through Colin Watson's local station at Farringdon in Clerkenwell, London EC1. The colours in 'Farringdon' are:&lt;br /&gt;
&lt;br /&gt;
* Purple (future &amp;lt;strike&amp;gt;Crossrail&amp;lt;/strike&amp;gt; Elizabeth)&lt;br /&gt;
* Yellow (Circle)&lt;br /&gt;
* White (Thameslink)&lt;br /&gt;
* Maroon (Metropolitan)&lt;br /&gt;
* Pink (Hammersmith &amp;amp; City)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:75px;max-width:100%;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_mobapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can see these colours on [https://www.tfl.gov.uk/assets/downloads/standard-tube-map.pdf tube maps] and station signage. The start square (1) is yellow and the final square (100) is maroon.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Snakesandladders-mockup.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Why Snakes &amp;amp; Ladders? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well known document, but OWASP has many other resources which provide better approaches for secure application development. In particular, there are some &amp;quot;top 10 controls&amp;quot; lists, and I wanted to highlight those. Creating a board game that features both risks and controls is a simple way to compare and contrast these aspects.&lt;br /&gt;
&lt;br /&gt;
Players do not need to know either the risks or controls on the lists, since they are just the decoration to what is otherwise standard Snakes &amp;amp; Ladders. But as players land on assigned squares, this can be used to discuss the risks and controls they are labelled with.&lt;br /&gt;
&lt;br /&gt;
Also, after undertaking some due diligence, it was noted that since Snakes &amp;amp; Ladders is such an ancient game it is not anyone's intellectual property and many others have already created thousands of different designs and versions. Other games would not meet this requirement.&lt;br /&gt;
&lt;br /&gt;
==How was the game created?==&lt;br /&gt;
By hard work! Each list of risks and controls contains ten items, so the rough layout of snakes and ladder starting and end points was sketched out on paper, as shown for web applications on the right. Instructional text was written.&lt;br /&gt;
&lt;br /&gt;
The concept was then converted into a layered Adobe Illustrator file, and the text and graphics added. This design went through a number of iterations to ensure it was legible and appealing. The PDF was exported and both the PDF and AI files added to the project page. When translations were provided, these were added as separate text layers in the source Illustrator file, and then new files uploaded again to the project.&lt;br /&gt;
&lt;br /&gt;
Once Web Applications Snakes &amp;amp; Ladders was complete, the file was duplicated and edited for Mobile Apps. This has different risks, controls and arrangement of snakes and ladders. It also has its own colour scheme.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader aware of your available time to contribute to the project. It is also important to let the Leader know how you would like to contribute and pitch in to help the project meet its goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. Please see the {{#switchtablink:Road Map_and Getting Involved|road map and getting involved section}}&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for users, translators and people to promote the project. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Snakes and Ladders is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Ziyahan Albeniz&lt;br /&gt;
* Kembolle Amilkar&lt;br /&gt;
* Katy Anton&lt;br /&gt;
* Manuel Lopez Arredondo&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Álan Carlos B. Eufrázio&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Martin Haslinger&lt;br /&gt;
* Yongliang He&lt;br /&gt;
* Manfred Hofmeier&lt;br /&gt;
* Cédric Messeguer&lt;br /&gt;
* Takanori Nakanowatari&lt;br /&gt;
* Marcos Vinícius Nunes de Arruda&lt;br /&gt;
* Riotaro Okada&lt;br /&gt;
* Gabriel Pedro S. Peres&lt;br /&gt;
* Alison S. Ribeiro&lt;br /&gt;
* Ivy Zhang&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* The project leaders and contributors to the referenced controls and risks:&lt;br /&gt;
** [[OWASP Proactive Controls]]&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Top Ten]]&lt;br /&gt;
** [[OWASP Mobile Security Project|OWASP Mobile Security]]&lt;br /&gt;
* OWASP staff for helping to set up the project and support its ongoing activities.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Recently completed:&lt;br /&gt;
* Update web applications edition to Proactive Controls 2018 [EN recently completed]&lt;br /&gt;
* Translate into other languages [TR recently completed]&lt;br /&gt;
* Handouts at events&lt;br /&gt;
&lt;br /&gt;
As of May 2018, the priorities are:&lt;br /&gt;
* Update as other referenced projects updated (e.g. Top Ten)&lt;br /&gt;
&lt;br /&gt;
Other ideas are:&lt;br /&gt;
&lt;br /&gt;
* Promote use of Snakes and Ladders &lt;br /&gt;
* Develop other boards&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Snakes and Ladders is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help are listed below.&lt;br /&gt;
&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Snakes and Ladders into that language?&lt;br /&gt;
&lt;br /&gt;
The project is on [https://crowdin.com/project/owasp-snakes-and-ladders Crowdin]&lt;br /&gt;
&lt;br /&gt;
==Use and Promote the Board Game==&lt;br /&gt;
Please help raise awareness of Snakes and Ladders:&lt;br /&gt;
* Use the game with your colleagues, friends, families, students and children&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a multi-user mobile app or web application to play the game&lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
'''22 Mar 2019 - awaiting setup of mailing list replacement'''&lt;br /&gt;
&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_snakes_and_ladders project mailing list] for feedback:&lt;br /&gt;
* How did you use it?&lt;br /&gt;
* What is people's reaction?&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What doesn't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other boards would you like to see?&lt;br /&gt;
&lt;br /&gt;
==Create a Board==&lt;br /&gt;
Do you have an idea for your own application security Snakes and Ladders board? Please contribute your ideas via the [https://lists.owasp.org/mailman/listinfo/owasp_snakes_and_ladders mailing list].&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=248630</id>
		<title>OWASP Automated Threats to Web Applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=248630"/>
				<updated>2019-03-11T21:36:52Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: Mailing list&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Automated-threats-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Automated Threats to Web Applications==&lt;br /&gt;
&lt;br /&gt;
The OWASP Automated Threats to Web Applications Project has completed a review of reports, academic and other papers, news stories and vulnerability taxonomies/listings to identify, name and classify these scenarios – automated by software causing a divergence from accepted behavior producing one or more undesirable effects on a web application, but excluding tool-based exploitation of single-issue vulnerabilities. The initial objective was to produce an ontology providing a common language for developers, architects, operators, business owners, security engineers, purchasers and suppliers/ vendors, to facilitate clear communication and help tackle the issues.&lt;br /&gt;
The project also identifies symptoms, mitigations and controls in this problem area. Like all OWASP outputs, everything is free and published using an open source license.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Automation-project-briefing.pdf Two page summary project briefing as a PDF].&lt;br /&gt;
&lt;br /&gt;
== Description==&lt;br /&gt;
&lt;br /&gt;
Web applications are subjected to unwanted automated usage – day in, day out. Often these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is commonly mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the primary intent. Frequently these have sector-specific names. Most of these problems seen regularly by web application owners are not listed in any OWASP Top Ten or other top issue list. Furthermore, they are not enumerated or defined adequately in existing dictionaries. These factors have contributed to inadequate visibility, and an inconsistency in naming such threats, with a consequent lack of clarity in attempts to address the issues.&lt;br /&gt;
&lt;br /&gt;
Without sharing a common language between devops, architects, business owners, security engineers, purchasers and suppliers/vendors, everyone has to make extra effort to communicate clearly. Misunderstandings can be costly. The adverse impacts affect the privacy and security of individuals as well as the security of the applications and related system components.&lt;br /&gt;
&lt;br /&gt;
== Automated Threats ==&lt;br /&gt;
&lt;br /&gt;
The list of threat events, defined more fully in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-020 Account Aggregation]]&lt;br /&gt;
* [[OAT-019 Account Creation]]&lt;br /&gt;
* [[OAT-003 Ad Fraud]]&lt;br /&gt;
* [[OAT-009 CAPTCHA Defeat]]&lt;br /&gt;
* [[OAT-010 Card Cracking]]&lt;br /&gt;
* [[OAT-001 Carding]]&lt;br /&gt;
* [[OAT-012 Cashing Out]]&lt;br /&gt;
* [[OAT-007 Credential Cracking]]&lt;br /&gt;
* [[OAT-008 Credential Stuffing]]&lt;br /&gt;
* [[OAT-021 Denial of Inventory]]&lt;br /&gt;
* [[OAT-015  Denial of Service]]&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-006 Expediting]]&lt;br /&gt;
* [[OAT-004 Fingerprinting]]&lt;br /&gt;
* [[OAT-018 Footprinting]]&lt;br /&gt;
* [[OAT-005 Scalping]]&lt;br /&gt;
* [[OAT-011 Scraping]]&lt;br /&gt;
* [[OAT-016 Skewing]]&lt;br /&gt;
* [[OAT-013 Sniping]]&lt;br /&gt;
* [[OAT-017 Spamming]]&lt;br /&gt;
* [[OAT-002 Token Cracking]]&lt;br /&gt;
* [[OAT-014 Vulnerability Scanning]]&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
Not sure which is which? Use the [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] in conjunction with the full [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
All the materials are free to use. They are licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What Is This? ==&lt;br /&gt;
&lt;br /&gt;
Information and resources to help web application owners defend against [[:Category:Automated Threat|automated threats]]&lt;br /&gt;
&lt;br /&gt;
== What Isn't It? ==&lt;br /&gt;
&lt;br /&gt;
* Not another vulnerability list&lt;br /&gt;
* Not an OWASP Top N List&lt;br /&gt;
* Not threat modelling&lt;br /&gt;
* Not attack trees&lt;br /&gt;
* Not non web&lt;br /&gt;
* Not non application&lt;br /&gt;
&lt;br /&gt;
==Project Objective==&lt;br /&gt;
&lt;br /&gt;
This project brings together research and analysis of real world automated attacks against web applications, to produce documentation to assist operators defend against these threats. Sector-specific guidance will be available.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Automatedthreats-presentation-small.jpg|link=media:Bots-AppSecUSA2017-Project-Summit.pptx]]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP WASC Web Hacking Incidents Database Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
* [[OWASP AppSensor Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP ModSecurity Core Rule Set Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Download the free handbook as a PDF]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [16 Feb 2018] OAT wiki pages created&lt;br /&gt;
* [15 Feb 2018] v1.2 Handbook published&lt;br /&gt;
* [25 Sep 2017] Promoted to Labs status&lt;br /&gt;
* [19-20 Sep 2017] Working session at the AppSecUSA 2017 Project Summit&lt;br /&gt;
* [15 May 2017] Draft feedback on Top Ten A7 shared&lt;br /&gt;
* [17 Apr 2017] [https://www.owasp.org/index.php/File:BadBots_OWASP_AppSec_CA_2017.pptx Slides] from AppSec California (2017)&lt;br /&gt;
* [20 Dec 2016] Threat identification chart [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf published]&lt;br /&gt;
* [03 Nov 2016] Presentation at [http://lascon.org/ LASCON 2016]&lt;br /&gt;
* [03 Nov 2016] v1.1 Handbook published&lt;br /&gt;
* [11-12 Oct 2016] Working session at the [https://docs.google.com/presentation/d/1iMQHTc-h5qcP7gBBRcPHGmVaTWqx3dpMwNMVlA--rqs/edit#slide=id.p3 AppSecUSA 2017 Project Summit]&lt;br /&gt;
* [04 Aug 2016] Project Q&amp;amp;A at Blackhat USA 2-5pm in the OWASP booth&lt;br /&gt;
* [26 Oct 2015] [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf v1.01 handbook] published&lt;br /&gt;
* [24 Sep 2015] [https://www.owasp.org/index.php/File:Colinwatson-a-new-ontology-of-unwanted-automation.pptx Presentation] at [https://2015.appsecusa.org/c/?page_id=896#a AppSec USA 2015]&lt;br /&gt;
&lt;br /&gt;
==In Print==&lt;br /&gt;
&lt;br /&gt;
[[File:AutomatedThreatHandbook_small.jpg|link=http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22932107.html]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-23540699.html Automated Threat Handbook] can be purchased at cost as a print on demand book.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
    &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Scope and Definitions =&lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The aim was to create a listing of vendor-neutral and technology agnostic terms that describe real-world automated threats to web applications, at a level of abstraction that application owners can relate to. These terms are threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
The focus is on abuse of functionality - misuse of inherent functionality and related design flaws, some of which are also referred to as business logic flaws. There is almost no focus on implementation bugs. It is not that the latter are not the target for attacks, but there is much more knowledge published in that area with a greater agreement on terminology. All the scenarios identified must require the web to exist for the threat to be materialised. Many of the scenarios have impacts upon the organisation that owns or operates web applications, but some scenarios have impacts more focused on individuals or other bodies. An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
==Definitions ==&lt;br /&gt;
&lt;br /&gt;
=== Automated Threats to Web Applications ===&lt;br /&gt;
&lt;br /&gt;
Threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
== Glossary ==&lt;br /&gt;
&lt;br /&gt;
;Action&lt;br /&gt;
: An act taken against an asset by a threat agent. Requires first that contact occurs between the asset and threat agent (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Application&lt;br /&gt;
: Software that performs a business process i.e. not system software&lt;br /&gt;
: A software program hosted by an information system (Ref 2)&lt;br /&gt;
&lt;br /&gt;
; Application layer&lt;br /&gt;
: &amp;quot;Layer 7” in the OSI model (Ref 3) and “application layer” in the TCP/IP model (Ref 4)&lt;br /&gt;
&lt;br /&gt;
;Threat&lt;br /&gt;
: Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events, etc.); malicious actors; errors; failures (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Agent&lt;br /&gt;
: Any agent (e.g., object, substance, human, etc.) that is capable of acting against an asset in a manner that can result in harm (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Event&lt;br /&gt;
: Occurs when a threat agent acts against an asset (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Web&lt;br /&gt;
: The World Wide Web (WWW, or simply Web) is an information space in which the items of interest, referred to as resources, are identified by global identifiers called Uniform Resource Identifiers (URI) (Ref 5)&lt;br /&gt;
: The first three specifications for Web technologies defined URLs, HTTP, and HTML (Ref 6)&lt;br /&gt;
&lt;br /&gt;
; Web application&lt;br /&gt;
: An application delivered over the web&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Glossary references:&lt;br /&gt;
# [http://pubs.opengroup.org/onlinepubs/9699919899/toc.pdf Risk Taxonomy, Technical Standard, The Open Group, 2009]&lt;br /&gt;
# [http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf NISTIR 7298 rev 2, NIST]&lt;br /&gt;
# [http://en.wikipedia.org/wiki/OSI_model OSI model, Wikipedia] &lt;br /&gt;
# [http://en.wikipedia.org/wiki/Internet_protocol_suite TCP/IP model, Wikipedia]&lt;br /&gt;
# [http://www.w3.org/TR/webarch/ Architecture of the World Wide Web, Volume One, W3C]&lt;br /&gt;
# [http://www.w3.org/Help/ Help and FAQ, W3C]&lt;br /&gt;
&lt;br /&gt;
=Use Case Scanarios=&lt;br /&gt;
&lt;br /&gt;
The following scenarios and organisation names are completely fictitious.&lt;br /&gt;
&lt;br /&gt;
==Defining application development security requirements==&lt;br /&gt;
&lt;br /&gt;
Cinnaminta SpA intends to build and launch a new multi-lingual and multi-currency ecommerce website. The development will be outsourced and Cinnaminta has been working on the functional design document. Among many other requirements, the application security specification requires that the website must not include any vulnerabilities identified in PCI DSS v3.1 Requirement 6.5, nor any other vulnerabilities that could affect the protection of payment cardholder data. Cinnaminta specifies that the website's payment functions must not be susceptible to the threat events '''OAT-001 Carding''' or '''OAT-010 Card Cracking''' as defined in the '''OWASP Automated Threat Handbook'''. In addition, the application must interact with the company's existing fraud detection system to counter '''OAT-012 Cashing Out'''. The requirements are specified in terms of these threat events, rather than particular product or service categories. Development houses responding to the call for bids use the ontology to focus their answers to these aspects appropriately.&lt;br /&gt;
&lt;br /&gt;
== Sharing intelligence within a sector==&lt;br /&gt;
&lt;br /&gt;
Unlimited Innovations Inc develops and supports patient-facing software solutions to a range of healthcare providers, many of which participate in the National Health Service Cyber Intelligence Sharing Center (NHS-CISC). Unlimited Innovations already builds continuous monitoring capabilities into its software and decides to provide an optional enhancement so that customers could choose to share their misuse event data with each other, to benefit from the combined threat intelligence. Rather than sharing large quantities of low-level data, Unlimited Innovations aggregates information and broadcasts validated and categorised threat data amongst the participating organisations. Automation attacks are classified according to the threat events defined in the '''OWASP Automated Threat Handbook''' so that each receiving party understands the nature of the threat. Even organisations that do not want to take part in this information sharing can benefit, since their own categorised information is made available to internal business management in the form of an easy-to-comprehend monitoring dashboard. The information gathered can also be fed into their other business information management systems to help improve patient service.&lt;br /&gt;
&lt;br /&gt;
== Exchanging threat data between CERTs==&lt;br /&gt;
&lt;br /&gt;
National Computer Emergency Response Teams (CERTs) recognise that sharing of local information can contribute to worldwide prevention of cyber attacks. Despite advances in cooperation between CERTs, anything to increase continuity and interoperability, such as standards for data exchange, is encouraged. CERT Zog is concerned about the sparsity of application-specific data it receives, and also the classification of that data. It has a particular concern about attacks and breaches that affect sectors defined in Zog's 2015 national cyber security strategy. CERT Zog and its neighbour CERT Tarset agree to tag threat events using the '''OWASP Automated Threat Handbook''' in order to add greater context to existing solutions being used for threat data exchange between them. The programme also collects sector metadata, so that all organisations within these can benefit from the centralised intelligence.&lt;br /&gt;
&lt;br /&gt;
== Enhancing application penetration test findings==&lt;br /&gt;
&lt;br /&gt;
Specialist application security penetration testing firm Cherak Industries Pte Ltd works primarily for financial services companies in the banking and insurance sectors, and is looking to expand its business throughout Asia. Cherak has some innovative pen test result reporting systems which integrate with client software fault and vulnerability tracking systems, and it actively looks for methods to provide additional value to its clients. Cherak has identified that pen test clients would benefit from help to in understanding the effects of combinations of vulnerabilities, especially design flaws, and has decided to utilise the '''OWASP Automated Threat Handbook''' to define and explain the automation-related threats. The individual vulnerabilities were scored as normal using CVSSv2 and v3, the matching CWEs identified, and mitigations in place documented. In addition, Cherak uses the threat events defined in the '''OWASP Automated Threat Handbook''' to help create a new section in the executive summary that explains how combinations of the issues found could lead to automation threats and the possible technical and business impacts. For example, an assessment for one client had identified weaknesses in authentication so that there is a risk of '''OAT-008 Credential Stuffing'''. The defined identifier was provided to the client, so its technical staff could refer to additional information on the OWASP website.&lt;br /&gt;
&lt;br /&gt;
== Specifying service acquisition needs==&lt;br /&gt;
&lt;br /&gt;
Falstone Paradise Inc is concerned about malicious use of their portfolio of hotel and resort websites. The majority of the websites use a shared application platform, but there are some unique applications and a large number of other micro-sites, some of which use generic content management systems such as Wordpress and Drupal. Falstone Paradise has identified that its IT operations team are spending too much time dealing with the effects of automated misuse, such as cleaning up data, resetting customer accounts and providing extra capacity during attacks. Furthermore, the unwanted automation is also causing some instabilities leading to negative feedback from customers. Therefore Falstone Paradise decides to go out to the security marketplace to identify, assess and select products or services that might help address these automation issues for all its websites. Their buying team works with their information technology colleagues to write the detailed requirements in an Invitation to Tender (ITT) document. This describes the types of attacks its web applications are receiving, their frequency of occurrence and their magnitudes. These are defined according to the '''OWASP Automated Threat Handbook''', so that vendors do not misunderstand the requirements, and each vendor's offering can be assessed against the particular automation threat events of concern.&lt;br /&gt;
&lt;br /&gt;
== Characterising vendor services ==&lt;br /&gt;
&lt;br /&gt;
Better Best Ltd has developed an innovative technology to help gaming companies defend against a range of automated threats that can otherwise permit cheating and distortion of the game, leading to disruption for normal players. The solution can be deployed on premises, but is also available in the cloud as a service. But Better Best is finding difficulty explaining its solution in the market place, especially since it does not fit into any conventional product category. Better Best decide to use the terminology and threat events listed in the '''OWASP Automated Threat Handbook''' to define their product's capabilities. They hope this will provide some clarity about their offering, and also demonstrate how their product can be used to replace more than one other conventional security device. Additionally, Better Best writes a white paper describing how their product has been successfully used by one of their reference customers Hollybush Challenge Games to protect against '''OAT-006 Expediting''', '''OAT-005 Scalping''', '''OAT-016 Skewing''' and '''OAT-013 Sniping'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Ontology=&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The A-Z list of [[:Category:Automated Threat|automated threat events]] and summary descriptions, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-020 Account Aggregation]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Use by an intermediary application that collects together multiple accounts and interacts on their behalf.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-019 Account Creation]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Create multiple accounts for subsequent misuse.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-003 Ad Fraud]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
False clicks and fraudulent display of web-placed advertisements.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-009 CAPTCHA Defeat]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Solve anti-automation tests.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-010 Card Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify missing start/expiry dates and security codes for stolen payment card data by trying different values.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-001 Carding]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Multiple payment authorisation attempts used to verify the validity of bulk stolen payment card data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-012 Cashing Out]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Buy goods or obtain cash utilising validated stolen payment card or other user account data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-007 Credential Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify valid login credentials by trying different values for usernames and/or passwords.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-008 Credential Stuffing]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass log in attempts used to verify the validity of stolen username/password pairs.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-021 Denial of Inventory]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Deplete goods or services stock without ever completing the purchase or committing to the transaction.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-015  Denial of Service]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Target resources of the application and database servers, or individual user accounts, to achieve denial of service (DoS).&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-006 Expediting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Perform actions to hasten progress of usually slow, tedious or time-consuming actions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-004 Fingerprinting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Elicit information about the supporting software and framework types and versions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-018 Footprinting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Probe and explore application to identify its constituents and properties.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-005 Scalping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Obtain limited-availability and/or preferred goods/services by unfair methods.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-011 Scraping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Collect application content and/or other data for use elsewhere.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-016 Skewing]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Repeated link clicks, page requests or form submissions intended to alter some metric.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-013 Sniping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Last minute bid or offer for goods or services.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-017 Spamming]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Malicious or questionable information addition that appears in public or private content, databases or user messages.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-002 Token Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass enumeration of coupon numbers, voucher codes, discount tokens, etc.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-014 Vulnerability Scanning]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Crawl and fuzz application to identify weaknesses and possible vulnerabilities.&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Comparison with other dictionaries, taxonomies and lists==&lt;br /&gt;
&lt;br /&gt;
===[https://capec.mitre.org/ Common Attack Pattern Enumeration and Classification] (CAPEC)===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-capec-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
CAPEC is a dictionary and classification taxonomy of known attacks on software. Its primary classification structures are:&lt;br /&gt;
&lt;br /&gt;
* [https://capec.mitre.org/data/definitions/3000.html Domains of attack] (3000) - Social Engineering (403), [https://capec.mitre.org/data/definitions/437.html Supply Chain] (437), Communications (512), [https://capec.mitre.org/data/definitions/513.html Software] (513), Physical Security (514), Hardware (515)&lt;br /&gt;
* Mechanism of Attack (1000) - Gather Information (118), Deplete Resources (119), Injection (152), Deceptive Interactions (156), Manipulate Timing and State (172), Abuse of Functionality (210), Probabilistic Techniques (223), Exploitation of Authentication (225), Exploitation of Authorization (232), Manipulate Data Structures (255), Manipulate Resources (262), Analyze Target (281), Gain Physical Access (436), Malicious Code Execution (525), Alter System Components (526), Manipulate System Users (527)&lt;br /&gt;
&lt;br /&gt;
===[http://projects.webappsec.org/w/page/13246978/Threat%20Classification WASC Threat Classification]===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-wasc-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
The WASC Threat Classification classifies weaknesses and attacks that can lead to the compromise of a website, its data, or its users.&lt;br /&gt;
&lt;br /&gt;
===[[OWASP WASC Web Hacking Incidents Database Project]] (WHID)===&lt;br /&gt;
&lt;br /&gt;
WHID [https://www.google.com/fusiontables/DataSource?snapid=S1536501YnLo classifies] publicly known incidents using:&lt;br /&gt;
&lt;br /&gt;
* attack methods e.g. ARP spoofing, abuse of functionality, account compromise, administration error, automation, backdoor, banking trojan, brute force, clickjacking, code injection, content injection, content spoofing, credential/session prediction, cross site request forgery (CSRF), cross-site scripting (XSS), denial of service, directory traversal, domain hijacking, DNS hijacking, forceful browsing, HTTP response splitting, hidden parameter manipulation, hosting malicious code, information leakage, insufficient authentication, known vulnerability, local file inclusion (LFI), malvertising, malware, malware injection, mass assignment, misconfiguration, OS commanding, parameter manipulation, path traversal, phishing, predictable resource location, process automation, redirection, remote file inclusion (RFI), rogue 3rd party app, scaping, search engine poisoning, shell injection, social engineering, stolen credentials, SQL injection, unintentional information disclosure, weak password recovery validation, worm&lt;br /&gt;
* weakness e.g. abuse of functionality, application misconfiguration, directory indexing, improper filesystem permissions, improper input handling, improper output handling, information leakage, insecure indexing, insufficient anti-automation, insufficient authentication, insufficient authorization, insufficient entropy, insufficient password recovery, insufficient process validation, insufficient session expiration, insufficient transport layer protection, misconfiguration, predictable resource location, weak password&lt;br /&gt;
* outcome account hijacking, account takeover, botnet participation, chaos, credit card leakage, data loss, defacement, DDoS attacks, DNS hijacking, DNS redirection, disinformation, disclosure only, downtime, extortion, fraud, information warfare, leakage of information, link spam, loss of sales, malware distribution,  monetary loss, phishing, planting of malware, service disruption, session hijacking, spam, spam links, stolen credentials, worm&lt;br /&gt;
&lt;br /&gt;
Plus other/various/unknown.&lt;br /&gt;
&lt;br /&gt;
= Bibliography =&lt;br /&gt;
&lt;br /&gt;
The following academic, open source, commercial and news sources were used in the research on automated threats to web applications. OWASP is a worldwide not-for-profit charitable organization focused on improving the security of software.  We operate under a vendor neutral policy and we do not endorse products or services.&lt;br /&gt;
&lt;br /&gt;
* 10 years of Application Security, Denyall http://www.denyall.com/resources/whitepapers/?aliId=3438442&lt;br /&gt;
*	2012 Payment Card Threat Report	 https://www.securitymetrics.com/static/resources/orange/2012%20Payment%20Card%20Threat%20Report%20copy.pdf				&lt;br /&gt;
*	2014 Bot Traffic Report: Just the Droids You were Looking for	 http://www.incapsula.com/blog/bot-traffic-report-2014.html				&lt;br /&gt;
*	3 Types of ‘Return Fraud’ to Monitor this Holiday Season	 http://www.practicalecommerce.com/articles/3168-3-Types-of-%E2%80%98Return-Fraud-to-Monitor-this-Holiday-Season	&lt;br /&gt;
* 7 Ways Bots Hurt Your Website, Distil Networks http://www.distilnetworks.com/7-ways-bots-hurt-website-whitepaper/						&lt;br /&gt;
*	Abusing HTML 5 Structured Client-side Storage	2008	 http://packetstorm.wowhacker.com/papers/general/html5whitepaper.pdf		&lt;br /&gt;
* Acquiring Experience with Ontology and Vocabularies, Walt Melo, Risa Mayan and Jean Stanford, 2011  http://www.omg.org/news/meetings/workshops/SOA-HC/presentations-2011/13_SC-6_Melo_Stanford_Mayan.pdf	&lt;br /&gt;
*	An Anatomy of a SQL Injection Attack	 Hacker Intelligence Initiative	 Imperva	 	 http://www.imperva.com/docs/HII_An_Anatomy_of_a_SQL_Injection_Attack_SQLi.pdf	&lt;br /&gt;
*	The Anatomy of Clickbot.A	 https://www.usenix.org/legacy/event/hotbots07/tech/full_papers/daswani/daswani.pdf				&lt;br /&gt;
*	Anatomy of comment spam	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Anatomy_of_Comment_Spam.pdf		&lt;br /&gt;
*	Anti-Automation Monitoring and Prevention	2015	 https://www.clerkendweller.uk/2015/1/29/AntiAutomation-Monitoring-and-Prevention			&lt;br /&gt;
*	Anti-DDoS Solution for Internet Corporation	 http://www.nsfocus.com/uploadfile/Solution/NSFOCUS%20Anti-DDoS%20Solution%20for%20Internet%20Corporation.pdf				&lt;br /&gt;
*	Anti-Fraud Principles and Proposed Taxonomy	 Sep 2014	 http://www.iab.net/media/file/IAB_Anti_Fraud_Principles_and_Taxonomy.pdf			&lt;br /&gt;
*	Apache Security	 Ivan Ristic	 			&lt;br /&gt;
* Application Security Desk Reference, OWASP https://www.owasp.org/index.php/Category:OWASP_ASDR_Project&lt;br /&gt;
* Application Security Guide For CISOs, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf&lt;br /&gt;
* AppSensor, OWASP https://www.owasp.org/index.php/OWASP_AppSensor_Project&lt;br /&gt;
*	Attack &amp;amp; Defense Labs	 http://www.andlabs.org/html5.html				&lt;br /&gt;
*	Attack categories	 OWASP	 https://www.owasp.org/index.php/Category:Attack	&lt;br /&gt;
* Attack Trees, Schneier, Dr. Dobb's Journal, December 1999 https://www.schneier.com/paper-attacktrees-ddj-ft.html		&lt;br /&gt;
*	Attacking with HTML5	2010	 https://media.blackhat.com/bh-ad-10/Kuppan/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-wp.pdf			&lt;br /&gt;
*	Automated attacks	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Automation_of_Attacks.pdf		&lt;br /&gt;
*	Avoiding the Top 10 Software Security Design Flaws	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf				&lt;br /&gt;
*	Bad Bots On The Rise	 Dec 2014	 http://www.darkreading.com/informationweek-home/bad-bots-on-the-rise/d/d-id/1318276	&lt;br /&gt;
* Banking Botnets Persist Despite Takedowns, Dell SecureWorks, 2015 http://www.secureworks.com/cyber-threat-intelligence/threats/banking-botnets-persist-despite-takedowns/	&lt;br /&gt;
*	The Barracuda Web Application Firewall: XML Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_XML_Firewall.pdf	&lt;br /&gt;
*	Blocking Brute Force Attacks	 http://www.cs.virginia.edu/~csadmin/gen_support/brute_force.php				&lt;br /&gt;
*	Bot Traffic Growing Problem for Digital	 Oct 2014	 http://www.netnewscheck.com/article/36537/bot-traffic-growing-problem-for-digital			&lt;br /&gt;
*	BotoPedia	 Incapsula	 http://www.botopedia.org/			&lt;br /&gt;
*	Boy in the Browser	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/Boy_in_the_Browser	&lt;br /&gt;
* Business Logic Attacks - Bots and BATs, Eldad Chai, 2009 http://www.owasp.org/images/9/96/AppSecEU09_BusinessLogicAttacks_EldadChai.ppt		&lt;br /&gt;
*	Bypassing Client Application Protection Techniques	 http://www.securiteam.com/securityreviews/6S0030ABPE.html&lt;br /&gt;
*	A CAPTCHA in the Rye	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_a_CAPTCHA_in_the_Rye.pdf					&lt;br /&gt;
*	Characterizing Large Scale Click fraud	 http://cseweb.ucsd.edu/~voelker/pubs/za-ccs14.pdf	&lt;br /&gt;
* Charter Addition Proposal: &amp;quot;Trusted Code&amp;quot; for the Web https://lists.w3.org/Archives/Public/public-webappsec/2015Mar/0150.html&lt;br /&gt;
*	A cheesy Apache / IIS DoS vuln (+a question) 	 http://www.securityfocus.com/archive/1/456339/30/0/threaded	&lt;br /&gt;
* China's Man-on-the-Side Attack on GitHub http://www.netresec.com/?page=Blog&amp;amp;month=2015-03&amp;amp;post=China%27s-Man-on-the-Side-Attack-on-GitHub&lt;br /&gt;
* The CISO Survey and Report, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-report-2013-1.0.pdf&lt;br /&gt;
* Common Attack Pattern Enumeration and Classification (CAPEC), Mitre https://capec.mitre.org/			&lt;br /&gt;
*	Common Cyber Attacks: Reducing the Impact	 CERT-UK	 https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/400106/Common_Cyber_Attacks-Reducing_The_Impact.pdf			&lt;br /&gt;
*	Corporate espionage – the internet’s new growth industry	 http://www.itproportal.com/2015/03/19/corporate-espionage-internets-new-growth-industry/				&lt;br /&gt;
*	CSA Top Threats to Cloud Computing	 https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf				&lt;br /&gt;
*	CSRF vulnerability in GMail service	 http://seclists.org/fulldisclosure/2009/Mar/29		&lt;br /&gt;
* CWE/SANS Top 25 Most Dangerous Software Errors, 2011 http://cwe.mitre.org/top25/		&lt;br /&gt;
*	Cyber Fraud - Tactics	 Techniques and Procedures	 http://www.crcpress.com/product/isbn/9781420091274			&lt;br /&gt;
* Cybercrime Report: Q1 2015, ThreatMetrix, 2015 http://info.threatmetrix.com/WP-2015Q1CybercrimeReport_WP-LP.html&lt;br /&gt;
*	Data Breach Investigations Report (DBIR), 2014	 http://www.verizonenterprise.com/DBIR/2014/				&lt;br /&gt;
* Data Breach Investigations Report (DBIR), 2015 http://www.verizonenterprise.com/DBIR/2015/&lt;br /&gt;
*	Data Breaches Fuel Login Attacks	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2014-state-of-the-internet-threat-advisory-public-data-breaches-fuel-login-attacks.pdf		&lt;br /&gt;
*	Data Scraping	 Wikipedia	 http://en.wikipedia.org/wiki/Data_scraping			&lt;br /&gt;
*	DDoS Quick Guide	 https://www.us-cert.gov/sites/default/files/publications/DDoS%20Quick%20Guide.pdf	&lt;br /&gt;
* DDoS Threat Landscape Report, 2013-2014 http://lp.incapsula.com/rs/incapsulainc/images/2013-14_ddos_threat_landscape.pdf	&lt;br /&gt;
* Defending Against an Internet-based Attack on the Physical World http://avirubin.com/scripted.attacks.pdf		&lt;br /&gt;
*	Defending Against Application-Based DDoS Attacks with the Barracuda Web Application Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_Defending%20_Against_%20Application-Based_%20DDoS_%20Attacks.pdf				&lt;br /&gt;
*	Demystifying HTML 5 Attacks	 http://resources.infosecinstitute.com/demystifying-html-5-attacks/				&lt;br /&gt;
*	Denial of Service Attacks: A Comprehensive Guide to Trends	 Techniques	 and Technologies	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Denial_of_Service_Attacks-Trends_Techniques_and_Technologies.pdf&lt;br /&gt;
*	Detecting and Blocking Site Scraping Attacks	 Imperva	 http://www.imperva.com/docs/WP_Detecting_and_Blocking_Site_Scraping_Attacks.pdf			&lt;br /&gt;
*	Detecting Automation of Twitter Accounts: Are you a human	 cyborg	 or a bot?	 http://www.cs.wm.edu/~hnw/paper/tdsc12b.pdf		&lt;br /&gt;
*	Detecting Malice	 Robert &amp;quot;RSnake&amp;quot; Hansen	2009	 http://www.detectmalice.com/		&lt;br /&gt;
*	Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) 	 http://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1414072277428&amp;amp;uri=CELEX:32002L0058				&lt;br /&gt;
*	Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data 	 http://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:31995L0046				&lt;br /&gt;
*	Distributed Denial-of-Service (DDoS) Cyber-Attacks	 Risk Mitigation	 and Additional Resources	 Federal Financial Institutions Examination Council	 http://www.ffiec.gov/press/PDF/FFIEC%20DDoS%20Joint%20Statement.pdf	&lt;br /&gt;
*	Do Evil - The Business of Social Media Bots	 Forbes	 http://www.forbes.com/sites/lutzfinger/2015/02/17/do-evil-the-business-of-social-media-bots/			&lt;br /&gt;
*	DoS and DDoS Glossary of Terms	 prolexic	 http://www.prolexic.com/knowledge-center-dos-and-ddos-glossary.html#layer-7-ddos-attack			&lt;br /&gt;
*	E-commerce Malware	 Trustwave	 https://gsr.trustwave.com/topics/placeholder-topic/e-commerce-malware/	&lt;br /&gt;
* Exploiting Software, G. Hoglund and G. McGraw, Addison-Wesley, 2004&lt;br /&gt;
* Five Trends to Track in E-Commerce Fraud, ThreatMetrix, 2013 http://info.threatmetrix.com/rs/threatmetrix/images/Five_Trends_eCommerce_Fraud_WP.pdf&lt;br /&gt;
* Hacker builds cheatbot for hit app Trivia Crack http://www.theregister.co.uk/2015/03/26/hacker_builds_trivia_crack_cheat_app/	&lt;br /&gt;
* Has Walmart opened itself up to “Denial of inventory” attacks?  https://arstechnica.com/business/2012/05/has-walmart-opened-itself-up-to-denial-of-inventory-attacks/	&lt;br /&gt;
* How Hoarder Bots Steal sales from Online Retailers https://www.internetretailer.com/mobile/2016/12/16/how-hoarder-bots-steal-sales-online-retailers&lt;br /&gt;
*	How to Defend Against DDoS Attacks - Strategies for the Network	 Transport	 and Application Layers	 Prolexic	 http://www.prolexic.com/kcresources/white-paper/strategies-for-the-network-transport-and-application-layers-412/Strategies_for_the_Network_Transport_and_Application_Layers_Prolexic_White_Paper_A4_082412.pdf	&lt;br /&gt;
* How to Defend Online Travel Websites in the Era of Site Scraping, Distil Networks http://www.distilnetworks.com/defend-online-travel-websites-era-site-scraping-download/&lt;br /&gt;
*	How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores	 http://research.microsoft.com/pubs/145858/caas-oakland-final.pdf				&lt;br /&gt;
*	HTML5 Overview	 A look at HTML5 Attack Scenarios	 Trend Micro	2011	 http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt_html5-attack-scenarios.pdf	&lt;br /&gt;
*	HTML5 Top 10 Threats Stealth Attacks and Silent Exploits	2012	 https://media.blackhat.com/bh-eu-12/shah/bh-eu-12-Shah_HTML5_Top_10-WP.pdf			&lt;br /&gt;
*	HTML5 web security	2011	 http://media.hacking-lab.com/hlnews/HTML5_Web_Security_v1.0.pdf			&lt;br /&gt;
*	HTTPPOST - Slow POST	 Wong Onn Chee	 OWASP AppSec DC 2010	 https://www.owasp.org/images/4/43/Layer_7_DDOS.pdf	&lt;br /&gt;
* If you've got @British_Airways account may make sense to change your password. Just had all my Avios cleared out! https://twitter.com/suttonnick/status/581556027948195840/photo/1	&lt;br /&gt;
* Internet Security Threat Report, Volume 19, 2014 http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf&lt;br /&gt;
*	An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks	 http://www.springer.com/gb/book/9788132202769	&lt;br /&gt;
*	Is Your Data Center Ready for Today’s DDoS Threats? DDoS attack types	 protection methods and testing your detection and mitigation defenses	 http://www.fortinet.com/sites/default/files/whitepapers/WP-DDoS-Testing.pdf			&lt;br /&gt;
*	Joomla Reflection DDoS-for-Hire	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2015-state-of-the-internet-threat-advisory-joomla-reflection-attack-ddos-for-hire.pdf		&lt;br /&gt;
*	Layer 7 DDOS – Blocking HTTP Flood Attacks	 http://blog.sucuri.net/2014/02/layer-7-ddos-blocking-http-flood-attacks.html				&lt;br /&gt;
*	Lenovo	 Superfish put smut on my system' – class-action lawsuit	 The Register	 http://www.theregister.co.uk/2015/02/23/lenovo_superfish_class_action_lawsuit/		&lt;br /&gt;
* List of Attack Vectors   Relative Vulnerability Rating TECAPI http://www.tecapi.com/public/relative-vulnerability-rating-gui.jsp#&lt;br /&gt;
*	Man in the Browser	 http://scisweb.ulster.ac.uk/~kevin/IJACI-Vol4No1-maninbrowser.pdf				&lt;br /&gt;
*	Man in the Browser Attack	 https://www.owasp.org/index.php/Man-in-the-browser_attack&lt;br /&gt;
* Mapping and Measuring Cybercrime, Oxford Internet Institute http://www.oii.ox.ac.uk/publications/FD18.pdf				&lt;br /&gt;
*	Massive Changes in the Criminal Landscape	 Europol	2015	 https://www.europol.europa.eu/content/massive-changes-criminal-landscape	&lt;br /&gt;
* Matching Attack Patterns to Security Vulnerabilities in Software-Intensive System Designs http://collaboration.csc.ncsu.edu/laurie/Papers/ICSE_Final_MCG_LW.pdf	&lt;br /&gt;
*	Mitigating DDoS Attacks with F5 Technology	 F5	 https://f5.com/resources/white-papers/mitigating-ddos-attacks-with-f5-technology			&lt;br /&gt;
* Mitigating the DoS/DDosS Threat, Radware, 2012 http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452061&lt;br /&gt;
* Modern Web Attacks, Sophos, 2007 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/modern-web-attacks.aspx&lt;br /&gt;
*	ModSecurity Advanced Topic of the Week: Mitigating Slow HTTP DoS Attacks	 https://www.trustwave.com/Resources/SpiderLabs-Blog/(Updated)-ModSecurity-Advanced-Topic-of-the-Week--Mitigating-Slow-HTTP-DoS-Attacks/	&lt;br /&gt;
* Most common attacks on web applications https://ipsec.pl/web-application-security/most-common-attacks-web-applications.html			&lt;br /&gt;
* Multi-dimensional Vulnerability Hierarchies Daniel Miessler  https://danielmiessler.com/study/multi-dimensional-vulnerability-hierarchies/&lt;br /&gt;
*	New Wave of DDoS Attacks Launched	 BankInfoSecurity.com	 Mar 2013	 http://www.bankinfosecurity.com/new-wave-ddos-attacks-launched-a-5584/op-1		&lt;br /&gt;
*	NOMAD: Toward Non-Invasive Moving Target Defense Against Web Bots	 http://faculty.cs.tamu.edu/guofei/paper/NOMAD_CNS13.pdf				&lt;br /&gt;
*	Online Ad Fraud Exposed: Advertisers Losing $6.3 Billion To $10 Billion Per Year	 Sep 2014	 http://www.darkreading.com/analytics/threat-intelligence/online-ad-fraud-exposed-advertisers-losing-$63-billion-to-$10-billion-per-year/d/d-id/1317979			&lt;br /&gt;
* Online Data Companies versus Bots: The Fight is on for Control of Online Data, Distil Networks http://www.distilnetworks.com/online-data-companies-vs-bots-download/&lt;br /&gt;
*	Optimal Airline Ticket Purchasing Using Automated User-Guided Feature Selection	 http://ijcai.org/papers13/Papers/IJCAI13-032.pdf				&lt;br /&gt;
*	Payment Checkout Flaws and Bugs	2014	 https://www.clerkendweller.uk/2014/11/4/Payment-Checkout-Flaws-and-Bugs			&lt;br /&gt;
*	PCI Compliance Report 2015	 Verizon	 http://www.verizonenterprise.com/pcireport/2015/			&lt;br /&gt;
*	Pixel Perfect Timing Attacks with HTML5	2013	 http://www.contextis.com/services/research/white-papers/pixel-perfect-timing-attacks-html5/			&lt;br /&gt;
*	Polymorphism as a Defense for Automated Attack of Websites	 http://link.springer.com/chapter/10.1007%2F978-3-319-07536-5_30				&lt;br /&gt;
*	Preventing Web Scraping: Best Practice 	 https://creativedigitalideas.files.wordpress.com/2014/11/best-practice-to-prevent-web-scraping.pdf				&lt;br /&gt;
*	Profile: Automated Credit Card Fraud	 http://old.honeynet.org/papers/profiles/cc-fraud.pdf				&lt;br /&gt;
* Protecting Against Web Floods, Radware http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452968&lt;br /&gt;
*	Q4 2014 State of the Internet Security Report	 prolexic	 http://www.stateoftheinternet.com/downloads/pdfs/2014-internet-security-report-q4.pdf			&lt;br /&gt;
*	Reflection injection	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf		&lt;br /&gt;
* A Report on taxonomy and evaluation of existing inventories, ENISAhttp://ecrime-project.eu/wp-content/uploads/2015/02/E-Crime-Deliverable-2-1-20141128_FINAL.pdf			&lt;br /&gt;
* Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft, Dept of Justice http://www.justice.gov/criminal/cybercrime/docs/ip-victim-guide-and-checklist-march-2013.pdf&lt;br /&gt;
*	SANS Top 20 Critical Controls	 https://www.sans.org/critical-security-controls/		&lt;br /&gt;
* Securing Websites, Sophos, 2011 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/securing-websites.aspx		&lt;br /&gt;
*	Security Insights: Defending Against Automated Threats	 http://www.securityweek.com/security-insights-defending-against-automated-threats				&lt;br /&gt;
*	Server side DDoS	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/DDOS_Attack_Method_Payload_05182010			&lt;br /&gt;
*	Slow Read Denial of Service attack	 https://code.google.com/p/slowhttptest/wiki/SlowReadTest				&lt;br /&gt;
*	Slow-Read DoS Attack	 https://www.trustwave.com/Resources/SpiderLabs-Blog/ModSecurity-Advanced-Topic-of-the-Week--Mitigation-of--Slow-Read--Denial-of-Service-Attack/				&lt;br /&gt;
*	Slowloris HTTP DoS	 http://ha.ckers.org/slowloris/	 	&lt;br /&gt;
* So what are the &amp;quot;most critical&amp;quot; application flaws? On new OWASP Top 10 https://ipsec.pl/application-security/2013/so-what-are-most-critical-application-flaws-new-owasp-top-10.html		&lt;br /&gt;
*	Social Media Bots Offer Phony Friends and Real Profit	 NY Times	 http://www.nytimes.com/2014/11/20/fashion/social-media-bots-offer-phony-friends-and-real-profit.html?_r=1			&lt;br /&gt;
* Software Vulnerability Analysis, Krsul, 1998 http://www.krsul.org/ivan/articles/main.pdf&lt;br /&gt;
*	Sophos Security Threat Report	 http://blogs.sophos.com/2014/12/11/our-top-10-predictions-for-security-threats-in-2015-and-beyond/&lt;br /&gt;
* SpoofedMe Social Login Attack Discovered by IBM X-Force Researchers http://securityintelligence.com/spoofedme-social-login-attack-discovered-by-ibm-x-force-researchers/#.VSuiEhPSngM				&lt;br /&gt;
* State of Software Security Report, Volume 5, Veracode, 2013 https://info.veracode.com/state-of-software-security-report-volume5.html&lt;br /&gt;
*	Stopping Automated Attack Tools	 http://www.technicalinfo.net/papers/StoppingAutomatedAttackTools.html&lt;br /&gt;
* Taxonomy on Online Game Security http://www.math.snu.ac.kr/~jhcheon/publications/2004/Taxonomy%20on%20online%20game%20security_EL.pdf	&lt;br /&gt;
* A Taxonomy of Computer Program Security Flaws, with Examples, Landwehr https://cwe.mitre.org/documents/sources/ATaxonomyofComputerProgramSecurityFlawswithExamples%5BLandwehr93%5D.pdf&lt;br /&gt;
* A Taxonomy of Security Faults in the UNIX Operating System, Aslam, 1995 https://cwe.mitre.org/documents/sources/ATaxonomyofSecurityFaultsintheUNIXOperatingSystem%5BAslam95%5D.pdf		&lt;br /&gt;
* Testing Guide, v4, OWASP, 2014 https://www.owasp.org/images/5/52/OWASP_Testing_Guide_v4.pdf								&lt;br /&gt;
*	The Bot Baseline: Fraud in Digital Advertising	 https://s3.amazonaws.com/whiteops-public/WO-ANA-Baseline-Study-of-Bot-Fraud.pdf							&lt;br /&gt;
*	The Internet Organised Crime Threat Assessment (iOCTA) 2014	 https://www.europol.europa.eu/content/internet-organised-crime-threat-assesment-iocta				&lt;br /&gt;
*	The Notorious Nine	 Cloud Computing Top Threats in 2013	 CSA	 https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf	&lt;br /&gt;
* The Risks of Content Management Systems, IBM, 2015 https://portal.sec.ibm.com/mss/html/en_US/support_resources/pdf/CMS_Threats_MSS_Threat_Report.pdf	&lt;br /&gt;
* The Spy in the Sandbox – Practical Cache Attacks in Javascript http://iss.oy.ne.ro/SpyInTheSandbox.pdf						&lt;br /&gt;
* Thousands of Hacked Uber Accounts Selling on Dark Web for $1 http://thehackernews.com/2015/03/thousands-of-hacked-uber-accounts_30.html?m=1&lt;br /&gt;
* Threat Intelligence Quarterly, IBM, 1Q 2015 https://www.ibm.com/services/forms/signup.do?source=swg-WW_Security_Organic&amp;amp;S_PKG=ov33510&amp;amp;S_TACT=C327017W&amp;amp;dynform=18101&lt;br /&gt;
* Threat Modeling: Designing for Security, Adam Shostack, Wiley, April 2014 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118809998.html&lt;br /&gt;
*	Threats and Mitigations: A Guide to Multi-Layered Web Security - eBook	 Prolexic	 	 http://www.prolexic.com/knowledge-center/prolexic-download/guide-multi-layered-web-security-ebook.pdf		&lt;br /&gt;
* Trapping Unknown Malware in a Context Web, Sophos http://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/HuqSzabo-VB2013.pdf?la=en.pdf&lt;br /&gt;
*	Trustwave Global Security Report	2014	 https://www2.trustwave.com/GSR2014.html?utm_source=redirect&amp;amp;utm_medium=web&amp;amp;utm_campaign=GSR2014			&lt;br /&gt;
*	TurboTax’s Anti-Fraud Efforts Under Scrutiny	 http://krebsonsecurity.com/2015/02/turbotaxs-anti-fraud-efforts-under-scrutiny/				&lt;br /&gt;
*	Two Security Vulnerabilities in the Spring Framework’s MVC pdf (from 2008)	 http://blog.diniscruz.com/2011/07/two-security-vulnerabilities-in-spring.html&lt;br /&gt;
*	The Underground Economy of Spam: A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns	 http://static.usenix.org/events/leet11/tech/full_papers/Stone-Gross.pdf					&lt;br /&gt;
*	Understanding Web Bots and How They Hurt Your Business	 Encapsula	 http://www.slideshare.net/Incapsula/understanding-web-bots-and-how-they-hurt-your-business		&lt;br /&gt;
* Use of A Taxonomy of Security Faults, Taimur Aslam, Ivan Krsul and Eugene H Spafford, 1996  http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=2304&amp;amp;context=cstech&lt;br /&gt;
*	The WASC Threat Classification v2.0	 http://projects.webappsec.org/w/page/13246978/Threat%20Classification	&lt;br /&gt;
* Warhol Worms: The Potential for Very Fast Internet Plagues http://www.iwar.org.uk/comsec/resources/worms/warhol-worm.htm	&lt;br /&gt;
*	Web Application Attack Report #5	 Imperva	 http://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed5.pdf	&lt;br /&gt;
* Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Ryan Barnett, Wiley, December 2012 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118362187.html		&lt;br /&gt;
*	Web Attacks in the Wild	 Corsaire	 https://www.owasp.org/images/a/a7/Web_attacks_in_the_wild_-_ap.pdf			&lt;br /&gt;
*	Web Automation	 Friend or Foe?	 https://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf			&lt;br /&gt;
*	Web Spambot Detection Based on Web Navigation Behaviour 	 http://pedramhayati.com/papers/Web_Spambot_Detection_Based_on_Web_Usage_Behaviour.pdf		&lt;br /&gt;
* Website Security Statistics Report, 2014 http://info.whitehatsec.com/rs/whitehatsecurity/images/statsreport2014-20140410.pdf		&lt;br /&gt;
*	What is Zeus?	 http://www.sophos.com/medialibrary/pdfs/technical%20papers/sophos%20what%20is%20zeus%20tp.pdf				&lt;br /&gt;
*	When Web 2.0 Attacks! Understanding Ajax	 Flash and other highly interactive web technologies…	 https://www.owasp.org/images/f/fc/When_Web_2.0_Attacks_-_Understanding_Security_Implications_of_Highly_Interactive_Technologies-Rafal_Los.pdf			&lt;br /&gt;
*	Where have all of our Passwords Gone?	 Gartner	2015	 http://blogs.gartner.com/avivah-litan/2015/01/22/where-have-all-our-passwords-gone/		&lt;br /&gt;
*	WS-Attacks.org	 http://www.ws-attacks.org/index.php/Main_Page&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; What do you mean by &amp;quot;web&amp;quot;, &amp;quot;application&amp;quot; and &amp;quot;automated threat&amp;quot;?&lt;br /&gt;
: See the definitions in the project's {{#switchtablink:Project Scope and Definitions|glossary}}.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;ontology&amp;quot;?&lt;br /&gt;
: An ontology is a set of types, properties, and relationship. These together define a subject description language. This particular ontology is meant to represent what automated threats real world owners observe affecting their web applications in usual operations.&lt;br /&gt;
&lt;br /&gt;
; Isn't this another bug (vulnerability) list?&lt;br /&gt;
: No, none of the named automated threat events are implementation bugs - they relate to abuse of functionality using automated means.&lt;br /&gt;
&lt;br /&gt;
; But is it an OWASP Top N List?&lt;br /&gt;
: Again no, it's an ontology which currently contains 21 items but there may be more identified in the future. Also it is not an ordered list (like OWASP Top N lists) - the OAT identification numbers were randomly assigned, so the list is often written in alphabetical order to emphasize this.&lt;br /&gt;
&lt;br /&gt;
; I thought &amp;quot;so and so&amp;quot; already did that?&lt;br /&gt;
: We found that it did not exist. While many threats are mentioned in the sources researched, there was no overall list or definitions. We found the automated threat events tended to all be in a small number of definied items from Mitre CAPEC and WASC Threat Classification. If you know of other automated threat lists/taxonomies/ontologies, please share them.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;oat&amp;quot;?&lt;br /&gt;
: It is our abbreviation for OWASP Automated Threat (OAT).&lt;br /&gt;
&lt;br /&gt;
; I am confused and don't know which OAT my problem is - how do I identify it?&lt;br /&gt;
: In 2017 we created a [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] to help identify the correct OAT, which can then be confirmed by reading the full description in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook]. The short summaries are important explanations of each OAT name.&lt;br /&gt;
&lt;br /&gt;
; How can I help?&lt;br /&gt;
: Please join our mailing list, send ideas, contribute clarifications, corrections and improvement, and let other people know about the project and its handbook.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements and Sponsors =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
* Sumit Agarwal&lt;br /&gt;
* Jason Chan&lt;br /&gt;
* Mark Hall&lt;br /&gt;
* Omri Iluz&lt;br /&gt;
* Andrew van der Stock&lt;br /&gt;
* Roland Weber&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
Additionally other professional colleagues and website owners and operators who provided feedback.&lt;br /&gt;
&lt;br /&gt;
==Reviewers==&lt;br /&gt;
&lt;br /&gt;
* Igor Andriushchenko&lt;br /&gt;
* Gabriel Mendez Justiniano&lt;br /&gt;
* Matt Tesauro&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
All OWASP Projects are run and developed by volunteers and rely on personal donations and sponsorship to continue their development. OWASP does not endorse or recommend commercial products or services, allowing our community to remain vendor neutral with the collective wisdom of the best minds in software security worldwide. This project has received the sponsorship part of their Corporate OWASP membership fees from Verizon Digital Media Services in 2016 and Distil Networks in 2017, which has already contributed to the v1.2 production design costs, and will also be utilised to help promote knowledge of the project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[file:Verizon_Digital_Medial_Logo.jpg|size=150x45px|link=https://www.verizondigitalmedia.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Distil-flat-logo-2.png|link=https://www.distilnetworks.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Can you help? The project is looking for information on the prevalence and types of automated threats seen by web application owners in the real world. This will be used to refine and organise the information gathered from research papers, whitepapers, security reports and industry news. Please use the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
&lt;br /&gt;
* [https://groups.google.com/a/owasp.org/forum/#!forum/automated-threats-project Mailing list]&lt;br /&gt;
&lt;br /&gt;
To share information confidentially, you can email the project leaders directly: [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:colin.watson@owasp.org Colin Watson].&lt;br /&gt;
&lt;br /&gt;
== Completed Outputs==&lt;br /&gt;
&lt;br /&gt;
* {{#switchtablink:Scope and Definitions|Glossary}}&lt;br /&gt;
* {{#switchtablink:Bibliography|Bibligraphy of information sources}}&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automated-threats.pdf summary chart] has been published summarising the information gathered and work to date&lt;br /&gt;
* Identifying automated threats to web applications, and determining the primary name used. This first part of the project intends to produce a consistent vocabulary for discussing the threats before moving onto other aspects&lt;br /&gt;
* The primary terms have now been defined and described for the ontology&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automation-briefing.pdf briefing document] was produced in May 2015&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Automated Threat Handbook] July 2015 [https://www.owasp.org/index.php/File:Owasp-automated-threat-handbook-source-files.zip source files], updated in November 2016&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automation-project-briefing.pdf project overview flyer]  July 2015&lt;br /&gt;
* Release  [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] December 2016&lt;br /&gt;
&lt;br /&gt;
== Roadmap==&lt;br /&gt;
&lt;br /&gt;
The project's roadmap was updated in October 2017.&lt;br /&gt;
&lt;br /&gt;
===Q1 2015===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Feb 2015: Define scope and terminology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Mar 2015: Research prior work and reports about automated threats to web applications to create bibliography&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q2 2015===&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Assess threats/attacks and create ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Application owner interviews and creation of initial project outputs, to refine model&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Publication of outputs and request for review/data&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Summit session and survey at AppSec EU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Write ontology document&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Write 2-page project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Publish project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul 2015: Publish v1.0 ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q3 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul-Sep 2016: Gathering of additional contributions and update handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q4 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Nov 2016: Release updated handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec 2016: Threat identification chart&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q1 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec-Mar 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check against changes to CAPEC v2.9&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q2 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Apr-Jun 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecEU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q3 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Chase up ongoing project review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecUS&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q4 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Release v1.2 &amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q1 2018 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create OAT wiki pages&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Future ===&lt;br /&gt;
* Write executive summary&lt;br /&gt;
* Release executive summary document&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-SR-2]] [[Category:SAMM-TA-1]] [[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=248629</id>
		<title>OWASP Cornucopia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=248629"/>
				<updated>2019-03-11T21:34:45Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Feedback */ Mailing list&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cornucopia-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#Lab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Cornucopia==&lt;br /&gt;
OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology agnostic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
The idea behind Cornucopia is to help development teams, especially those using Agile methodologies, to identify application security requirements and develop security-based user stories. Although the idea had been waiting for enough time to progress it, the final motivation came when [http://www.safecode.org/ SAFECode] published its [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf Practical Security Stories and Security Tasks for Agile Development Environments] in July 2012.&lt;br /&gt;
&lt;br /&gt;
The Microsoft SDL team had already published its super [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] (EoP) but that did not seem to address the most appropriate kind of issues that web application development teams mostly have to address. EoP is a great concept and game strategy, and was [http://blogs.msdn.com/b/sdl/archive/2010/03/02/announcing-elevation-of-privilege-the-threat-modeling-game.aspx published under] a [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License].&lt;br /&gt;
Cornucopia {{#switchtablink:Ecommerce Website Edition|Ecommerce Website Edition}} is based the concepts and game ideas in EoP, but those have been modified to be more relevant to the types of issues ecommerce website developers encounter. It attempts to introduce threat-modelling ideas into development teams that use Agile methodologies, or are more focused on web application weaknesses than other types of software vulnerabilities or are not familiar with STRIDE and DREAD.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The Card Decks==&lt;br /&gt;
&lt;br /&gt;
''Ecommerce Website Edition''&lt;br /&gt;
&lt;br /&gt;
Instead of EoP’s STRIDE suits, Cornucopia suits were selected based on the structure of the [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide] (SCP), but with additional consideration of sections in the [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard], the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide] and David Rook’s [http://www.securityninja.co.uk/secure-development/the-principles-place/ Principles of Secure Development]. These provided five suits, and a sixth called “Cornucopia” was created for everything else: &lt;br /&gt;
&lt;br /&gt;
* Data validation and encoding&lt;br /&gt;
* Authentication&lt;br /&gt;
* Session management&lt;br /&gt;
* Authorization&lt;br /&gt;
* Cryptography&lt;br /&gt;
* Cornucopia&lt;br /&gt;
&lt;br /&gt;
Each suit contains 13 cards (Ace, 2-10, Jack, Queen and King) but, unlike EoP, there are also two Joker cards. The content was mainly drawn from the SCP. Full [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]].&lt;br /&gt;
&lt;br /&gt;
''Other Decks''&lt;br /&gt;
&lt;br /&gt;
Future editions such as for mobile app development will use different sources of information and suits.&lt;br /&gt;
&lt;br /&gt;
==Mappings==&lt;br /&gt;
The other driver for Cornucopia is to link the attacks with requirements and verification techniques. An initial aim had been to reference [http://cwe.mitre.org/ CWE] weakness IDs, but these proved too numerous, and instead it was decided to map each card to [http://capec.mitre.org/ CAPEC] software attack pattern IDs which themselves are mapped to CWEs, so the desired result is achieved.&lt;br /&gt;
&lt;br /&gt;
Each card is also mapped to the 36 primary security stories in the [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode document], as well as to the OWASP [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide SCP v2], [https://www.owasp.org/images/3/33/OWASP_Application_Security_Verification_Standard_3.0.1.pdf ASVS v3.0.1] and [https://www.owasp.org/index.php/OWASP_AppSensor_Project AppSensor] (application attack detection and response) to help teams create their own security-related stories for use in Agile processes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Cornucopia is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] mentioned above, [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), [https://www.owasp.org/index.php/OWASP_Snakes_and_Ladders OWASP Snakes and Ladders], and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Cornucopia? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia is a card game used to help derive application security requirements during the software development life cycle. To start using Cornucopia:&lt;br /&gt;
&lt;br /&gt;
* Download the document&lt;br /&gt;
* Print the cards onto plain paper or pre-scored card&lt;br /&gt;
* Cut/separate the individual cards&lt;br /&gt;
* Identify an application, module or component to assess&lt;br /&gt;
* Invite business owners, architects, developers, testers along for a card game&lt;br /&gt;
* Get those infosec folk to provide chocolate, pizza, beer, flowers or all four as prizes&lt;br /&gt;
* Select a portion of the deck to start with&lt;br /&gt;
* {{#switchtablink:How to Play|Play the game}} to discuss &amp;amp;amp; document security requirements (and to win rounds)&lt;br /&gt;
* Remember, points make prizes!&lt;br /&gt;
&lt;br /&gt;
Listen to the [http://trustedsoftwarealliance.com/2014/03/21/the-owasp-cornucopia-project-with-colin-watson/ OWASP 24/7 Podcast] about Cornucopia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-presentation-small.jpg|link=media:Owaspnl-colinwatson-cornucopia.odp]]&lt;br /&gt;
&lt;br /&gt;
The game rules are in the document download. But the OpenOffice [[media:Owasplondon-colinwatson-cornucopia.odp|project presentation]] includes an animated version of four demonstration rounds. The presentation is recorded [http://youtu.be/Q_LE-8xNXVk on video].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dariodf Darío De Filippis] [mailto:dariodefilippis@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://youtu.be/i5Y0akWj31k How to Play] video&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Cornucopia-scoresheet.pdf Scoresheet]&lt;br /&gt;
* {{#switchtablink:Get the Cards|All sources and downloads...}}&lt;br /&gt;
&lt;br /&gt;
== Reference Files ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:OWASP_SCP_Quick_Reference_Guide_v2.pdf OWASP SCP requirements]&lt;br /&gt;
* [https://www.owasp.org/images/5/58/OWASP_ASVS_Version_2.pdf OWASP ASVS verification IDs]&lt;br /&gt;
* [https://www.owasp.org/index.php/AppSensor_DetectionPoints OWASP AppSensor attack detection point IDs] &lt;br /&gt;
* [http://capec.mitre.org/data/archive/capec_v1.7.1.zip CAPEC IDs]&lt;br /&gt;
* [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode security-focused story IDs]&lt;br /&gt;
&lt;br /&gt;
The OWASP SCP does not include identity values for the requirements, so please use [https://www.owasp.org/index.php/File:Owasp-requirements-numbering.zip this list].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [26 Jun 2018] v1.20 FR released&lt;br /&gt;
* [14 May 2018] Printed deck purchase details updated&lt;br /&gt;
* [13 Jan 2018 v1.20 PT-BR released&lt;br /&gt;
* [23 Aug 2016] Presentation at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [29 Jun 2016] v1.20 released&lt;br /&gt;
* [21 Jan 2016] [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]] published&lt;br /&gt;
* [30 Dec 2015] Darío De Filippis becomes project co-leader&lt;br /&gt;
* [24 Sep 2015] [http://appsecusa2015.sched.org/event/7f3dba889c0ec9e37900e289c9660503#.VZ6aoXhflNY Lightning training] at AppSec USA 2015&lt;br /&gt;
* [01 Jun 2015] [https://youtu.be/i5Y0akWj31k How to Play video] published&lt;br /&gt;
* [20 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - How to play video&lt;br /&gt;
* [31 Mar 2015] v1.10 released&lt;br /&gt;
* [02 Mar 2015] Decks available from [https://www.owasp.org/index.php/OWASP_Merchandise#Cornucopia_Cards OWASP merchandise store]&lt;br /&gt;
* [18 Feb 2015] Project awarded Labs status&lt;br /&gt;
&lt;br /&gt;
==PCIDSS==&lt;br /&gt;
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia Ecommerce Website Edition is referenced in the current [https://www.pcisecuritystandards.org Payment Card Industry Security Standards Council]  information supplement [https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf PCI DSS E-commerce Guidelines] v2, January 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Get the Cards =&lt;br /&gt;
&lt;br /&gt;
==Printed==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-square-logo-350.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Professionally printed decks are available by two methods:&lt;br /&gt;
* Single decks or in bulk from OWASP (v1.20)&lt;br /&gt;
** As promotion items '''by OWASP Leaders''' from their own chapter budgets [https://docs.google.com/a/owasp.org/forms/d/e/1FAIpQLSez9mV97HuqvYhCldE2hYhX3UjQM1oO5bLy44HkOZSpni0OzQ/viewform?formkey=dF85bGtvdWdrd2JjYldNZ1gxSkJxaEE6MQ Chapter and Project Merchandise Request form]&lt;br /&gt;
** For other individuals, organisations and companies, please email [mailto:dawn.aitken@owasp.org dawn.aitken@owasp.org] with purchase enquiries&lt;br /&gt;
* Request a free deck of cards gifted by [http://blackfootuk.com/ Blackfoot UK Limited] or download their donated print-ready artwork:&lt;br /&gt;
** Request a free [http://blackfootuk.com/cornucopia/receive-a-set-of-cards/ pack of cards (v1.10)] (gifted by Blackfoot UK)&lt;br /&gt;
&lt;br /&gt;
==Source files==&lt;br /&gt;
&lt;br /&gt;
Cornucopia - Ecommerce Website Edition:&lt;br /&gt;
* v1.2 (current version)&lt;br /&gt;
** [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN DOC] | [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR DOC] | [https://github.com/wagnerfusca/OWASP-Cornucopia-Translate-Cards---PT PT-BR DOC]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN PDF]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.1 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki]]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjb283ZE5GNmFMM2FGWGl2WC14aDJDQ0ZsNk00 Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.04 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/cornucopia-ecom-1v04-blackfoot.zip Print-Ready design files]  (gifted by Blackfoot UK) 47Mb Zip&lt;br /&gt;
&lt;br /&gt;
The current version of Cornucopia Ecommerce Website Edition cards (v1.20 with updated mapping to ASVS v3.0.1 and CAPEC v2.8, and has some minor text changes on the cards) can be printed using the following methods:&lt;br /&gt;
# Download the free Adobe Illustrator files ([https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ EN]) and get them professionally printed&lt;br /&gt;
# Download and self-print the free document word-processing ([https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN], [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR]) or PDF ([https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN])&lt;br /&gt;
## Print the document onto business card blank cards; or&lt;br /&gt;
## Print the document onto normal card and cut the cards out individually using the guide; or&lt;br /&gt;
# Generate your own cards from the free [https://www.owasp.org/index.php/File:Cornucopia-deck-ecommercewebsite-XML.zip source XML data file]&lt;br /&gt;
&lt;br /&gt;
There are also other ways to obtain particular versions:&lt;br /&gt;
* Download the free [https://www.owasp.org/index.php/File:Owasp_cornucopia_printreadyimages.zip PDF (v1.03)] (gifted by Travelex) &lt;br /&gt;
** Have the cards commercially printed; or&lt;br /&gt;
** Import into your own files (such as [http://lists.owasp.org/pipermail/owasp_cornucopia/2014-January/000018.html this way] suggested by Cam Morris via the mailing list)&lt;br /&gt;
&lt;br /&gt;
OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
Collect/share/use the pseudo-random cards tweeted twice daily [https://twitter.com/OWASPCornucopia @OWASPCornucopia]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How to Play =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-cornucopia-K.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-session-9.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
It is possible to play Cornucopia in many different ways. Here is one way, and explained in a [https://youtu.be/i5Y0akWj31k YouTube video].&lt;br /&gt;
&lt;br /&gt;
== Primary method ==&lt;br /&gt;
&lt;br /&gt;
;A - Preparations&lt;br /&gt;
:A1.	Obtain a deck, or print your own Cornucopia deck and separate/cut out the cards&lt;br /&gt;
:A2.	Identify an application or application process to review; this might be a concept, design or an actual implementation&lt;br /&gt;
:A3.	Create a data flow diagram&lt;br /&gt;
:A4.	Identify and invite a group of 3-6 architects, developers, testers and other business stakeholders together and sit around a table (try to include someone fairly familiar with application security)&lt;br /&gt;
:A5.	Have some prizes to hand (gold stars, chocolate, pizza, beer or flowers depending upon your office culture)&lt;br /&gt;
;B - Play&lt;br /&gt;
:One suit - Cornucopia - acts as trumps. Aces are high (i.e. they beat Kings). It helps if there is someone dedicated to documenting the results who is not playing.&lt;br /&gt;
:B1.	Remove the Jokers and a few low-score (2, 3, 4) cards from Cornucopia suit to ensure each player will have the same number of cards&lt;br /&gt;
:B2.	Shuffle the pack and deal all the cards&lt;br /&gt;
:B3.	To begin, choose a player randomly who will play the first card - they can play any card from their hand except from the trump suit - Cornucopia&lt;br /&gt;
:B4.	To play a card, each player must read it out aloud, and explain how (or not) the threat could apply (the player gets a point for attacks that work, and the group thinks it is an actionable bug) - don’t try to think of mitigations at this stage, and don’t exclude a threat just because it is believed it is already mitigated - someone record the card on the score sheet&lt;br /&gt;
:B5.	Play clockwise, each person must play a card in the same way; if you have any card of the matching lead suit you must play one of those, otherwise they can play a card from any other suit. Only a higher card of the same suit, or the highest card in the trump suit Cornucopia, wins the hand.&lt;br /&gt;
:B6.	The person who wins the round, leads the next round (i.e. they play first), and thus defines the next lead suit&lt;br /&gt;
:B7.	Repeat until all the cards are played&lt;br /&gt;
;C - Scoring&lt;br /&gt;
:The objective is to identify applicable threats, and win hands (rounds):&lt;br /&gt;
:C1.	Score +1 for each card you can identify as a valid threat to the application under consideration&lt;br /&gt;
:C2.	Score +1 if you win a round&lt;br /&gt;
:C3.	Once all cards have been played, whoever has the most points wins&lt;br /&gt;
;D - Closure&lt;br /&gt;
:D1.	Review all the applicable threats and the matching security requirements&lt;br /&gt;
:D2.	Create user stories, specifications and test cases as required for your development methodology&lt;br /&gt;
&lt;br /&gt;
See Márk Vinkovits leading a threat modelling [https://www.youtube.com/watch?v=9dVDqeO6y3A talk and group session] playing Cornucopia in the OWASP track @hacktivityconf 1510.&lt;br /&gt;
&lt;br /&gt;
==Alternative game rules==&lt;br /&gt;
&lt;br /&gt;
* If you are new to the game, remove the two Joker cards to begin with. Add the Joker cards back in once people become more familiar with the process. Apart from the “trumps card game” rules described above which are very similar to the EoP, the deck can also be played as the “twenty-one card game” (also known as “pontoon” or “blackjack”) which normally reduces the number of cards played in each round.&lt;br /&gt;
* Practice on an imaginary application, or even a future planned application, rather than trying to find fault with existing applications until the participants are happy with the usefulness of the game.&lt;br /&gt;
* Consider just playing with one suit to make a shorter session – but try to cover all the suits for every project. Or even better just play one hand with some pre-selected cards, and score only on the ability to identify security requirements. Perhaps have one game of each suit each day for a week or so, if the participants cannot spare long enough for a full deck.&lt;br /&gt;
* Some teams have preferred to play a full hand of cards, and then discuss what is on the cards after each round (instead of after each person plays a card).&lt;br /&gt;
* Another suggestion is that if a player fails to identify the card is relevant, allow other players to suggest ideas, and potentially let them gain the point for the card. Consider allowing extra points for especially good contributions.&lt;br /&gt;
* You can even play by yourself. Just use the cards to act as thought-provokers. Involving more people will be beneficial though.&lt;br /&gt;
* In Microsoft's EoP guidance, they recommend cheating as a good game strategy&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authorization-8.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-cryptography-j.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
; Can I copy or edit the game?&lt;br /&gt;
:Yes of course. All OWASP materials are free to do with as you like provided you comply with the Creative Commons Attribution-ShareAlike 3.0 license. Perhaps if you create a new version, you might donate it to the OWASP Cornucopia Project?&lt;br /&gt;
&lt;br /&gt;
; How can I get involved?&lt;br /&gt;
: Please send ideas or offers of help to the project’s mailing list.&lt;br /&gt;
&lt;br /&gt;
; How were the attackers’ names chosen?&lt;br /&gt;
: EoP begins every description with words like &amp;quot;An attacker can...&amp;quot;. These have to be phrased as an attack but I was not keen on the anonymous terminology, wanting something more engaging, and therefore used personal names. These can be thought of as external or internal people or aliases for computer systems. But instead of just random names, I thought how they might reflect the OWASP community aspect. Therefore, apart from &amp;quot;Alice and Bob&amp;quot;, I use the given (first) names of current and recent OWASP employees and Board members (assigned in no order), and then randomly selected the remaining 50 or so names from the current list of paying individual OWASP members. No name was used more than once, and where people had provided two personal names, I dropped one part to try to ensure no-one can be easily identified. Names were not deliberately allocated to any particular attack, defence or requirement. The cultural and gender mix simply reflects theses sources of names, and is not meant to be world-representative.&lt;br /&gt;
&lt;br /&gt;
; Why aren’t there any images on the card faces?&lt;br /&gt;
: There is quite a lot of text on the cards, and the cross-referencing takes up space too. But it would be great to have additional design elements included. Any volunteers?&lt;br /&gt;
&lt;br /&gt;
; Are the attacks ranked by the number on the card?&lt;br /&gt;
: Only approximately. The risk will be application and organisation dependent, due to varying security and compliance requirements, so your own severity rating may place the cards in some other order than the numbers on the cards.&lt;br /&gt;
&lt;br /&gt;
; How long does it take to play a round of cards using the full deck?&lt;br /&gt;
: This depends upon the amount of discussion and how familiar the players are with application security concepts. But perhaps allow 1.5 to 2.0 hours for 4-6 people.&lt;br /&gt;
&lt;br /&gt;
; What sort of people should play the game?&lt;br /&gt;
:Always try to have a mix of roles who can contribute alternative perspectives. But include someone who has a reasonable knowledge of application vulnerability terminology. Otherwise try to include a mix of architects, developers, testers and a relevant project manager or business owner.&lt;br /&gt;
&lt;br /&gt;
; Who should take notes and record scores?&lt;br /&gt;
: It is better if that someone else, not playing the game, takes notes about the requirements identified and issues discussed. This could be used as training for a more junior developer, or performed by the project manager. Some organisations have made a recording to review afterwards when the requirements are written up more formally.&lt;br /&gt;
&lt;br /&gt;
; Should we always use the full deck of cards?&lt;br /&gt;
: No. A smaller deck is quicker to play. Start your first game with only enough cards for two or three rounds. Always consider removing cards that are not appropriate at all of the target application or function being reviewed. For the first few times people play the game it is also usually better to remove the Aces and the two Jokers. It is also usual to play the game without any trumps suit until people are more familiar with the idea.&lt;br /&gt;
&lt;br /&gt;
; What should players do when they have an Ace card that says “invented a new X attack”?&lt;br /&gt;
: The player can make up any attack they think is valid, but must match the suit of the card e.g. data validation and encoding). With players new to the game, it can be better to remove these to begin with.&lt;br /&gt;
&lt;br /&gt;
; I don’t understand what the attack means on each card - is there more detailed information?&lt;br /&gt;
: Yes, the Wiki Deck at was created to help players understand the attacks. See [https://www.owasp.org/index.php/Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck Wiki Deck].&lt;br /&gt;
&lt;br /&gt;
; My company wants to print its own version of OWASP Cornucopia - what license do we need to refer to?&lt;br /&gt;
: What is required/reasonable might depend upon how you propose to use the source Cornucopia material. See fuller answer immediately below.&lt;br /&gt;
&lt;br /&gt;
Some examples of re-using or reproducing Cornucopia are:&lt;br /&gt;
&lt;br /&gt;
# Print some decks and give them away to customers&lt;br /&gt;
# Reproduce the game exactly but with a corporate-branded package&lt;br /&gt;
# Use the idea and/or source files to produce a similar game but with different attacks/mappings&lt;br /&gt;
# Distribute modified design files&lt;br /&gt;
&lt;br /&gt;
If option 1 above, you can order these in bulk from OWASP and attach your own details below the &amp;quot;compliments of&amp;quot; section on the boxes. There are three aspects to consider for options 2, 3 or 4, or combinations of those - see below. The existing printed decks (and their boxes and leaflets include such text).&lt;br /&gt;
&lt;br /&gt;
''A - Cornucopia License''&lt;br /&gt;
&lt;br /&gt;
The precise wording will depend how the material is being used or reproduced. Under Creative Commons Attribution-ShareAlike 3.0 license it is necessary to attribute all previous contributions (in this case, Microsoft, Boeing, Mitre, etc). The easiest place to put the wording is on the leaflet (folded inside, or separate booklet). The current required long-form wording is:&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license http://creativecommons.org/licenses/by-sa/3.0/&lt;br /&gt;
&lt;br /&gt;
  The files used to create these materials were created from the OWASP project and are also open source, and are licensed under the same conditions. &lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia can be downloaded for free from the OWASP website and printed yourself. The OWASP Cornucopia project source in vendor neutral and unbranded.&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  © 2012-2018 OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
  This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license.&lt;br /&gt;
&lt;br /&gt;
  Acknowledgments:&lt;br /&gt;
&lt;br /&gt;
  Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
&lt;br /&gt;
  Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
&lt;br /&gt;
  Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
&lt;br /&gt;
  Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
&lt;br /&gt;
  Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
&lt;br /&gt;
  Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
&lt;br /&gt;
  Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
The box/container for the cards must have the wording:&lt;br /&gt;
&lt;br /&gt;
  Created by Colin Watson.&lt;br /&gt;
&lt;br /&gt;
  Contains: One pack of Cornucopia Ecommerce Website playing cards. OWASP Cornucopia is open source and can be downloaded free of charge from the OWASP website.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
The following short-form wording must also appear on any materials referencing the outputs (e.g. press releases, leaflets, reports, blog posts):&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license and is © 2012-2016 OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
If any files are distributed electronically, the long-form wording should also be aded in a license.txt file within the distribution.&lt;br /&gt;
&lt;br /&gt;
If the intention is to use the idea only (option 3 above), the long-form, box and short-form wording might be different, and probably simpler. And it might make more sense to start with the Microsoft-provided Elevation of Privilege files (and open source license).&lt;br /&gt;
&lt;br /&gt;
''B - Upcoming update to Cornucopia''&lt;br /&gt;
&lt;br /&gt;
Note that the current print design files are v1.04, and the current Word document is v1.10, but we are in the process of updating all of these to v1.20.&lt;br /&gt;
&lt;br /&gt;
Whatever is used as a starting point, please state the source version, for example: &lt;br /&gt;
&lt;br /&gt;
  Based on OWASP Cornucopia Ecommerce Website Edition v1.04&lt;br /&gt;
&lt;br /&gt;
''C - OWASP brand usage''&lt;br /&gt;
&lt;br /&gt;
Additionally individuals, companies and other organisations must not breach OWASP's brand usage guidelines. &lt;br /&gt;
&lt;br /&gt;
  https://www.owasp.org/index.php/Marketing/Resources#tab=BRAND_GUIDELINES&lt;br /&gt;
&lt;br /&gt;
In the case of Cornucopia, in 2014 Blackfoot Limited produced some printed decks of cards. Blackfoot's name and logo did not appear anywhere on the OWASP-branded cards, and the OWASP logo did not appear on the Blackfoot-branded box and leaflet. In fact there is no OWASP logo on any part of the Blackfoot branded decks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-data-A.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Cornucopia is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Thomas Berson&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Oana Cornea&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Todd Dahl&lt;br /&gt;
* Luis Enriquez&lt;br /&gt;
* Ken Ferris&lt;br /&gt;
* Darío De Filippis&lt;br /&gt;
* Sebastien Gioria&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Timo Goosen&lt;br /&gt;
* Anthony Harrison&lt;br /&gt;
* Martin Haslinger &lt;br /&gt;
* John Herrlin&lt;br /&gt;
* Jerry Hoff&lt;br /&gt;
* Marios Kourtesis&lt;br /&gt;
* Franck Lacosta&lt;br /&gt;
* Mathias Lemaire&lt;br /&gt;
* Antonis Manaras&lt;br /&gt;
* Jim Manico&lt;br /&gt;
* Mark Miller&lt;br /&gt;
* Cam Morris&lt;br /&gt;
* Susana Romaniz&lt;br /&gt;
* Ravishankar Sahadevan&lt;br /&gt;
* Tao Sauvage&lt;br /&gt;
* Wagner Voltz&lt;br /&gt;
* Stephen de Vries&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
Also:&lt;br /&gt;
&lt;br /&gt;
* Attendees at OWASP London, OWASP Manchester and OWASP Netherlands chapter meetings, the London Gamification meetup, and the training at AppSec USA 2015 in san Francisco who made helpful suggestions and asked challenging questions&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
* Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
* Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
* Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
* Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
* Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
* Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authentication-7.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-joker-a.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Version history (see [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx uploads]):&lt;br /&gt;
* Alpha version (0.40) was issued in August 2012&lt;br /&gt;
* Beta version (1.00) was released in February 2013&lt;br /&gt;
* Stable release (1.02) was released in August 2013, following feedback from mailing list and use with groups of developers&lt;br /&gt;
* Release v1.03 included minor changes&lt;br /&gt;
* Release v1.04 included a text correction on one card&lt;br /&gt;
* Release v1.05 included additional narrative and FAQs&lt;br /&gt;
* Current release v1.10 included cross-references updated for 2014 version of ASVS, contributors updated and minor text changes to cards to improve readability&lt;br /&gt;
* Current release v1.20 included cross-references updated for version 3.0.1 of ASVS and CAPEC v2.8, and many minor text changes including further contributors.&lt;br /&gt;
&lt;br /&gt;
As of July 2018, the priorities are:&lt;br /&gt;
* &amp;lt;strike&amp;gt;Develop Cornucopia Wiki Deck&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Update the document/deck to shorten some card text [completed ready for v1.10]&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVS 2014&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVSv3 2016&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check/update CAPEC mappings&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Translate into French&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Translate into French (completed), German (in progress), Japanese, Portuguese (in progress), Spanish (in progress) and other languages (help needed please)&lt;br /&gt;
* &amp;lt;strike&amp;gt;Make card decks available via OWASP Merchandise Store&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create a video &amp;quot;how to play&amp;quot;&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Update printed decks in non-EN languages&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Cornucopia is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Cornucopia into that language?&lt;br /&gt;
==Use and Promote the Cornucopia Card Decks==&lt;br /&gt;
Please help raise awareness of Cornucopia by printing cards:&lt;br /&gt;
* Use Cornucopia with specifiers, architects, designers, developers, testers and others, in part to train them, but also to solicit feedback on their usability, practicality and appropriateness for their work&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a mobile app to play the game&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://groups.google.com/a/owasp.org/forum/#!forum/cornucopia-project friendly project mailing list] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What cards don't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other decks would you like to see?&lt;br /&gt;
&lt;br /&gt;
==Keep the Cards Updated==&lt;br /&gt;
As the source referenced documents change, we have to update the decks. You may also find errors and omissions. In the first instance, please send a message to the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] if you have identified errors &amp;amp;amp; omissions, have some time to maintain the source documents, or can help in other ways.&lt;br /&gt;
==Create a New Deck==&lt;br /&gt;
The only version currently available is the Cornucopia Ecommerce Website Edition in English. We would like to create a new mobile app specific deck, probably using the wonderful [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] as inspiration for the card source materials. Do you have an idea for your own application security requirements card deck? Perhaps for {{#switchtablink:Mobile App Edition|mobile apps}} or something else?&lt;br /&gt;
&lt;br /&gt;
= About Ecommerce Website Edition =&lt;br /&gt;
{{:Projects/OWASP Cornucopia Ecommerce Website Edition | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]] &lt;br /&gt;
[[Category: Threat_Modeling]] &lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:SAMM-SR-1]] &lt;br /&gt;
[[Category:SAMM-SR-2]] &lt;br /&gt;
[[Category:SAMM-TA-1]] &lt;br /&gt;
[[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=242134</id>
		<title>OWASP Cornucopia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=242134"/>
				<updated>2018-07-27T09:55:13Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Primary method */ Link to Márk Vinkovits video&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cornucopia-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#Lab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Cornucopia==&lt;br /&gt;
OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology agnostic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
The idea behind Cornucopia is to help development teams, especially those using Agile methodologies, to identify application security requirements and develop security-based user stories. Although the idea had been waiting for enough time to progress it, the final motivation came when [http://www.safecode.org/ SAFECode] published its [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf Practical Security Stories and Security Tasks for Agile Development Environments] in July 2012.&lt;br /&gt;
&lt;br /&gt;
The Microsoft SDL team had already published its super [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] (EoP) but that did not seem to address the most appropriate kind of issues that web application development teams mostly have to address. EoP is a great concept and game strategy, and was [http://blogs.msdn.com/b/sdl/archive/2010/03/02/announcing-elevation-of-privilege-the-threat-modeling-game.aspx published under] a [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License].&lt;br /&gt;
Cornucopia {{#switchtablink:Ecommerce Website Edition|Ecommerce Website Edition}} is based the concepts and game ideas in EoP, but those have been modified to be more relevant to the types of issues ecommerce website developers encounter. It attempts to introduce threat-modelling ideas into development teams that use Agile methodologies, or are more focused on web application weaknesses than other types of software vulnerabilities or are not familiar with STRIDE and DREAD.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The Card Decks==&lt;br /&gt;
&lt;br /&gt;
''Ecommerce Website Edition''&lt;br /&gt;
&lt;br /&gt;
Instead of EoP’s STRIDE suits, Cornucopia suits were selected based on the structure of the [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide] (SCP), but with additional consideration of sections in the [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard], the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide] and David Rook’s [http://www.securityninja.co.uk/secure-development/the-principles-place/ Principles of Secure Development]. These provided five suits, and a sixth called “Cornucopia” was created for everything else: &lt;br /&gt;
&lt;br /&gt;
* Data validation and encoding&lt;br /&gt;
* Authentication&lt;br /&gt;
* Session management&lt;br /&gt;
* Authorization&lt;br /&gt;
* Cryptography&lt;br /&gt;
* Cornucopia&lt;br /&gt;
&lt;br /&gt;
Each suit contains 13 cards (Ace, 2-10, Jack, Queen and King) but, unlike EoP, there are also two Joker cards. The content was mainly drawn from the SCP. Full [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]].&lt;br /&gt;
&lt;br /&gt;
''Other Decks''&lt;br /&gt;
&lt;br /&gt;
Future editions such as for mobile app development will use different sources of information and suits.&lt;br /&gt;
&lt;br /&gt;
==Mappings==&lt;br /&gt;
The other driver for Cornucopia is to link the attacks with requirements and verification techniques. An initial aim had been to reference [http://cwe.mitre.org/ CWE] weakness IDs, but these proved too numerous, and instead it was decided to map each card to [http://capec.mitre.org/ CAPEC] software attack pattern IDs which themselves are mapped to CWEs, so the desired result is achieved.&lt;br /&gt;
&lt;br /&gt;
Each card is also mapped to the 36 primary security stories in the [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode document], as well as to the OWASP [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide SCP v2], [https://www.owasp.org/images/3/33/OWASP_Application_Security_Verification_Standard_3.0.1.pdf ASVS v3.0.1] and [https://www.owasp.org/index.php/OWASP_AppSensor_Project AppSensor] (application attack detection and response) to help teams create their own security-related stories for use in Agile processes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Cornucopia is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] mentioned above, [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), [https://www.owasp.org/index.php/OWASP_Snakes_and_Ladders OWASP Snakes and Ladders], and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Cornucopia? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia is a card game used to help derive application security requirements during the software development life cycle. To start using Cornucopia:&lt;br /&gt;
&lt;br /&gt;
* Download the document&lt;br /&gt;
* Print the cards onto plain paper or pre-scored card&lt;br /&gt;
* Cut/separate the individual cards&lt;br /&gt;
* Identify an application, module or component to assess&lt;br /&gt;
* Invite business owners, architects, developers, testers along for a card game&lt;br /&gt;
* Get those infosec folk to provide chocolate, pizza, beer, flowers or all four as prizes&lt;br /&gt;
* Select a portion of the deck to start with&lt;br /&gt;
* {{#switchtablink:How to Play|Play the game}} to discuss &amp;amp;amp; document security requirements (and to win rounds)&lt;br /&gt;
* Remember, points make prizes!&lt;br /&gt;
&lt;br /&gt;
Listen to the [http://trustedsoftwarealliance.com/2014/03/21/the-owasp-cornucopia-project-with-colin-watson/ OWASP 24/7 Podcast] about Cornucopia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-presentation-small.jpg|link=media:Owaspnl-colinwatson-cornucopia.odp]]&lt;br /&gt;
&lt;br /&gt;
The game rules are in the document download. But the OpenOffice [[media:Owasplondon-colinwatson-cornucopia.odp|project presentation]] includes an animated version of four demonstration rounds. The presentation is recorded [http://youtu.be/Q_LE-8xNXVk on video].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dariodf Darío De Filippis] [mailto:dariodefilippis@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://youtu.be/i5Y0akWj31k How to Play] video&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Cornucopia-scoresheet.pdf Scoresheet]&lt;br /&gt;
* {{#switchtablink:Get the Cards|All sources and downloads...}}&lt;br /&gt;
&lt;br /&gt;
== Reference Files ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:OWASP_SCP_Quick_Reference_Guide_v2.pdf OWASP SCP requirements]&lt;br /&gt;
* [https://www.owasp.org/images/5/58/OWASP_ASVS_Version_2.pdf OWASP ASVS verification IDs]&lt;br /&gt;
* [https://www.owasp.org/index.php/AppSensor_DetectionPoints OWASP AppSensor attack detection point IDs] &lt;br /&gt;
* [http://capec.mitre.org/data/archive/capec_v1.7.1.zip CAPEC IDs]&lt;br /&gt;
* [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode security-focused story IDs]&lt;br /&gt;
&lt;br /&gt;
The OWASP SCP does not include identity values for the requirements, so please use [https://www.owasp.org/index.php/File:Owasp-requirements-numbering.zip this list].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [26 Jun 2018] v1.20 FR released&lt;br /&gt;
* [14 May 2018] Printed deck purchase details updated&lt;br /&gt;
* [13 Jan 2018 v1.20 PT-BR released&lt;br /&gt;
* [23 Aug 2016] Presentation at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [29 Jun 2016] v1.20 released&lt;br /&gt;
* [21 Jan 2016] [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]] published&lt;br /&gt;
* [30 Dec 2015] Darío De Filippis becomes project co-leader&lt;br /&gt;
* [24 Sep 2015] [http://appsecusa2015.sched.org/event/7f3dba889c0ec9e37900e289c9660503#.VZ6aoXhflNY Lightning training] at AppSec USA 2015&lt;br /&gt;
* [01 Jun 2015] [https://youtu.be/i5Y0akWj31k How to Play video] published&lt;br /&gt;
* [20 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - How to play video&lt;br /&gt;
* [31 Mar 2015] v1.10 released&lt;br /&gt;
* [02 Mar 2015] Decks available from [https://www.owasp.org/index.php/OWASP_Merchandise#Cornucopia_Cards OWASP merchandise store]&lt;br /&gt;
* [18 Feb 2015] Project awarded Labs status&lt;br /&gt;
&lt;br /&gt;
==PCIDSS==&lt;br /&gt;
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia Ecommerce Website Edition is referenced in the current [https://www.pcisecuritystandards.org Payment Card Industry Security Standards Council]  information supplement [https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf PCI DSS E-commerce Guidelines] v2, January 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Get the Cards =&lt;br /&gt;
&lt;br /&gt;
==Printed==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-square-logo-350.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Professionally printed decks are available by two methods:&lt;br /&gt;
* Single decks or in bulk from OWASP (v1.20)&lt;br /&gt;
** As promotion items '''by OWASP Leaders''' from their own chapter budgets [https://docs.google.com/a/owasp.org/forms/d/e/1FAIpQLSez9mV97HuqvYhCldE2hYhX3UjQM1oO5bLy44HkOZSpni0OzQ/viewform?formkey=dF85bGtvdWdrd2JjYldNZ1gxSkJxaEE6MQ Chapter and Project Merchandise Request form]&lt;br /&gt;
** For other individuals, organisations and companies, please email [mailto:dawn.aitken@owasp.org dawn.aitken@owasp.org] with purchase enquiries&lt;br /&gt;
* Request a free deck of cards gifted by [http://blackfootuk.com/ Blackfoot UK Limited] or download their donated print-ready artwork:&lt;br /&gt;
** Request a free [http://blackfootuk.com/cornucopia/receive-a-set-of-cards/ pack of cards (v1.10)] (gifted by Blackfoot UK)&lt;br /&gt;
&lt;br /&gt;
==Source files==&lt;br /&gt;
&lt;br /&gt;
Cornucopia - Ecommerce Website Edition:&lt;br /&gt;
* v1.2 (current version)&lt;br /&gt;
** [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN DOC] | [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR DOC] | [https://github.com/wagnerfusca/OWASP-Cornucopia-Translate-Cards---PT PT-BR DOC]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN PDF]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.1 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki]]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjb283ZE5GNmFMM2FGWGl2WC14aDJDQ0ZsNk00 Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.04 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/cornucopia-ecom-1v04-blackfoot.zip Print-Ready design files]  (gifted by Blackfoot UK) 47Mb Zip&lt;br /&gt;
&lt;br /&gt;
The current version of Cornucopia Ecommerce Website Edition cards (v1.20 with updated mapping to ASVS v3.0.1 and CAPEC v2.8, and has some minor text changes on the cards) can be printed using the following methods:&lt;br /&gt;
# Download the free Adobe Illustrator files ([https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ EN]) and get them professionally printed&lt;br /&gt;
# Download and self-print the free document word-processing ([https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN], [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR]) or PDF ([https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN])&lt;br /&gt;
## Print the document onto business card blank cards; or&lt;br /&gt;
## Print the document onto normal card and cut the cards out individually using the guide; or&lt;br /&gt;
# Generate your own cards from the free [https://www.owasp.org/index.php/File:Cornucopia-deck-ecommercewebsite-XML.zip source XML data file]&lt;br /&gt;
&lt;br /&gt;
There are also other ways to obtain particular versions:&lt;br /&gt;
* Download the free [https://www.owasp.org/index.php/File:Owasp_cornucopia_printreadyimages.zip PDF (v1.03)] (gifted by Travelex) &lt;br /&gt;
** Have the cards commercially printed; or&lt;br /&gt;
** Import into your own files (such as [http://lists.owasp.org/pipermail/owasp_cornucopia/2014-January/000018.html this way] suggested by Cam Morris via the mailing list)&lt;br /&gt;
&lt;br /&gt;
OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
Collect/share/use the pseudo-random cards tweeted twice daily [https://twitter.com/OWASPCornucopia @OWASPCornucopia]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How to Play =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-cornucopia-K.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-session-9.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
It is possible to play Cornucopia in many different ways. Here is one way, and explained in a [https://youtu.be/i5Y0akWj31k YouTube video].&lt;br /&gt;
&lt;br /&gt;
== Primary method ==&lt;br /&gt;
&lt;br /&gt;
;A - Preparations&lt;br /&gt;
:A1.	Obtain a deck, or print your own Cornucopia deck and separate/cut out the cards&lt;br /&gt;
:A2.	Identify an application or application process to review; this might be a concept, design or an actual implementation&lt;br /&gt;
:A3.	Create a data flow diagram&lt;br /&gt;
:A4.	Identify and invite a group of 3-6 architects, developers, testers and other business stakeholders together and sit around a table (try to include someone fairly familiar with application security)&lt;br /&gt;
:A5.	Have some prizes to hand (gold stars, chocolate, pizza, beer or flowers depending upon your office culture)&lt;br /&gt;
;B - Play&lt;br /&gt;
:One suit - Cornucopia - acts as trumps. Aces are high (i.e. they beat Kings). It helps if there is someone dedicated to documenting the results who is not playing.&lt;br /&gt;
:B1.	Remove the Jokers and a few low-score (2, 3, 4) cards from Cornucopia suit to ensure each player will have the same number of cards&lt;br /&gt;
:B2.	Shuffle the pack and deal all the cards&lt;br /&gt;
:B3.	To begin, choose a player randomly who will play the first card - they can play any card from their hand except from the trump suit - Cornucopia&lt;br /&gt;
:B4.	To play a card, each player must read it out aloud, and explain how (or not) the threat could apply (the player gets a point for attacks that work, and the group thinks it is an actionable bug) - don’t try to think of mitigations at this stage, and don’t exclude a threat just because it is believed it is already mitigated - someone record the card on the score sheet&lt;br /&gt;
:B5.	Play clockwise, each person must play a card in the same way; if you have any card of the matching lead suit you must play one of those, otherwise they can play a card from any other suit. Only a higher card of the same suit, or the highest card in the trump suit Cornucopia, wins the hand.&lt;br /&gt;
:B6.	The person who wins the round, leads the next round (i.e. they play first), and thus defines the next lead suit&lt;br /&gt;
:B7.	Repeat until all the cards are played&lt;br /&gt;
;C - Scoring&lt;br /&gt;
:The objective is to identify applicable threats, and win hands (rounds):&lt;br /&gt;
:C1.	Score +1 for each card you can identify as a valid threat to the application under consideration&lt;br /&gt;
:C2.	Score +1 if you win a round&lt;br /&gt;
:C3.	Once all cards have been played, whoever has the most points wins&lt;br /&gt;
;D - Closure&lt;br /&gt;
:D1.	Review all the applicable threats and the matching security requirements&lt;br /&gt;
:D2.	Create user stories, specifications and test cases as required for your development methodology&lt;br /&gt;
&lt;br /&gt;
See Márk Vinkovits leading a threat modelling [https://www.youtube.com/watch?v=9dVDqeO6y3A talk and group session] playing Cornucopia in the OWASP track @hacktivityconf 1510.&lt;br /&gt;
&lt;br /&gt;
==Alternative game rules==&lt;br /&gt;
&lt;br /&gt;
* If you are new to the game, remove the two Joker cards to begin with. Add the Joker cards back in once people become more familiar with the process. Apart from the “trumps card game” rules described above which are very similar to the EoP, the deck can also be played as the “twenty-one card game” (also known as “pontoon” or “blackjack”) which normally reduces the number of cards played in each round.&lt;br /&gt;
* Practice on an imaginary application, or even a future planned application, rather than trying to find fault with existing applications until the participants are happy with the usefulness of the game.&lt;br /&gt;
* Consider just playing with one suit to make a shorter session – but try to cover all the suits for every project. Or even better just play one hand with some pre-selected cards, and score only on the ability to identify security requirements. Perhaps have one game of each suit each day for a week or so, if the participants cannot spare long enough for a full deck.&lt;br /&gt;
* Some teams have preferred to play a full hand of cards, and then discuss what is on the cards after each round (instead of after each person plays a card).&lt;br /&gt;
* Another suggestion is that if a player fails to identify the card is relevant, allow other players to suggest ideas, and potentially let them gain the point for the card. Consider allowing extra points for especially good contributions.&lt;br /&gt;
* You can even play by yourself. Just use the cards to act as thought-provokers. Involving more people will be beneficial though.&lt;br /&gt;
* In Microsoft's EoP guidance, they recommend cheating as a good game strategy&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authorization-8.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-cryptography-j.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
; Can I copy or edit the game?&lt;br /&gt;
:Yes of course. All OWASP materials are free to do with as you like provided you comply with the Creative Commons Attribution-ShareAlike 3.0 license. Perhaps if you create a new version, you might donate it to the OWASP Cornucopia Project?&lt;br /&gt;
&lt;br /&gt;
; How can I get involved?&lt;br /&gt;
: Please send ideas or offers of help to the project’s mailing list.&lt;br /&gt;
&lt;br /&gt;
; How were the attackers’ names chosen?&lt;br /&gt;
: EoP begins every description with words like &amp;quot;An attacker can...&amp;quot;. These have to be phrased as an attack but I was not keen on the anonymous terminology, wanting something more engaging, and therefore used personal names. These can be thought of as external or internal people or aliases for computer systems. But instead of just random names, I thought how they might reflect the OWASP community aspect. Therefore, apart from &amp;quot;Alice and Bob&amp;quot;, I use the given (first) names of current and recent OWASP employees and Board members (assigned in no order), and then randomly selected the remaining 50 or so names from the current list of paying individual OWASP members. No name was used more than once, and where people had provided two personal names, I dropped one part to try to ensure no-one can be easily identified. Names were not deliberately allocated to any particular attack, defence or requirement. The cultural and gender mix simply reflects theses sources of names, and is not meant to be world-representative.&lt;br /&gt;
&lt;br /&gt;
; Why aren’t there any images on the card faces?&lt;br /&gt;
: There is quite a lot of text on the cards, and the cross-referencing takes up space too. But it would be great to have additional design elements included. Any volunteers?&lt;br /&gt;
&lt;br /&gt;
; Are the attacks ranked by the number on the card?&lt;br /&gt;
: Only approximately. The risk will be application and organisation dependent, due to varying security and compliance requirements, so your own severity rating may place the cards in some other order than the numbers on the cards.&lt;br /&gt;
&lt;br /&gt;
; How long does it take to play a round of cards using the full deck?&lt;br /&gt;
: This depends upon the amount of discussion and how familiar the players are with application security concepts. But perhaps allow 1.5 to 2.0 hours for 4-6 people.&lt;br /&gt;
&lt;br /&gt;
; What sort of people should play the game?&lt;br /&gt;
:Always try to have a mix of roles who can contribute alternative perspectives. But include someone who has a reasonable knowledge of application vulnerability terminology. Otherwise try to include a mix of architects, developers, testers and a relevant project manager or business owner.&lt;br /&gt;
&lt;br /&gt;
; Who should take notes and record scores?&lt;br /&gt;
: It is better if that someone else, not playing the game, takes notes about the requirements identified and issues discussed. This could be used as training for a more junior developer, or performed by the project manager. Some organisations have made a recording to review afterwards when the requirements are written up more formally.&lt;br /&gt;
&lt;br /&gt;
; Should we always use the full deck of cards?&lt;br /&gt;
: No. A smaller deck is quicker to play. Start your first game with only enough cards for two or three rounds. Always consider removing cards that are not appropriate at all of the target application or function being reviewed. For the first few times people play the game it is also usually better to remove the Aces and the two Jokers. It is also usual to play the game without any trumps suit until people are more familiar with the idea.&lt;br /&gt;
&lt;br /&gt;
; What should players do when they have an Ace card that says “invented a new X attack”?&lt;br /&gt;
: The player can make up any attack they think is valid, but must match the suit of the card e.g. data validation and encoding). With players new to the game, it can be better to remove these to begin with.&lt;br /&gt;
&lt;br /&gt;
; I don’t understand what the attack means on each card - is there more detailed information?&lt;br /&gt;
: Yes, the Wiki Deck at was created to help players understand the attacks. See [https://www.owasp.org/index.php/Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck Wiki Deck].&lt;br /&gt;
&lt;br /&gt;
; My company wants to print its own version of OWASP Cornucopia - what license do we need to refer to?&lt;br /&gt;
: What is required/reasonable might depend upon how you propose to use the source Cornucopia material. See fuller answer immediately below.&lt;br /&gt;
&lt;br /&gt;
Some examples of re-using or reproducing Cornucopia are:&lt;br /&gt;
&lt;br /&gt;
# Print some decks and give them away to customers&lt;br /&gt;
# Reproduce the game exactly but with a corporate-branded package&lt;br /&gt;
# Use the idea and/or source files to produce a similar game but with different attacks/mappings&lt;br /&gt;
# Distribute modified design files&lt;br /&gt;
&lt;br /&gt;
If option 1 above, you can order these in bulk from OWASP and attach your own details below the &amp;quot;compliments of&amp;quot; section on the boxes. There are three aspects to consider for options 2, 3 or 4, or combinations of those - see below. The existing printed decks (and their boxes and leaflets include such text).&lt;br /&gt;
&lt;br /&gt;
''A - Cornucopia License''&lt;br /&gt;
&lt;br /&gt;
The precise wording will depend how the material is being used or reproduced. Under Creative Commons Attribution-ShareAlike 3.0 license it is necessary to attribute all previous contributions (in this case, Microsoft, Boeing, Mitre, etc). The easiest place to put the wording is on the leaflet (folded inside, or separate booklet). The current required long-form wording is:&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license http://creativecommons.org/licenses/by-sa/3.0/&lt;br /&gt;
&lt;br /&gt;
  The files used to create these materials were created from the OWASP project and are also open source, and are licensed under the same conditions. &lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia can be downloaded for free from the OWASP website and printed yourself. The OWASP Cornucopia project source in vendor neutral and unbranded.&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  © 2012-2018 OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
  This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license.&lt;br /&gt;
&lt;br /&gt;
  Acknowledgments:&lt;br /&gt;
&lt;br /&gt;
  Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
&lt;br /&gt;
  Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
&lt;br /&gt;
  Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
&lt;br /&gt;
  Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
&lt;br /&gt;
  Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
&lt;br /&gt;
  Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
&lt;br /&gt;
  Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
The box/container for the cards must have the wording:&lt;br /&gt;
&lt;br /&gt;
  Created by Colin Watson.&lt;br /&gt;
&lt;br /&gt;
  Contains: One pack of Cornucopia Ecommerce Website playing cards. OWASP Cornucopia is open source and can be downloaded free of charge from the OWASP website.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
The following short-form wording must also appear on any materials referencing the outputs (e.g. press releases, leaflets, reports, blog posts):&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license and is © 2012-2016 OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
If any files are distributed electronically, the long-form wording should also be aded in a license.txt file within the distribution.&lt;br /&gt;
&lt;br /&gt;
If the intention is to use the idea only (option 3 above), the long-form, box and short-form wording might be different, and probably simpler. And it might make more sense to start with the Microsoft-provided Elevation of Privilege files (and open source license).&lt;br /&gt;
&lt;br /&gt;
''B - Upcoming update to Cornucopia''&lt;br /&gt;
&lt;br /&gt;
Note that the current print design files are v1.04, and the current Word document is v1.10, but we are in the process of updating all of these to v1.20.&lt;br /&gt;
&lt;br /&gt;
Whatever is used as a starting point, please state the source version, for example: &lt;br /&gt;
&lt;br /&gt;
  Based on OWASP Cornucopia Ecommerce Website Edition v1.04&lt;br /&gt;
&lt;br /&gt;
''C - OWASP brand usage''&lt;br /&gt;
&lt;br /&gt;
Additionally individuals, companies and other organisations must not breach OWASP's brand usage guidelines. &lt;br /&gt;
&lt;br /&gt;
  https://www.owasp.org/index.php/Marketing/Resources#tab=BRAND_GUIDELINES&lt;br /&gt;
&lt;br /&gt;
In the case of Cornucopia, in 2014 Blackfoot Limited produced some printed decks of cards. Blackfoot's name and logo did not appear anywhere on the OWASP-branded cards, and the OWASP logo did not appear on the Blackfoot-branded box and leaflet. In fact there is no OWASP logo on any part of the Blackfoot branded decks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-data-A.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Cornucopia is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Thomas Berson&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Oana Cornea&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Todd Dahl&lt;br /&gt;
* Luis Enriquez&lt;br /&gt;
* Ken Ferris&lt;br /&gt;
* Darío De Filippis&lt;br /&gt;
* Sebastien Gioria&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Timo Goosen&lt;br /&gt;
* Anthony Harrison&lt;br /&gt;
* Martin Haslinger &lt;br /&gt;
* John Herrlin&lt;br /&gt;
* Jerry Hoff&lt;br /&gt;
* Marios Kourtesis&lt;br /&gt;
* Franck Lacosta&lt;br /&gt;
* Mathias Lemaire&lt;br /&gt;
* Antonis Manaras&lt;br /&gt;
* Jim Manico&lt;br /&gt;
* Mark Miller&lt;br /&gt;
* Cam Morris&lt;br /&gt;
* Susana Romaniz&lt;br /&gt;
* Ravishankar Sahadevan&lt;br /&gt;
* Tao Sauvage&lt;br /&gt;
* Wagner Voltz&lt;br /&gt;
* Stephen de Vries&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
Also:&lt;br /&gt;
&lt;br /&gt;
* Attendees at OWASP London, OWASP Manchester and OWASP Netherlands chapter meetings, the London Gamification meetup, and the training at AppSec USA 2015 in san Francisco who made helpful suggestions and asked challenging questions&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
* Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
* Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
* Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
* Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
* Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
* Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authentication-7.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-joker-a.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Version history (see [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx uploads]):&lt;br /&gt;
* Alpha version (0.40) was issued in August 2012&lt;br /&gt;
* Beta version (1.00) was released in February 2013&lt;br /&gt;
* Stable release (1.02) was released in August 2013, following feedback from mailing list and use with groups of developers&lt;br /&gt;
* Release v1.03 included minor changes&lt;br /&gt;
* Release v1.04 included a text correction on one card&lt;br /&gt;
* Release v1.05 included additional narrative and FAQs&lt;br /&gt;
* Current release v1.10 included cross-references updated for 2014 version of ASVS, contributors updated and minor text changes to cards to improve readability&lt;br /&gt;
* Current release v1.20 included cross-references updated for version 3.0.1 of ASVS and CAPEC v2.8, and many minor text changes including further contributors.&lt;br /&gt;
&lt;br /&gt;
As of July 2018, the priorities are:&lt;br /&gt;
* &amp;lt;strike&amp;gt;Develop Cornucopia Wiki Deck&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Update the document/deck to shorten some card text [completed ready for v1.10]&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVS 2014&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVSv3 2016&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check/update CAPEC mappings&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Translate into French&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Translate into French (completed), German (in progress), Japanese, Portuguese (in progress), Spanish (in progress) and other languages (help needed please)&lt;br /&gt;
* &amp;lt;strike&amp;gt;Make card decks available via OWASP Merchandise Store&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create a video &amp;quot;how to play&amp;quot;&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Update printed decks in non-EN languages&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Cornucopia is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Cornucopia into that language?&lt;br /&gt;
==Use and Promote the Cornucopia Card Decks==&lt;br /&gt;
Please help raise awareness of Cornucopia by printing cards:&lt;br /&gt;
* Use Cornucopia with specifiers, architects, designers, developers, testers and others, in part to train them, but also to solicit feedback on their usability, practicality and appropriateness for their work&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a mobile app to play the game&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What cards don't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other decks would you like to see?&lt;br /&gt;
==Keep the Cards Updated==&lt;br /&gt;
As the source referenced documents change, we have to update the decks. You may also find errors and omissions. In the first instance, please send a message to the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] if you have identified errors &amp;amp;amp; omissions, have some time to maintain the source documents, or can help in other ways.&lt;br /&gt;
==Create a New Deck==&lt;br /&gt;
The only version currently available is the Cornucopia Ecommerce Website Edition in English. We would like to create a new mobile app specific deck, probably using the wonderful [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] as inspiration for the card source materials. Do you have an idea for your own application security requirements card deck? Perhaps for {{#switchtablink:Mobile App Edition|mobile apps}} or something else?&lt;br /&gt;
&lt;br /&gt;
= About Ecommerce Website Edition =&lt;br /&gt;
{{:Projects/OWASP Cornucopia Ecommerce Website Edition | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]] &lt;br /&gt;
[[Category: Threat_Modeling]] &lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:SAMM-SR-1]] &lt;br /&gt;
[[Category:SAMM-SR-2]] &lt;br /&gt;
[[Category:SAMM-TA-1]] &lt;br /&gt;
[[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP-Cornucopia-Ecommerce_Website.docx&amp;diff=241804</id>
		<title>File:OWASP-Cornucopia-Ecommerce Website.docx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP-Cornucopia-Ecommerce_Website.docx&amp;diff=241804"/>
				<updated>2018-07-13T11:08:33Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: Clerkendweller uploaded a new version of File:OWASP-Cornucopia-Ecommerce Website.docx&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP Cornucopia - Ecommerce Website Edition&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=241803</id>
		<title>OWASP Cornucopia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=241803"/>
				<updated>2018-07-13T11:01:05Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Volunteers */ Added Martin Haslinger&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cornucopia-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#Lab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Cornucopia==&lt;br /&gt;
OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology agnostic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
The idea behind Cornucopia is to help development teams, especially those using Agile methodologies, to identify application security requirements and develop security-based user stories. Although the idea had been waiting for enough time to progress it, the final motivation came when [http://www.safecode.org/ SAFECode] published its [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf Practical Security Stories and Security Tasks for Agile Development Environments] in July 2012.&lt;br /&gt;
&lt;br /&gt;
The Microsoft SDL team had already published its super [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] (EoP) but that did not seem to address the most appropriate kind of issues that web application development teams mostly have to address. EoP is a great concept and game strategy, and was [http://blogs.msdn.com/b/sdl/archive/2010/03/02/announcing-elevation-of-privilege-the-threat-modeling-game.aspx published under] a [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License].&lt;br /&gt;
Cornucopia {{#switchtablink:Ecommerce Website Edition|Ecommerce Website Edition}} is based the concepts and game ideas in EoP, but those have been modified to be more relevant to the types of issues ecommerce website developers encounter. It attempts to introduce threat-modelling ideas into development teams that use Agile methodologies, or are more focused on web application weaknesses than other types of software vulnerabilities or are not familiar with STRIDE and DREAD.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The Card Decks==&lt;br /&gt;
&lt;br /&gt;
''Ecommerce Website Edition''&lt;br /&gt;
&lt;br /&gt;
Instead of EoP’s STRIDE suits, Cornucopia suits were selected based on the structure of the [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide] (SCP), but with additional consideration of sections in the [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard], the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide] and David Rook’s [http://www.securityninja.co.uk/secure-development/the-principles-place/ Principles of Secure Development]. These provided five suits, and a sixth called “Cornucopia” was created for everything else: &lt;br /&gt;
&lt;br /&gt;
* Data validation and encoding&lt;br /&gt;
* Authentication&lt;br /&gt;
* Session management&lt;br /&gt;
* Authorization&lt;br /&gt;
* Cryptography&lt;br /&gt;
* Cornucopia&lt;br /&gt;
&lt;br /&gt;
Each suit contains 13 cards (Ace, 2-10, Jack, Queen and King) but, unlike EoP, there are also two Joker cards. The content was mainly drawn from the SCP. Full [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]].&lt;br /&gt;
&lt;br /&gt;
''Other Decks''&lt;br /&gt;
&lt;br /&gt;
Future editions such as for mobile app development will use different sources of information and suits.&lt;br /&gt;
&lt;br /&gt;
==Mappings==&lt;br /&gt;
The other driver for Cornucopia is to link the attacks with requirements and verification techniques. An initial aim had been to reference [http://cwe.mitre.org/ CWE] weakness IDs, but these proved too numerous, and instead it was decided to map each card to [http://capec.mitre.org/ CAPEC] software attack pattern IDs which themselves are mapped to CWEs, so the desired result is achieved.&lt;br /&gt;
&lt;br /&gt;
Each card is also mapped to the 36 primary security stories in the [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode document], as well as to the OWASP [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide SCP v2], [https://www.owasp.org/images/3/33/OWASP_Application_Security_Verification_Standard_3.0.1.pdf ASVS v3.0.1] and [https://www.owasp.org/index.php/OWASP_AppSensor_Project AppSensor] (application attack detection and response) to help teams create their own security-related stories for use in Agile processes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Cornucopia is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] mentioned above, [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), [https://www.owasp.org/index.php/OWASP_Snakes_and_Ladders OWASP Snakes and Ladders], and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Cornucopia? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia is a card game used to help derive application security requirements during the software development life cycle. To start using Cornucopia:&lt;br /&gt;
&lt;br /&gt;
* Download the document&lt;br /&gt;
* Print the cards onto plain paper or pre-scored card&lt;br /&gt;
* Cut/separate the individual cards&lt;br /&gt;
* Identify an application, module or component to assess&lt;br /&gt;
* Invite business owners, architects, developers, testers along for a card game&lt;br /&gt;
* Get those infosec folk to provide chocolate, pizza, beer, flowers or all four as prizes&lt;br /&gt;
* Select a portion of the deck to start with&lt;br /&gt;
* {{#switchtablink:How to Play|Play the game}} to discuss &amp;amp;amp; document security requirements (and to win rounds)&lt;br /&gt;
* Remember, points make prizes!&lt;br /&gt;
&lt;br /&gt;
Listen to the [http://trustedsoftwarealliance.com/2014/03/21/the-owasp-cornucopia-project-with-colin-watson/ OWASP 24/7 Podcast] about Cornucopia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-presentation-small.jpg|link=media:Owaspnl-colinwatson-cornucopia.odp]]&lt;br /&gt;
&lt;br /&gt;
The game rules are in the document download. But the OpenOffice [[media:Owasplondon-colinwatson-cornucopia.odp|project presentation]] includes an animated version of four demonstration rounds. The presentation is recorded [http://youtu.be/Q_LE-8xNXVk on video].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dariodf Darío De Filippis] [mailto:dariodefilippis@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://youtu.be/i5Y0akWj31k How to Play] video&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Cornucopia-scoresheet.pdf Scoresheet]&lt;br /&gt;
* {{#switchtablink:Get the Cards|All sources and downloads...}}&lt;br /&gt;
&lt;br /&gt;
== Reference Files ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:OWASP_SCP_Quick_Reference_Guide_v2.pdf OWASP SCP requirements]&lt;br /&gt;
* [https://www.owasp.org/images/5/58/OWASP_ASVS_Version_2.pdf OWASP ASVS verification IDs]&lt;br /&gt;
* [https://www.owasp.org/index.php/AppSensor_DetectionPoints OWASP AppSensor attack detection point IDs] &lt;br /&gt;
* [http://capec.mitre.org/data/archive/capec_v1.7.1.zip CAPEC IDs]&lt;br /&gt;
* [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode security-focused story IDs]&lt;br /&gt;
&lt;br /&gt;
The OWASP SCP does not include identity values for the requirements, so please use [https://www.owasp.org/index.php/File:Owasp-requirements-numbering.zip this list].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [26 Jun 2018] v1.20 FR released&lt;br /&gt;
* [14 May 2018] Printed deck purchase details updated&lt;br /&gt;
* [13 Jan 2018 v1.20 PT-BR released&lt;br /&gt;
* [23 Aug 2016] Presentation at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [29 Jun 2016] v1.20 released&lt;br /&gt;
* [21 Jan 2016] [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]] published&lt;br /&gt;
* [30 Dec 2015] Darío De Filippis becomes project co-leader&lt;br /&gt;
* [24 Sep 2015] [http://appsecusa2015.sched.org/event/7f3dba889c0ec9e37900e289c9660503#.VZ6aoXhflNY Lightning training] at AppSec USA 2015&lt;br /&gt;
* [01 Jun 2015] [https://youtu.be/i5Y0akWj31k How to Play video] published&lt;br /&gt;
* [20 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - How to play video&lt;br /&gt;
* [31 Mar 2015] v1.10 released&lt;br /&gt;
* [02 Mar 2015] Decks available from [https://www.owasp.org/index.php/OWASP_Merchandise#Cornucopia_Cards OWASP merchandise store]&lt;br /&gt;
* [18 Feb 2015] Project awarded Labs status&lt;br /&gt;
&lt;br /&gt;
==PCIDSS==&lt;br /&gt;
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia Ecommerce Website Edition is referenced in the current [https://www.pcisecuritystandards.org Payment Card Industry Security Standards Council]  information supplement [https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf PCI DSS E-commerce Guidelines] v2, January 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Get the Cards =&lt;br /&gt;
&lt;br /&gt;
==Printed==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-square-logo-350.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Professionally printed decks are available by two methods:&lt;br /&gt;
* Single decks or in bulk from OWASP (v1.20)&lt;br /&gt;
** As promotion items '''by OWASP Leaders''' from their own chapter budgets [https://docs.google.com/a/owasp.org/forms/d/e/1FAIpQLSez9mV97HuqvYhCldE2hYhX3UjQM1oO5bLy44HkOZSpni0OzQ/viewform?formkey=dF85bGtvdWdrd2JjYldNZ1gxSkJxaEE6MQ Chapter and Project Merchandise Request form]&lt;br /&gt;
** For other individuals, organisations and companies, please email [mailto:dawn.aitken@owasp.org dawn.aitken@owasp.org] with purchase enquiries&lt;br /&gt;
* Request a free deck of cards gifted by [http://blackfootuk.com/ Blackfoot UK Limited] or download their donated print-ready artwork:&lt;br /&gt;
** Request a free [http://blackfootuk.com/cornucopia/receive-a-set-of-cards/ pack of cards (v1.10)] (gifted by Blackfoot UK)&lt;br /&gt;
&lt;br /&gt;
==Source files==&lt;br /&gt;
&lt;br /&gt;
Cornucopia - Ecommerce Website Edition:&lt;br /&gt;
* v1.2 (current version)&lt;br /&gt;
** [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN DOC] | [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR DOC] | [https://github.com/wagnerfusca/OWASP-Cornucopia-Translate-Cards---PT PT-BR DOC]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN PDF]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.1 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki]]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjb283ZE5GNmFMM2FGWGl2WC14aDJDQ0ZsNk00 Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.04 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/cornucopia-ecom-1v04-blackfoot.zip Print-Ready design files]  (gifted by Blackfoot UK) 47Mb Zip&lt;br /&gt;
&lt;br /&gt;
The current version of Cornucopia Ecommerce Website Edition cards (v1.20 with updated mapping to ASVS v3.0.1 and CAPEC v2.8, and has some minor text changes on the cards) can be printed using the following methods:&lt;br /&gt;
# Download the free Adobe Illustrator files ([https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ EN]) and get them professionally printed&lt;br /&gt;
# Download and self-print the free document word-processing ([https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN], [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR]) or PDF ([https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN])&lt;br /&gt;
## Print the document onto business card blank cards; or&lt;br /&gt;
## Print the document onto normal card and cut the cards out individually using the guide; or&lt;br /&gt;
# Generate your own cards from the free [https://www.owasp.org/index.php/File:Cornucopia-deck-ecommercewebsite-XML.zip source XML data file]&lt;br /&gt;
&lt;br /&gt;
There are also other ways to obtain particular versions:&lt;br /&gt;
* Download the free [https://www.owasp.org/index.php/File:Owasp_cornucopia_printreadyimages.zip PDF (v1.03)] (gifted by Travelex) &lt;br /&gt;
** Have the cards commercially printed; or&lt;br /&gt;
** Import into your own files (such as [http://lists.owasp.org/pipermail/owasp_cornucopia/2014-January/000018.html this way] suggested by Cam Morris via the mailing list)&lt;br /&gt;
&lt;br /&gt;
OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
Collect/share/use the pseudo-random cards tweeted twice daily [https://twitter.com/OWASPCornucopia @OWASPCornucopia]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How to Play =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-cornucopia-K.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-session-9.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
It is possible to play Cornucopia in many different ways. Here is one way, and explained in a [https://youtu.be/i5Y0akWj31k YouTube video].&lt;br /&gt;
&lt;br /&gt;
== Primary method ==&lt;br /&gt;
&lt;br /&gt;
;A - Preparations&lt;br /&gt;
:A1.	Obtain a deck, or print your own Cornucopia deck and separate/cut out the cards&lt;br /&gt;
:A2.	Identify an application or application process to review; this might be a concept, design or an actual implementation&lt;br /&gt;
:A3.	Create a data flow diagram&lt;br /&gt;
:A4.	Identify and invite a group of 3-6 architects, developers, testers and other business stakeholders together and sit around a table (try to include someone fairly familiar with application security)&lt;br /&gt;
:A5.	Have some prizes to hand (gold stars, chocolate, pizza, beer or flowers depending upon your office culture)&lt;br /&gt;
;B - Play&lt;br /&gt;
:One suit - Cornucopia - acts as trumps. Aces are high (i.e. they beat Kings). It helps if there is someone dedicated to documenting the results who is not playing.&lt;br /&gt;
:B1.	Remove the Jokers and a few low-score (2, 3, 4) cards from Cornucopia suit to ensure each player will have the same number of cards&lt;br /&gt;
:B2.	Shuffle the pack and deal all the cards&lt;br /&gt;
:B3.	To begin, choose a player randomly who will play the first card - they can play any card from their hand except from the trump suit - Cornucopia&lt;br /&gt;
:B4.	To play a card, each player must read it out aloud, and explain how (or not) the threat could apply (the player gets a point for attacks that work, and the group thinks it is an actionable bug) - don’t try to think of mitigations at this stage, and don’t exclude a threat just because it is believed it is already mitigated - someone record the card on the score sheet&lt;br /&gt;
:B5.	Play clockwise, each person must play a card in the same way; if you have any card of the matching lead suit you must play one of those, otherwise they can play a card from any other suit. Only a higher card of the same suit, or the highest card in the trump suit Cornucopia, wins the hand.&lt;br /&gt;
:B6.	The person who wins the round, leads the next round (i.e. they play first), and thus defines the next lead suit&lt;br /&gt;
:B7.	Repeat until all the cards are played&lt;br /&gt;
;C - Scoring&lt;br /&gt;
:The objective is to identify applicable threats, and win hands (rounds):&lt;br /&gt;
:C1.	Score +1 for each card you can identify as a valid threat to the application under consideration&lt;br /&gt;
:C2.	Score +1 if you win a round&lt;br /&gt;
:C3.	Once all cards have been played, whoever has the most points wins&lt;br /&gt;
;D - Closure&lt;br /&gt;
:D1.	Review all the applicable threats and the matching security requirements&lt;br /&gt;
:D2.	Create user stories, specifications and test cases as required for your development methodology&lt;br /&gt;
&lt;br /&gt;
==Alternative game rules==&lt;br /&gt;
&lt;br /&gt;
* If you are new to the game, remove the two Joker cards to begin with. Add the Joker cards back in once people become more familiar with the process. Apart from the “trumps card game” rules described above which are very similar to the EoP, the deck can also be played as the “twenty-one card game” (also known as “pontoon” or “blackjack”) which normally reduces the number of cards played in each round.&lt;br /&gt;
* Practice on an imaginary application, or even a future planned application, rather than trying to find fault with existing applications until the participants are happy with the usefulness of the game.&lt;br /&gt;
* Consider just playing with one suit to make a shorter session – but try to cover all the suits for every project. Or even better just play one hand with some pre-selected cards, and score only on the ability to identify security requirements. Perhaps have one game of each suit each day for a week or so, if the participants cannot spare long enough for a full deck.&lt;br /&gt;
* Some teams have preferred to play a full hand of cards, and then discuss what is on the cards after each round (instead of after each person plays a card).&lt;br /&gt;
* Another suggestion is that if a player fails to identify the card is relevant, allow other players to suggest ideas, and potentially let them gain the point for the card. Consider allowing extra points for especially good contributions.&lt;br /&gt;
* You can even play by yourself. Just use the cards to act as thought-provokers. Involving more people will be beneficial though.&lt;br /&gt;
* In Microsoft's EoP guidance, they recommend cheating as a good game strategy&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authorization-8.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-cryptography-j.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
; Can I copy or edit the game?&lt;br /&gt;
:Yes of course. All OWASP materials are free to do with as you like provided you comply with the Creative Commons Attribution-ShareAlike 3.0 license. Perhaps if you create a new version, you might donate it to the OWASP Cornucopia Project?&lt;br /&gt;
&lt;br /&gt;
; How can I get involved?&lt;br /&gt;
: Please send ideas or offers of help to the project’s mailing list.&lt;br /&gt;
&lt;br /&gt;
; How were the attackers’ names chosen?&lt;br /&gt;
: EoP begins every description with words like &amp;quot;An attacker can...&amp;quot;. These have to be phrased as an attack but I was not keen on the anonymous terminology, wanting something more engaging, and therefore used personal names. These can be thought of as external or internal people or aliases for computer systems. But instead of just random names, I thought how they might reflect the OWASP community aspect. Therefore, apart from &amp;quot;Alice and Bob&amp;quot;, I use the given (first) names of current and recent OWASP employees and Board members (assigned in no order), and then randomly selected the remaining 50 or so names from the current list of paying individual OWASP members. No name was used more than once, and where people had provided two personal names, I dropped one part to try to ensure no-one can be easily identified. Names were not deliberately allocated to any particular attack, defence or requirement. The cultural and gender mix simply reflects theses sources of names, and is not meant to be world-representative.&lt;br /&gt;
&lt;br /&gt;
; Why aren’t there any images on the card faces?&lt;br /&gt;
: There is quite a lot of text on the cards, and the cross-referencing takes up space too. But it would be great to have additional design elements included. Any volunteers?&lt;br /&gt;
&lt;br /&gt;
; Are the attacks ranked by the number on the card?&lt;br /&gt;
: Only approximately. The risk will be application and organisation dependent, due to varying security and compliance requirements, so your own severity rating may place the cards in some other order than the numbers on the cards.&lt;br /&gt;
&lt;br /&gt;
; How long does it take to play a round of cards using the full deck?&lt;br /&gt;
: This depends upon the amount of discussion and how familiar the players are with application security concepts. But perhaps allow 1.5 to 2.0 hours for 4-6 people.&lt;br /&gt;
&lt;br /&gt;
; What sort of people should play the game?&lt;br /&gt;
:Always try to have a mix of roles who can contribute alternative perspectives. But include someone who has a reasonable knowledge of application vulnerability terminology. Otherwise try to include a mix of architects, developers, testers and a relevant project manager or business owner.&lt;br /&gt;
&lt;br /&gt;
; Who should take notes and record scores?&lt;br /&gt;
: It is better if that someone else, not playing the game, takes notes about the requirements identified and issues discussed. This could be used as training for a more junior developer, or performed by the project manager. Some organisations have made a recording to review afterwards when the requirements are written up more formally.&lt;br /&gt;
&lt;br /&gt;
; Should we always use the full deck of cards?&lt;br /&gt;
: No. A smaller deck is quicker to play. Start your first game with only enough cards for two or three rounds. Always consider removing cards that are not appropriate at all of the target application or function being reviewed. For the first few times people play the game it is also usually better to remove the Aces and the two Jokers. It is also usual to play the game without any trumps suit until people are more familiar with the idea.&lt;br /&gt;
&lt;br /&gt;
; What should players do when they have an Ace card that says “invented a new X attack”?&lt;br /&gt;
: The player can make up any attack they think is valid, but must match the suit of the card e.g. data validation and encoding). With players new to the game, it can be better to remove these to begin with.&lt;br /&gt;
&lt;br /&gt;
; I don’t understand what the attack means on each card - is there more detailed information?&lt;br /&gt;
: Yes, the Wiki Deck at was created to help players understand the attacks. See [https://www.owasp.org/index.php/Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck Wiki Deck].&lt;br /&gt;
&lt;br /&gt;
; My company wants to print its own version of OWASP Cornucopia - what license do we need to refer to?&lt;br /&gt;
: What is required/reasonable might depend upon how you propose to use the source Cornucopia material. See fuller answer immediately below.&lt;br /&gt;
&lt;br /&gt;
Some examples of re-using or reproducing Cornucopia are:&lt;br /&gt;
&lt;br /&gt;
# Print some decks and give them away to customers&lt;br /&gt;
# Reproduce the game exactly but with a corporate-branded package&lt;br /&gt;
# Use the idea and/or source files to produce a similar game but with different attacks/mappings&lt;br /&gt;
# Distribute modified design files&lt;br /&gt;
&lt;br /&gt;
If option 1 above, you can order these in bulk from OWASP and attach your own details below the &amp;quot;compliments of&amp;quot; section on the boxes. There are three aspects to consider for options 2, 3 or 4, or combinations of those - see below. The existing printed decks (and their boxes and leaflets include such text).&lt;br /&gt;
&lt;br /&gt;
''A - Cornucopia License''&lt;br /&gt;
&lt;br /&gt;
The precise wording will depend how the material is being used or reproduced. Under Creative Commons Attribution-ShareAlike 3.0 license it is necessary to attribute all previous contributions (in this case, Microsoft, Boeing, Mitre, etc). The easiest place to put the wording is on the leaflet (folded inside, or separate booklet). The current required long-form wording is:&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license http://creativecommons.org/licenses/by-sa/3.0/&lt;br /&gt;
&lt;br /&gt;
  The files used to create these materials were created from the OWASP project and are also open source, and are licensed under the same conditions. &lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia can be downloaded for free from the OWASP website and printed yourself. The OWASP Cornucopia project source in vendor neutral and unbranded.&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  © 2012-2018 OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
  This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license.&lt;br /&gt;
&lt;br /&gt;
  Acknowledgments:&lt;br /&gt;
&lt;br /&gt;
  Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
&lt;br /&gt;
  Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
&lt;br /&gt;
  Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
&lt;br /&gt;
  Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
&lt;br /&gt;
  Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
&lt;br /&gt;
  Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
&lt;br /&gt;
  Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
The box/container for the cards must have the wording:&lt;br /&gt;
&lt;br /&gt;
  Created by Colin Watson.&lt;br /&gt;
&lt;br /&gt;
  Contains: One pack of Cornucopia Ecommerce Website playing cards. OWASP Cornucopia is open source and can be downloaded free of charge from the OWASP website.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
The following short-form wording must also appear on any materials referencing the outputs (e.g. press releases, leaflets, reports, blog posts):&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license and is © 2012-2016 OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
If any files are distributed electronically, the long-form wording should also be aded in a license.txt file within the distribution.&lt;br /&gt;
&lt;br /&gt;
If the intention is to use the idea only (option 3 above), the long-form, box and short-form wording might be different, and probably simpler. And it might make more sense to start with the Microsoft-provided Elevation of Privilege files (and open source license).&lt;br /&gt;
&lt;br /&gt;
''B - Upcoming update to Cornucopia''&lt;br /&gt;
&lt;br /&gt;
Note that the current print design files are v1.04, and the current Word document is v1.10, but we are in the process of updating all of these to v1.20.&lt;br /&gt;
&lt;br /&gt;
Whatever is used as a starting point, please state the source version, for example: &lt;br /&gt;
&lt;br /&gt;
  Based on OWASP Cornucopia Ecommerce Website Edition v1.04&lt;br /&gt;
&lt;br /&gt;
''C - OWASP brand usage''&lt;br /&gt;
&lt;br /&gt;
Additionally individuals, companies and other organisations must not breach OWASP's brand usage guidelines. &lt;br /&gt;
&lt;br /&gt;
  https://www.owasp.org/index.php/Marketing/Resources#tab=BRAND_GUIDELINES&lt;br /&gt;
&lt;br /&gt;
In the case of Cornucopia, in 2014 Blackfoot Limited produced some printed decks of cards. Blackfoot's name and logo did not appear anywhere on the OWASP-branded cards, and the OWASP logo did not appear on the Blackfoot-branded box and leaflet. In fact there is no OWASP logo on any part of the Blackfoot branded decks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-data-A.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Cornucopia is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Thomas Berson&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Oana Cornea&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Todd Dahl&lt;br /&gt;
* Luis Enriquez&lt;br /&gt;
* Ken Ferris&lt;br /&gt;
* Darío De Filippis&lt;br /&gt;
* Sebastien Gioria&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Timo Goosen&lt;br /&gt;
* Anthony Harrison&lt;br /&gt;
* Martin Haslinger &lt;br /&gt;
* John Herrlin&lt;br /&gt;
* Jerry Hoff&lt;br /&gt;
* Marios Kourtesis&lt;br /&gt;
* Franck Lacosta&lt;br /&gt;
* Mathias Lemaire&lt;br /&gt;
* Antonis Manaras&lt;br /&gt;
* Jim Manico&lt;br /&gt;
* Mark Miller&lt;br /&gt;
* Cam Morris&lt;br /&gt;
* Susana Romaniz&lt;br /&gt;
* Ravishankar Sahadevan&lt;br /&gt;
* Tao Sauvage&lt;br /&gt;
* Wagner Voltz&lt;br /&gt;
* Stephen de Vries&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
Also:&lt;br /&gt;
&lt;br /&gt;
* Attendees at OWASP London, OWASP Manchester and OWASP Netherlands chapter meetings, the London Gamification meetup, and the training at AppSec USA 2015 in san Francisco who made helpful suggestions and asked challenging questions&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
* Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
* Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
* Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
* Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
* Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
* Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authentication-7.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-joker-a.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Version history (see [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx uploads]):&lt;br /&gt;
* Alpha version (0.40) was issued in August 2012&lt;br /&gt;
* Beta version (1.00) was released in February 2013&lt;br /&gt;
* Stable release (1.02) was released in August 2013, following feedback from mailing list and use with groups of developers&lt;br /&gt;
* Release v1.03 included minor changes&lt;br /&gt;
* Release v1.04 included a text correction on one card&lt;br /&gt;
* Release v1.05 included additional narrative and FAQs&lt;br /&gt;
* Current release v1.10 included cross-references updated for 2014 version of ASVS, contributors updated and minor text changes to cards to improve readability&lt;br /&gt;
* Current release v1.20 included cross-references updated for version 3.0.1 of ASVS and CAPEC v2.8, and many minor text changes including further contributors.&lt;br /&gt;
&lt;br /&gt;
As of July 2018, the priorities are:&lt;br /&gt;
* &amp;lt;strike&amp;gt;Develop Cornucopia Wiki Deck&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Update the document/deck to shorten some card text [completed ready for v1.10]&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVS 2014&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVSv3 2016&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check/update CAPEC mappings&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Translate into French&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Translate into French (completed), German (in progress), Japanese, Portuguese (in progress), Spanish (in progress) and other languages (help needed please)&lt;br /&gt;
* &amp;lt;strike&amp;gt;Make card decks available via OWASP Merchandise Store&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create a video &amp;quot;how to play&amp;quot;&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Update printed decks in non-EN languages&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Cornucopia is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Cornucopia into that language?&lt;br /&gt;
==Use and Promote the Cornucopia Card Decks==&lt;br /&gt;
Please help raise awareness of Cornucopia by printing cards:&lt;br /&gt;
* Use Cornucopia with specifiers, architects, designers, developers, testers and others, in part to train them, but also to solicit feedback on their usability, practicality and appropriateness for their work&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a mobile app to play the game&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What cards don't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other decks would you like to see?&lt;br /&gt;
==Keep the Cards Updated==&lt;br /&gt;
As the source referenced documents change, we have to update the decks. You may also find errors and omissions. In the first instance, please send a message to the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] if you have identified errors &amp;amp;amp; omissions, have some time to maintain the source documents, or can help in other ways.&lt;br /&gt;
==Create a New Deck==&lt;br /&gt;
The only version currently available is the Cornucopia Ecommerce Website Edition in English. We would like to create a new mobile app specific deck, probably using the wonderful [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] as inspiration for the card source materials. Do you have an idea for your own application security requirements card deck? Perhaps for {{#switchtablink:Mobile App Edition|mobile apps}} or something else?&lt;br /&gt;
&lt;br /&gt;
= About Ecommerce Website Edition =&lt;br /&gt;
{{:Projects/OWASP Cornucopia Ecommerce Website Edition | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]] &lt;br /&gt;
[[Category: Threat_Modeling]] &lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:SAMM-SR-1]] &lt;br /&gt;
[[Category:SAMM-SR-2]] &lt;br /&gt;
[[Category:SAMM-TA-1]] &lt;br /&gt;
[[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=241802</id>
		<title>OWASP Cornucopia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=241802"/>
				<updated>2018-07-13T10:26:38Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: Updated roadmap&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cornucopia-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#Lab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Cornucopia==&lt;br /&gt;
OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology agnostic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
The idea behind Cornucopia is to help development teams, especially those using Agile methodologies, to identify application security requirements and develop security-based user stories. Although the idea had been waiting for enough time to progress it, the final motivation came when [http://www.safecode.org/ SAFECode] published its [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf Practical Security Stories and Security Tasks for Agile Development Environments] in July 2012.&lt;br /&gt;
&lt;br /&gt;
The Microsoft SDL team had already published its super [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] (EoP) but that did not seem to address the most appropriate kind of issues that web application development teams mostly have to address. EoP is a great concept and game strategy, and was [http://blogs.msdn.com/b/sdl/archive/2010/03/02/announcing-elevation-of-privilege-the-threat-modeling-game.aspx published under] a [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License].&lt;br /&gt;
Cornucopia {{#switchtablink:Ecommerce Website Edition|Ecommerce Website Edition}} is based the concepts and game ideas in EoP, but those have been modified to be more relevant to the types of issues ecommerce website developers encounter. It attempts to introduce threat-modelling ideas into development teams that use Agile methodologies, or are more focused on web application weaknesses than other types of software vulnerabilities or are not familiar with STRIDE and DREAD.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The Card Decks==&lt;br /&gt;
&lt;br /&gt;
''Ecommerce Website Edition''&lt;br /&gt;
&lt;br /&gt;
Instead of EoP’s STRIDE suits, Cornucopia suits were selected based on the structure of the [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide] (SCP), but with additional consideration of sections in the [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard], the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide] and David Rook’s [http://www.securityninja.co.uk/secure-development/the-principles-place/ Principles of Secure Development]. These provided five suits, and a sixth called “Cornucopia” was created for everything else: &lt;br /&gt;
&lt;br /&gt;
* Data validation and encoding&lt;br /&gt;
* Authentication&lt;br /&gt;
* Session management&lt;br /&gt;
* Authorization&lt;br /&gt;
* Cryptography&lt;br /&gt;
* Cornucopia&lt;br /&gt;
&lt;br /&gt;
Each suit contains 13 cards (Ace, 2-10, Jack, Queen and King) but, unlike EoP, there are also two Joker cards. The content was mainly drawn from the SCP. Full [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]].&lt;br /&gt;
&lt;br /&gt;
''Other Decks''&lt;br /&gt;
&lt;br /&gt;
Future editions such as for mobile app development will use different sources of information and suits.&lt;br /&gt;
&lt;br /&gt;
==Mappings==&lt;br /&gt;
The other driver for Cornucopia is to link the attacks with requirements and verification techniques. An initial aim had been to reference [http://cwe.mitre.org/ CWE] weakness IDs, but these proved too numerous, and instead it was decided to map each card to [http://capec.mitre.org/ CAPEC] software attack pattern IDs which themselves are mapped to CWEs, so the desired result is achieved.&lt;br /&gt;
&lt;br /&gt;
Each card is also mapped to the 36 primary security stories in the [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode document], as well as to the OWASP [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide SCP v2], [https://www.owasp.org/images/3/33/OWASP_Application_Security_Verification_Standard_3.0.1.pdf ASVS v3.0.1] and [https://www.owasp.org/index.php/OWASP_AppSensor_Project AppSensor] (application attack detection and response) to help teams create their own security-related stories for use in Agile processes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Cornucopia is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] mentioned above, [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), [https://www.owasp.org/index.php/OWASP_Snakes_and_Ladders OWASP Snakes and Ladders], and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Cornucopia? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia is a card game used to help derive application security requirements during the software development life cycle. To start using Cornucopia:&lt;br /&gt;
&lt;br /&gt;
* Download the document&lt;br /&gt;
* Print the cards onto plain paper or pre-scored card&lt;br /&gt;
* Cut/separate the individual cards&lt;br /&gt;
* Identify an application, module or component to assess&lt;br /&gt;
* Invite business owners, architects, developers, testers along for a card game&lt;br /&gt;
* Get those infosec folk to provide chocolate, pizza, beer, flowers or all four as prizes&lt;br /&gt;
* Select a portion of the deck to start with&lt;br /&gt;
* {{#switchtablink:How to Play|Play the game}} to discuss &amp;amp;amp; document security requirements (and to win rounds)&lt;br /&gt;
* Remember, points make prizes!&lt;br /&gt;
&lt;br /&gt;
Listen to the [http://trustedsoftwarealliance.com/2014/03/21/the-owasp-cornucopia-project-with-colin-watson/ OWASP 24/7 Podcast] about Cornucopia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-presentation-small.jpg|link=media:Owaspnl-colinwatson-cornucopia.odp]]&lt;br /&gt;
&lt;br /&gt;
The game rules are in the document download. But the OpenOffice [[media:Owasplondon-colinwatson-cornucopia.odp|project presentation]] includes an animated version of four demonstration rounds. The presentation is recorded [http://youtu.be/Q_LE-8xNXVk on video].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dariodf Darío De Filippis] [mailto:dariodefilippis@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://youtu.be/i5Y0akWj31k How to Play] video&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Cornucopia-scoresheet.pdf Scoresheet]&lt;br /&gt;
* {{#switchtablink:Get the Cards|All sources and downloads...}}&lt;br /&gt;
&lt;br /&gt;
== Reference Files ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:OWASP_SCP_Quick_Reference_Guide_v2.pdf OWASP SCP requirements]&lt;br /&gt;
* [https://www.owasp.org/images/5/58/OWASP_ASVS_Version_2.pdf OWASP ASVS verification IDs]&lt;br /&gt;
* [https://www.owasp.org/index.php/AppSensor_DetectionPoints OWASP AppSensor attack detection point IDs] &lt;br /&gt;
* [http://capec.mitre.org/data/archive/capec_v1.7.1.zip CAPEC IDs]&lt;br /&gt;
* [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode security-focused story IDs]&lt;br /&gt;
&lt;br /&gt;
The OWASP SCP does not include identity values for the requirements, so please use [https://www.owasp.org/index.php/File:Owasp-requirements-numbering.zip this list].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [26 Jun 2018] v1.20 FR released&lt;br /&gt;
* [14 May 2018] Printed deck purchase details updated&lt;br /&gt;
* [13 Jan 2018 v1.20 PT-BR released&lt;br /&gt;
* [23 Aug 2016] Presentation at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [29 Jun 2016] v1.20 released&lt;br /&gt;
* [21 Jan 2016] [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]] published&lt;br /&gt;
* [30 Dec 2015] Darío De Filippis becomes project co-leader&lt;br /&gt;
* [24 Sep 2015] [http://appsecusa2015.sched.org/event/7f3dba889c0ec9e37900e289c9660503#.VZ6aoXhflNY Lightning training] at AppSec USA 2015&lt;br /&gt;
* [01 Jun 2015] [https://youtu.be/i5Y0akWj31k How to Play video] published&lt;br /&gt;
* [20 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - How to play video&lt;br /&gt;
* [31 Mar 2015] v1.10 released&lt;br /&gt;
* [02 Mar 2015] Decks available from [https://www.owasp.org/index.php/OWASP_Merchandise#Cornucopia_Cards OWASP merchandise store]&lt;br /&gt;
* [18 Feb 2015] Project awarded Labs status&lt;br /&gt;
&lt;br /&gt;
==PCIDSS==&lt;br /&gt;
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia Ecommerce Website Edition is referenced in the current [https://www.pcisecuritystandards.org Payment Card Industry Security Standards Council]  information supplement [https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf PCI DSS E-commerce Guidelines] v2, January 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Get the Cards =&lt;br /&gt;
&lt;br /&gt;
==Printed==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-square-logo-350.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Professionally printed decks are available by two methods:&lt;br /&gt;
* Single decks or in bulk from OWASP (v1.20)&lt;br /&gt;
** As promotion items '''by OWASP Leaders''' from their own chapter budgets [https://docs.google.com/a/owasp.org/forms/d/e/1FAIpQLSez9mV97HuqvYhCldE2hYhX3UjQM1oO5bLy44HkOZSpni0OzQ/viewform?formkey=dF85bGtvdWdrd2JjYldNZ1gxSkJxaEE6MQ Chapter and Project Merchandise Request form]&lt;br /&gt;
** For other individuals, organisations and companies, please email [mailto:dawn.aitken@owasp.org dawn.aitken@owasp.org] with purchase enquiries&lt;br /&gt;
* Request a free deck of cards gifted by [http://blackfootuk.com/ Blackfoot UK Limited] or download their donated print-ready artwork:&lt;br /&gt;
** Request a free [http://blackfootuk.com/cornucopia/receive-a-set-of-cards/ pack of cards (v1.10)] (gifted by Blackfoot UK)&lt;br /&gt;
&lt;br /&gt;
==Source files==&lt;br /&gt;
&lt;br /&gt;
Cornucopia - Ecommerce Website Edition:&lt;br /&gt;
* v1.2 (current version)&lt;br /&gt;
** [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN DOC] | [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR DOC] | [https://github.com/wagnerfusca/OWASP-Cornucopia-Translate-Cards---PT PT-BR DOC]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN PDF]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.1 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki]]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjb283ZE5GNmFMM2FGWGl2WC14aDJDQ0ZsNk00 Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.04 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/cornucopia-ecom-1v04-blackfoot.zip Print-Ready design files]  (gifted by Blackfoot UK) 47Mb Zip&lt;br /&gt;
&lt;br /&gt;
The current version of Cornucopia Ecommerce Website Edition cards (v1.20 with updated mapping to ASVS v3.0.1 and CAPEC v2.8, and has some minor text changes on the cards) can be printed using the following methods:&lt;br /&gt;
# Download the free Adobe Illustrator files ([https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ EN]) and get them professionally printed&lt;br /&gt;
# Download and self-print the free document word-processing ([https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN], [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR]) or PDF ([https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN])&lt;br /&gt;
## Print the document onto business card blank cards; or&lt;br /&gt;
## Print the document onto normal card and cut the cards out individually using the guide; or&lt;br /&gt;
# Generate your own cards from the free [https://www.owasp.org/index.php/File:Cornucopia-deck-ecommercewebsite-XML.zip source XML data file]&lt;br /&gt;
&lt;br /&gt;
There are also other ways to obtain particular versions:&lt;br /&gt;
* Download the free [https://www.owasp.org/index.php/File:Owasp_cornucopia_printreadyimages.zip PDF (v1.03)] (gifted by Travelex) &lt;br /&gt;
** Have the cards commercially printed; or&lt;br /&gt;
** Import into your own files (such as [http://lists.owasp.org/pipermail/owasp_cornucopia/2014-January/000018.html this way] suggested by Cam Morris via the mailing list)&lt;br /&gt;
&lt;br /&gt;
OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
Collect/share/use the pseudo-random cards tweeted twice daily [https://twitter.com/OWASPCornucopia @OWASPCornucopia]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How to Play =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-cornucopia-K.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-session-9.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
It is possible to play Cornucopia in many different ways. Here is one way, and explained in a [https://youtu.be/i5Y0akWj31k YouTube video].&lt;br /&gt;
&lt;br /&gt;
== Primary method ==&lt;br /&gt;
&lt;br /&gt;
;A - Preparations&lt;br /&gt;
:A1.	Obtain a deck, or print your own Cornucopia deck and separate/cut out the cards&lt;br /&gt;
:A2.	Identify an application or application process to review; this might be a concept, design or an actual implementation&lt;br /&gt;
:A3.	Create a data flow diagram&lt;br /&gt;
:A4.	Identify and invite a group of 3-6 architects, developers, testers and other business stakeholders together and sit around a table (try to include someone fairly familiar with application security)&lt;br /&gt;
:A5.	Have some prizes to hand (gold stars, chocolate, pizza, beer or flowers depending upon your office culture)&lt;br /&gt;
;B - Play&lt;br /&gt;
:One suit - Cornucopia - acts as trumps. Aces are high (i.e. they beat Kings). It helps if there is someone dedicated to documenting the results who is not playing.&lt;br /&gt;
:B1.	Remove the Jokers and a few low-score (2, 3, 4) cards from Cornucopia suit to ensure each player will have the same number of cards&lt;br /&gt;
:B2.	Shuffle the pack and deal all the cards&lt;br /&gt;
:B3.	To begin, choose a player randomly who will play the first card - they can play any card from their hand except from the trump suit - Cornucopia&lt;br /&gt;
:B4.	To play a card, each player must read it out aloud, and explain how (or not) the threat could apply (the player gets a point for attacks that work, and the group thinks it is an actionable bug) - don’t try to think of mitigations at this stage, and don’t exclude a threat just because it is believed it is already mitigated - someone record the card on the score sheet&lt;br /&gt;
:B5.	Play clockwise, each person must play a card in the same way; if you have any card of the matching lead suit you must play one of those, otherwise they can play a card from any other suit. Only a higher card of the same suit, or the highest card in the trump suit Cornucopia, wins the hand.&lt;br /&gt;
:B6.	The person who wins the round, leads the next round (i.e. they play first), and thus defines the next lead suit&lt;br /&gt;
:B7.	Repeat until all the cards are played&lt;br /&gt;
;C - Scoring&lt;br /&gt;
:The objective is to identify applicable threats, and win hands (rounds):&lt;br /&gt;
:C1.	Score +1 for each card you can identify as a valid threat to the application under consideration&lt;br /&gt;
:C2.	Score +1 if you win a round&lt;br /&gt;
:C3.	Once all cards have been played, whoever has the most points wins&lt;br /&gt;
;D - Closure&lt;br /&gt;
:D1.	Review all the applicable threats and the matching security requirements&lt;br /&gt;
:D2.	Create user stories, specifications and test cases as required for your development methodology&lt;br /&gt;
&lt;br /&gt;
==Alternative game rules==&lt;br /&gt;
&lt;br /&gt;
* If you are new to the game, remove the two Joker cards to begin with. Add the Joker cards back in once people become more familiar with the process. Apart from the “trumps card game” rules described above which are very similar to the EoP, the deck can also be played as the “twenty-one card game” (also known as “pontoon” or “blackjack”) which normally reduces the number of cards played in each round.&lt;br /&gt;
* Practice on an imaginary application, or even a future planned application, rather than trying to find fault with existing applications until the participants are happy with the usefulness of the game.&lt;br /&gt;
* Consider just playing with one suit to make a shorter session – but try to cover all the suits for every project. Or even better just play one hand with some pre-selected cards, and score only on the ability to identify security requirements. Perhaps have one game of each suit each day for a week or so, if the participants cannot spare long enough for a full deck.&lt;br /&gt;
* Some teams have preferred to play a full hand of cards, and then discuss what is on the cards after each round (instead of after each person plays a card).&lt;br /&gt;
* Another suggestion is that if a player fails to identify the card is relevant, allow other players to suggest ideas, and potentially let them gain the point for the card. Consider allowing extra points for especially good contributions.&lt;br /&gt;
* You can even play by yourself. Just use the cards to act as thought-provokers. Involving more people will be beneficial though.&lt;br /&gt;
* In Microsoft's EoP guidance, they recommend cheating as a good game strategy&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authorization-8.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-cryptography-j.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
; Can I copy or edit the game?&lt;br /&gt;
:Yes of course. All OWASP materials are free to do with as you like provided you comply with the Creative Commons Attribution-ShareAlike 3.0 license. Perhaps if you create a new version, you might donate it to the OWASP Cornucopia Project?&lt;br /&gt;
&lt;br /&gt;
; How can I get involved?&lt;br /&gt;
: Please send ideas or offers of help to the project’s mailing list.&lt;br /&gt;
&lt;br /&gt;
; How were the attackers’ names chosen?&lt;br /&gt;
: EoP begins every description with words like &amp;quot;An attacker can...&amp;quot;. These have to be phrased as an attack but I was not keen on the anonymous terminology, wanting something more engaging, and therefore used personal names. These can be thought of as external or internal people or aliases for computer systems. But instead of just random names, I thought how they might reflect the OWASP community aspect. Therefore, apart from &amp;quot;Alice and Bob&amp;quot;, I use the given (first) names of current and recent OWASP employees and Board members (assigned in no order), and then randomly selected the remaining 50 or so names from the current list of paying individual OWASP members. No name was used more than once, and where people had provided two personal names, I dropped one part to try to ensure no-one can be easily identified. Names were not deliberately allocated to any particular attack, defence or requirement. The cultural and gender mix simply reflects theses sources of names, and is not meant to be world-representative.&lt;br /&gt;
&lt;br /&gt;
; Why aren’t there any images on the card faces?&lt;br /&gt;
: There is quite a lot of text on the cards, and the cross-referencing takes up space too. But it would be great to have additional design elements included. Any volunteers?&lt;br /&gt;
&lt;br /&gt;
; Are the attacks ranked by the number on the card?&lt;br /&gt;
: Only approximately. The risk will be application and organisation dependent, due to varying security and compliance requirements, so your own severity rating may place the cards in some other order than the numbers on the cards.&lt;br /&gt;
&lt;br /&gt;
; How long does it take to play a round of cards using the full deck?&lt;br /&gt;
: This depends upon the amount of discussion and how familiar the players are with application security concepts. But perhaps allow 1.5 to 2.0 hours for 4-6 people.&lt;br /&gt;
&lt;br /&gt;
; What sort of people should play the game?&lt;br /&gt;
:Always try to have a mix of roles who can contribute alternative perspectives. But include someone who has a reasonable knowledge of application vulnerability terminology. Otherwise try to include a mix of architects, developers, testers and a relevant project manager or business owner.&lt;br /&gt;
&lt;br /&gt;
; Who should take notes and record scores?&lt;br /&gt;
: It is better if that someone else, not playing the game, takes notes about the requirements identified and issues discussed. This could be used as training for a more junior developer, or performed by the project manager. Some organisations have made a recording to review afterwards when the requirements are written up more formally.&lt;br /&gt;
&lt;br /&gt;
; Should we always use the full deck of cards?&lt;br /&gt;
: No. A smaller deck is quicker to play. Start your first game with only enough cards for two or three rounds. Always consider removing cards that are not appropriate at all of the target application or function being reviewed. For the first few times people play the game it is also usually better to remove the Aces and the two Jokers. It is also usual to play the game without any trumps suit until people are more familiar with the idea.&lt;br /&gt;
&lt;br /&gt;
; What should players do when they have an Ace card that says “invented a new X attack”?&lt;br /&gt;
: The player can make up any attack they think is valid, but must match the suit of the card e.g. data validation and encoding). With players new to the game, it can be better to remove these to begin with.&lt;br /&gt;
&lt;br /&gt;
; I don’t understand what the attack means on each card - is there more detailed information?&lt;br /&gt;
: Yes, the Wiki Deck at was created to help players understand the attacks. See [https://www.owasp.org/index.php/Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck Wiki Deck].&lt;br /&gt;
&lt;br /&gt;
; My company wants to print its own version of OWASP Cornucopia - what license do we need to refer to?&lt;br /&gt;
: What is required/reasonable might depend upon how you propose to use the source Cornucopia material. See fuller answer immediately below.&lt;br /&gt;
&lt;br /&gt;
Some examples of re-using or reproducing Cornucopia are:&lt;br /&gt;
&lt;br /&gt;
# Print some decks and give them away to customers&lt;br /&gt;
# Reproduce the game exactly but with a corporate-branded package&lt;br /&gt;
# Use the idea and/or source files to produce a similar game but with different attacks/mappings&lt;br /&gt;
# Distribute modified design files&lt;br /&gt;
&lt;br /&gt;
If option 1 above, you can order these in bulk from OWASP and attach your own details below the &amp;quot;compliments of&amp;quot; section on the boxes. There are three aspects to consider for options 2, 3 or 4, or combinations of those - see below. The existing printed decks (and their boxes and leaflets include such text).&lt;br /&gt;
&lt;br /&gt;
''A - Cornucopia License''&lt;br /&gt;
&lt;br /&gt;
The precise wording will depend how the material is being used or reproduced. Under Creative Commons Attribution-ShareAlike 3.0 license it is necessary to attribute all previous contributions (in this case, Microsoft, Boeing, Mitre, etc). The easiest place to put the wording is on the leaflet (folded inside, or separate booklet). The current required long-form wording is:&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license http://creativecommons.org/licenses/by-sa/3.0/&lt;br /&gt;
&lt;br /&gt;
  The files used to create these materials were created from the OWASP project and are also open source, and are licensed under the same conditions. &lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia can be downloaded for free from the OWASP website and printed yourself. The OWASP Cornucopia project source in vendor neutral and unbranded.&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  © 2012-2018 OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
  This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license.&lt;br /&gt;
&lt;br /&gt;
  Acknowledgments:&lt;br /&gt;
&lt;br /&gt;
  Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
&lt;br /&gt;
  Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
&lt;br /&gt;
  Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
&lt;br /&gt;
  Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
&lt;br /&gt;
  Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
&lt;br /&gt;
  Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
&lt;br /&gt;
  Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
The box/container for the cards must have the wording:&lt;br /&gt;
&lt;br /&gt;
  Created by Colin Watson.&lt;br /&gt;
&lt;br /&gt;
  Contains: One pack of Cornucopia Ecommerce Website playing cards. OWASP Cornucopia is open source and can be downloaded free of charge from the OWASP website.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
The following short-form wording must also appear on any materials referencing the outputs (e.g. press releases, leaflets, reports, blog posts):&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license and is © 2012-2016 OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
If any files are distributed electronically, the long-form wording should also be aded in a license.txt file within the distribution.&lt;br /&gt;
&lt;br /&gt;
If the intention is to use the idea only (option 3 above), the long-form, box and short-form wording might be different, and probably simpler. And it might make more sense to start with the Microsoft-provided Elevation of Privilege files (and open source license).&lt;br /&gt;
&lt;br /&gt;
''B - Upcoming update to Cornucopia''&lt;br /&gt;
&lt;br /&gt;
Note that the current print design files are v1.04, and the current Word document is v1.10, but we are in the process of updating all of these to v1.20.&lt;br /&gt;
&lt;br /&gt;
Whatever is used as a starting point, please state the source version, for example: &lt;br /&gt;
&lt;br /&gt;
  Based on OWASP Cornucopia Ecommerce Website Edition v1.04&lt;br /&gt;
&lt;br /&gt;
''C - OWASP brand usage''&lt;br /&gt;
&lt;br /&gt;
Additionally individuals, companies and other organisations must not breach OWASP's brand usage guidelines. &lt;br /&gt;
&lt;br /&gt;
  https://www.owasp.org/index.php/Marketing/Resources#tab=BRAND_GUIDELINES&lt;br /&gt;
&lt;br /&gt;
In the case of Cornucopia, in 2014 Blackfoot Limited produced some printed decks of cards. Blackfoot's name and logo did not appear anywhere on the OWASP-branded cards, and the OWASP logo did not appear on the Blackfoot-branded box and leaflet. In fact there is no OWASP logo on any part of the Blackfoot branded decks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-data-A.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Cornucopia is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Thomas Berson&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Oana Cornea&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Todd Dahl&lt;br /&gt;
* Luis Enriquez&lt;br /&gt;
* Ken Ferris&lt;br /&gt;
* Darío De Filippis&lt;br /&gt;
* Sebastien Gioria&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Timo Goosen&lt;br /&gt;
* Anthony Harrison&lt;br /&gt;
* John Herrlin&lt;br /&gt;
* Jerry Hoff&lt;br /&gt;
* Marios Kourtesis&lt;br /&gt;
* Franck Lacosta&lt;br /&gt;
* Mathias Lemaire&lt;br /&gt;
* Antonis Manaras&lt;br /&gt;
* Jim Manico&lt;br /&gt;
* Mark Miller&lt;br /&gt;
* Cam Morris&lt;br /&gt;
* Susana Romaniz&lt;br /&gt;
* Ravishankar Sahadevan&lt;br /&gt;
* Tao Sauvage&lt;br /&gt;
* Wagner Voltz&lt;br /&gt;
* Stephen de Vries&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
Also:&lt;br /&gt;
&lt;br /&gt;
* Attendees at OWASP London, OWASP Manchester and OWASP Netherlands chapter meetings, the London Gamification meetup, and the training at AppSec USA 2015 in san Francisco who made helpful suggestions and asked challenging questions&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
* Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
* Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
* Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
* Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
* Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
* Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authentication-7.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-joker-a.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Version history (see [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx uploads]):&lt;br /&gt;
* Alpha version (0.40) was issued in August 2012&lt;br /&gt;
* Beta version (1.00) was released in February 2013&lt;br /&gt;
* Stable release (1.02) was released in August 2013, following feedback from mailing list and use with groups of developers&lt;br /&gt;
* Release v1.03 included minor changes&lt;br /&gt;
* Release v1.04 included a text correction on one card&lt;br /&gt;
* Release v1.05 included additional narrative and FAQs&lt;br /&gt;
* Current release v1.10 included cross-references updated for 2014 version of ASVS, contributors updated and minor text changes to cards to improve readability&lt;br /&gt;
* Current release v1.20 included cross-references updated for version 3.0.1 of ASVS and CAPEC v2.8, and many minor text changes including further contributors.&lt;br /&gt;
&lt;br /&gt;
As of July 2018, the priorities are:&lt;br /&gt;
* &amp;lt;strike&amp;gt;Develop Cornucopia Wiki Deck&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Update the document/deck to shorten some card text [completed ready for v1.10]&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVS 2014&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVSv3 2016&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check/update CAPEC mappings&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Translate into French&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Translate into French (completed), German (in progress), Japanese, Portuguese (in progress), Spanish (in progress) and other languages (help needed please)&lt;br /&gt;
* &amp;lt;strike&amp;gt;Make card decks available via OWASP Merchandise Store&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create a video &amp;quot;how to play&amp;quot;&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Update printed decks in non-EN languages&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Cornucopia is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Cornucopia into that language?&lt;br /&gt;
==Use and Promote the Cornucopia Card Decks==&lt;br /&gt;
Please help raise awareness of Cornucopia by printing cards:&lt;br /&gt;
* Use Cornucopia with specifiers, architects, designers, developers, testers and others, in part to train them, but also to solicit feedback on their usability, practicality and appropriateness for their work&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a mobile app to play the game&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What cards don't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other decks would you like to see?&lt;br /&gt;
==Keep the Cards Updated==&lt;br /&gt;
As the source referenced documents change, we have to update the decks. You may also find errors and omissions. In the first instance, please send a message to the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] if you have identified errors &amp;amp;amp; omissions, have some time to maintain the source documents, or can help in other ways.&lt;br /&gt;
==Create a New Deck==&lt;br /&gt;
The only version currently available is the Cornucopia Ecommerce Website Edition in English. We would like to create a new mobile app specific deck, probably using the wonderful [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] as inspiration for the card source materials. Do you have an idea for your own application security requirements card deck? Perhaps for {{#switchtablink:Mobile App Edition|mobile apps}} or something else?&lt;br /&gt;
&lt;br /&gt;
= About Ecommerce Website Edition =&lt;br /&gt;
{{:Projects/OWASP Cornucopia Ecommerce Website Edition | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]] &lt;br /&gt;
[[Category: Threat_Modeling]] &lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:SAMM-SR-1]] &lt;br /&gt;
[[Category:SAMM-SR-2]] &lt;br /&gt;
[[Category:SAMM-TA-1]] &lt;br /&gt;
[[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=241801</id>
		<title>OWASP Cornucopia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=241801"/>
				<updated>2018-07-13T10:07:42Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* News and Events */ PT-BR added&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cornucopia-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#Lab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Cornucopia==&lt;br /&gt;
OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology agnostic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
The idea behind Cornucopia is to help development teams, especially those using Agile methodologies, to identify application security requirements and develop security-based user stories. Although the idea had been waiting for enough time to progress it, the final motivation came when [http://www.safecode.org/ SAFECode] published its [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf Practical Security Stories and Security Tasks for Agile Development Environments] in July 2012.&lt;br /&gt;
&lt;br /&gt;
The Microsoft SDL team had already published its super [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] (EoP) but that did not seem to address the most appropriate kind of issues that web application development teams mostly have to address. EoP is a great concept and game strategy, and was [http://blogs.msdn.com/b/sdl/archive/2010/03/02/announcing-elevation-of-privilege-the-threat-modeling-game.aspx published under] a [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License].&lt;br /&gt;
Cornucopia {{#switchtablink:Ecommerce Website Edition|Ecommerce Website Edition}} is based the concepts and game ideas in EoP, but those have been modified to be more relevant to the types of issues ecommerce website developers encounter. It attempts to introduce threat-modelling ideas into development teams that use Agile methodologies, or are more focused on web application weaknesses than other types of software vulnerabilities or are not familiar with STRIDE and DREAD.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The Card Decks==&lt;br /&gt;
&lt;br /&gt;
''Ecommerce Website Edition''&lt;br /&gt;
&lt;br /&gt;
Instead of EoP’s STRIDE suits, Cornucopia suits were selected based on the structure of the [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide] (SCP), but with additional consideration of sections in the [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard], the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide] and David Rook’s [http://www.securityninja.co.uk/secure-development/the-principles-place/ Principles of Secure Development]. These provided five suits, and a sixth called “Cornucopia” was created for everything else: &lt;br /&gt;
&lt;br /&gt;
* Data validation and encoding&lt;br /&gt;
* Authentication&lt;br /&gt;
* Session management&lt;br /&gt;
* Authorization&lt;br /&gt;
* Cryptography&lt;br /&gt;
* Cornucopia&lt;br /&gt;
&lt;br /&gt;
Each suit contains 13 cards (Ace, 2-10, Jack, Queen and King) but, unlike EoP, there are also two Joker cards. The content was mainly drawn from the SCP. Full [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]].&lt;br /&gt;
&lt;br /&gt;
''Other Decks''&lt;br /&gt;
&lt;br /&gt;
Future editions such as for mobile app development will use different sources of information and suits.&lt;br /&gt;
&lt;br /&gt;
==Mappings==&lt;br /&gt;
The other driver for Cornucopia is to link the attacks with requirements and verification techniques. An initial aim had been to reference [http://cwe.mitre.org/ CWE] weakness IDs, but these proved too numerous, and instead it was decided to map each card to [http://capec.mitre.org/ CAPEC] software attack pattern IDs which themselves are mapped to CWEs, so the desired result is achieved.&lt;br /&gt;
&lt;br /&gt;
Each card is also mapped to the 36 primary security stories in the [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode document], as well as to the OWASP [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide SCP v2], [https://www.owasp.org/images/3/33/OWASP_Application_Security_Verification_Standard_3.0.1.pdf ASVS v3.0.1] and [https://www.owasp.org/index.php/OWASP_AppSensor_Project AppSensor] (application attack detection and response) to help teams create their own security-related stories for use in Agile processes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Cornucopia is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] mentioned above, [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), [https://www.owasp.org/index.php/OWASP_Snakes_and_Ladders OWASP Snakes and Ladders], and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Cornucopia? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia is a card game used to help derive application security requirements during the software development life cycle. To start using Cornucopia:&lt;br /&gt;
&lt;br /&gt;
* Download the document&lt;br /&gt;
* Print the cards onto plain paper or pre-scored card&lt;br /&gt;
* Cut/separate the individual cards&lt;br /&gt;
* Identify an application, module or component to assess&lt;br /&gt;
* Invite business owners, architects, developers, testers along for a card game&lt;br /&gt;
* Get those infosec folk to provide chocolate, pizza, beer, flowers or all four as prizes&lt;br /&gt;
* Select a portion of the deck to start with&lt;br /&gt;
* {{#switchtablink:How to Play|Play the game}} to discuss &amp;amp;amp; document security requirements (and to win rounds)&lt;br /&gt;
* Remember, points make prizes!&lt;br /&gt;
&lt;br /&gt;
Listen to the [http://trustedsoftwarealliance.com/2014/03/21/the-owasp-cornucopia-project-with-colin-watson/ OWASP 24/7 Podcast] about Cornucopia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-presentation-small.jpg|link=media:Owaspnl-colinwatson-cornucopia.odp]]&lt;br /&gt;
&lt;br /&gt;
The game rules are in the document download. But the OpenOffice [[media:Owasplondon-colinwatson-cornucopia.odp|project presentation]] includes an animated version of four demonstration rounds. The presentation is recorded [http://youtu.be/Q_LE-8xNXVk on video].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dariodf Darío De Filippis] [mailto:dariodefilippis@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://youtu.be/i5Y0akWj31k How to Play] video&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Cornucopia-scoresheet.pdf Scoresheet]&lt;br /&gt;
* {{#switchtablink:Get the Cards|All sources and downloads...}}&lt;br /&gt;
&lt;br /&gt;
== Reference Files ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:OWASP_SCP_Quick_Reference_Guide_v2.pdf OWASP SCP requirements]&lt;br /&gt;
* [https://www.owasp.org/images/5/58/OWASP_ASVS_Version_2.pdf OWASP ASVS verification IDs]&lt;br /&gt;
* [https://www.owasp.org/index.php/AppSensor_DetectionPoints OWASP AppSensor attack detection point IDs] &lt;br /&gt;
* [http://capec.mitre.org/data/archive/capec_v1.7.1.zip CAPEC IDs]&lt;br /&gt;
* [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode security-focused story IDs]&lt;br /&gt;
&lt;br /&gt;
The OWASP SCP does not include identity values for the requirements, so please use [https://www.owasp.org/index.php/File:Owasp-requirements-numbering.zip this list].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [26 Jun 2018] v1.20 FR released&lt;br /&gt;
* [14 May 2018] Printed deck purchase details updated&lt;br /&gt;
* [13 Jan 2018 v1.20 PT-BR released&lt;br /&gt;
* [23 Aug 2016] Presentation at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [29 Jun 2016] v1.20 released&lt;br /&gt;
* [21 Jan 2016] [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]] published&lt;br /&gt;
* [30 Dec 2015] Darío De Filippis becomes project co-leader&lt;br /&gt;
* [24 Sep 2015] [http://appsecusa2015.sched.org/event/7f3dba889c0ec9e37900e289c9660503#.VZ6aoXhflNY Lightning training] at AppSec USA 2015&lt;br /&gt;
* [01 Jun 2015] [https://youtu.be/i5Y0akWj31k How to Play video] published&lt;br /&gt;
* [20 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - How to play video&lt;br /&gt;
* [31 Mar 2015] v1.10 released&lt;br /&gt;
* [02 Mar 2015] Decks available from [https://www.owasp.org/index.php/OWASP_Merchandise#Cornucopia_Cards OWASP merchandise store]&lt;br /&gt;
* [18 Feb 2015] Project awarded Labs status&lt;br /&gt;
&lt;br /&gt;
==PCIDSS==&lt;br /&gt;
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia Ecommerce Website Edition is referenced in the current [https://www.pcisecuritystandards.org Payment Card Industry Security Standards Council]  information supplement [https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf PCI DSS E-commerce Guidelines] v2, January 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Get the Cards =&lt;br /&gt;
&lt;br /&gt;
==Printed==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-square-logo-350.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Professionally printed decks are available by two methods:&lt;br /&gt;
* Single decks or in bulk from OWASP (v1.20)&lt;br /&gt;
** As promotion items '''by OWASP Leaders''' from their own chapter budgets [https://docs.google.com/a/owasp.org/forms/d/e/1FAIpQLSez9mV97HuqvYhCldE2hYhX3UjQM1oO5bLy44HkOZSpni0OzQ/viewform?formkey=dF85bGtvdWdrd2JjYldNZ1gxSkJxaEE6MQ Chapter and Project Merchandise Request form]&lt;br /&gt;
** For other individuals, organisations and companies, please email [mailto:dawn.aitken@owasp.org dawn.aitken@owasp.org] with purchase enquiries&lt;br /&gt;
* Request a free deck of cards gifted by [http://blackfootuk.com/ Blackfoot UK Limited] or download their donated print-ready artwork:&lt;br /&gt;
** Request a free [http://blackfootuk.com/cornucopia/receive-a-set-of-cards/ pack of cards (v1.10)] (gifted by Blackfoot UK)&lt;br /&gt;
&lt;br /&gt;
==Source files==&lt;br /&gt;
&lt;br /&gt;
Cornucopia - Ecommerce Website Edition:&lt;br /&gt;
* v1.2 (current version)&lt;br /&gt;
** [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN DOC] | [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR DOC] | [https://github.com/wagnerfusca/OWASP-Cornucopia-Translate-Cards---PT PT-BR DOC]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN PDF]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.1 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki]]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjb283ZE5GNmFMM2FGWGl2WC14aDJDQ0ZsNk00 Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.04 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/cornucopia-ecom-1v04-blackfoot.zip Print-Ready design files]  (gifted by Blackfoot UK) 47Mb Zip&lt;br /&gt;
&lt;br /&gt;
The current version of Cornucopia Ecommerce Website Edition cards (v1.20 with updated mapping to ASVS v3.0.1 and CAPEC v2.8, and has some minor text changes on the cards) can be printed using the following methods:&lt;br /&gt;
# Download the free Adobe Illustrator files ([https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ EN]) and get them professionally printed&lt;br /&gt;
# Download and self-print the free document word-processing ([https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN], [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR]) or PDF ([https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN])&lt;br /&gt;
## Print the document onto business card blank cards; or&lt;br /&gt;
## Print the document onto normal card and cut the cards out individually using the guide; or&lt;br /&gt;
# Generate your own cards from the free [https://www.owasp.org/index.php/File:Cornucopia-deck-ecommercewebsite-XML.zip source XML data file]&lt;br /&gt;
&lt;br /&gt;
There are also other ways to obtain particular versions:&lt;br /&gt;
* Download the free [https://www.owasp.org/index.php/File:Owasp_cornucopia_printreadyimages.zip PDF (v1.03)] (gifted by Travelex) &lt;br /&gt;
** Have the cards commercially printed; or&lt;br /&gt;
** Import into your own files (such as [http://lists.owasp.org/pipermail/owasp_cornucopia/2014-January/000018.html this way] suggested by Cam Morris via the mailing list)&lt;br /&gt;
&lt;br /&gt;
OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
Collect/share/use the pseudo-random cards tweeted twice daily [https://twitter.com/OWASPCornucopia @OWASPCornucopia]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How to Play =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-cornucopia-K.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-session-9.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
It is possible to play Cornucopia in many different ways. Here is one way, and explained in a [https://youtu.be/i5Y0akWj31k YouTube video].&lt;br /&gt;
&lt;br /&gt;
== Primary method ==&lt;br /&gt;
&lt;br /&gt;
;A - Preparations&lt;br /&gt;
:A1.	Obtain a deck, or print your own Cornucopia deck and separate/cut out the cards&lt;br /&gt;
:A2.	Identify an application or application process to review; this might be a concept, design or an actual implementation&lt;br /&gt;
:A3.	Create a data flow diagram&lt;br /&gt;
:A4.	Identify and invite a group of 3-6 architects, developers, testers and other business stakeholders together and sit around a table (try to include someone fairly familiar with application security)&lt;br /&gt;
:A5.	Have some prizes to hand (gold stars, chocolate, pizza, beer or flowers depending upon your office culture)&lt;br /&gt;
;B - Play&lt;br /&gt;
:One suit - Cornucopia - acts as trumps. Aces are high (i.e. they beat Kings). It helps if there is someone dedicated to documenting the results who is not playing.&lt;br /&gt;
:B1.	Remove the Jokers and a few low-score (2, 3, 4) cards from Cornucopia suit to ensure each player will have the same number of cards&lt;br /&gt;
:B2.	Shuffle the pack and deal all the cards&lt;br /&gt;
:B3.	To begin, choose a player randomly who will play the first card - they can play any card from their hand except from the trump suit - Cornucopia&lt;br /&gt;
:B4.	To play a card, each player must read it out aloud, and explain how (or not) the threat could apply (the player gets a point for attacks that work, and the group thinks it is an actionable bug) - don’t try to think of mitigations at this stage, and don’t exclude a threat just because it is believed it is already mitigated - someone record the card on the score sheet&lt;br /&gt;
:B5.	Play clockwise, each person must play a card in the same way; if you have any card of the matching lead suit you must play one of those, otherwise they can play a card from any other suit. Only a higher card of the same suit, or the highest card in the trump suit Cornucopia, wins the hand.&lt;br /&gt;
:B6.	The person who wins the round, leads the next round (i.e. they play first), and thus defines the next lead suit&lt;br /&gt;
:B7.	Repeat until all the cards are played&lt;br /&gt;
;C - Scoring&lt;br /&gt;
:The objective is to identify applicable threats, and win hands (rounds):&lt;br /&gt;
:C1.	Score +1 for each card you can identify as a valid threat to the application under consideration&lt;br /&gt;
:C2.	Score +1 if you win a round&lt;br /&gt;
:C3.	Once all cards have been played, whoever has the most points wins&lt;br /&gt;
;D - Closure&lt;br /&gt;
:D1.	Review all the applicable threats and the matching security requirements&lt;br /&gt;
:D2.	Create user stories, specifications and test cases as required for your development methodology&lt;br /&gt;
&lt;br /&gt;
==Alternative game rules==&lt;br /&gt;
&lt;br /&gt;
* If you are new to the game, remove the two Joker cards to begin with. Add the Joker cards back in once people become more familiar with the process. Apart from the “trumps card game” rules described above which are very similar to the EoP, the deck can also be played as the “twenty-one card game” (also known as “pontoon” or “blackjack”) which normally reduces the number of cards played in each round.&lt;br /&gt;
* Practice on an imaginary application, or even a future planned application, rather than trying to find fault with existing applications until the participants are happy with the usefulness of the game.&lt;br /&gt;
* Consider just playing with one suit to make a shorter session – but try to cover all the suits for every project. Or even better just play one hand with some pre-selected cards, and score only on the ability to identify security requirements. Perhaps have one game of each suit each day for a week or so, if the participants cannot spare long enough for a full deck.&lt;br /&gt;
* Some teams have preferred to play a full hand of cards, and then discuss what is on the cards after each round (instead of after each person plays a card).&lt;br /&gt;
* Another suggestion is that if a player fails to identify the card is relevant, allow other players to suggest ideas, and potentially let them gain the point for the card. Consider allowing extra points for especially good contributions.&lt;br /&gt;
* You can even play by yourself. Just use the cards to act as thought-provokers. Involving more people will be beneficial though.&lt;br /&gt;
* In Microsoft's EoP guidance, they recommend cheating as a good game strategy&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authorization-8.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-cryptography-j.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
; Can I copy or edit the game?&lt;br /&gt;
:Yes of course. All OWASP materials are free to do with as you like provided you comply with the Creative Commons Attribution-ShareAlike 3.0 license. Perhaps if you create a new version, you might donate it to the OWASP Cornucopia Project?&lt;br /&gt;
&lt;br /&gt;
; How can I get involved?&lt;br /&gt;
: Please send ideas or offers of help to the project’s mailing list.&lt;br /&gt;
&lt;br /&gt;
; How were the attackers’ names chosen?&lt;br /&gt;
: EoP begins every description with words like &amp;quot;An attacker can...&amp;quot;. These have to be phrased as an attack but I was not keen on the anonymous terminology, wanting something more engaging, and therefore used personal names. These can be thought of as external or internal people or aliases for computer systems. But instead of just random names, I thought how they might reflect the OWASP community aspect. Therefore, apart from &amp;quot;Alice and Bob&amp;quot;, I use the given (first) names of current and recent OWASP employees and Board members (assigned in no order), and then randomly selected the remaining 50 or so names from the current list of paying individual OWASP members. No name was used more than once, and where people had provided two personal names, I dropped one part to try to ensure no-one can be easily identified. Names were not deliberately allocated to any particular attack, defence or requirement. The cultural and gender mix simply reflects theses sources of names, and is not meant to be world-representative.&lt;br /&gt;
&lt;br /&gt;
; Why aren’t there any images on the card faces?&lt;br /&gt;
: There is quite a lot of text on the cards, and the cross-referencing takes up space too. But it would be great to have additional design elements included. Any volunteers?&lt;br /&gt;
&lt;br /&gt;
; Are the attacks ranked by the number on the card?&lt;br /&gt;
: Only approximately. The risk will be application and organisation dependent, due to varying security and compliance requirements, so your own severity rating may place the cards in some other order than the numbers on the cards.&lt;br /&gt;
&lt;br /&gt;
; How long does it take to play a round of cards using the full deck?&lt;br /&gt;
: This depends upon the amount of discussion and how familiar the players are with application security concepts. But perhaps allow 1.5 to 2.0 hours for 4-6 people.&lt;br /&gt;
&lt;br /&gt;
; What sort of people should play the game?&lt;br /&gt;
:Always try to have a mix of roles who can contribute alternative perspectives. But include someone who has a reasonable knowledge of application vulnerability terminology. Otherwise try to include a mix of architects, developers, testers and a relevant project manager or business owner.&lt;br /&gt;
&lt;br /&gt;
; Who should take notes and record scores?&lt;br /&gt;
: It is better if that someone else, not playing the game, takes notes about the requirements identified and issues discussed. This could be used as training for a more junior developer, or performed by the project manager. Some organisations have made a recording to review afterwards when the requirements are written up more formally.&lt;br /&gt;
&lt;br /&gt;
; Should we always use the full deck of cards?&lt;br /&gt;
: No. A smaller deck is quicker to play. Start your first game with only enough cards for two or three rounds. Always consider removing cards that are not appropriate at all of the target application or function being reviewed. For the first few times people play the game it is also usually better to remove the Aces and the two Jokers. It is also usual to play the game without any trumps suit until people are more familiar with the idea.&lt;br /&gt;
&lt;br /&gt;
; What should players do when they have an Ace card that says “invented a new X attack”?&lt;br /&gt;
: The player can make up any attack they think is valid, but must match the suit of the card e.g. data validation and encoding). With players new to the game, it can be better to remove these to begin with.&lt;br /&gt;
&lt;br /&gt;
; I don’t understand what the attack means on each card - is there more detailed information?&lt;br /&gt;
: Yes, the Wiki Deck at was created to help players understand the attacks. See [https://www.owasp.org/index.php/Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck Wiki Deck].&lt;br /&gt;
&lt;br /&gt;
; My company wants to print its own version of OWASP Cornucopia - what license do we need to refer to?&lt;br /&gt;
: What is required/reasonable might depend upon how you propose to use the source Cornucopia material. See fuller answer immediately below.&lt;br /&gt;
&lt;br /&gt;
Some examples of re-using or reproducing Cornucopia are:&lt;br /&gt;
&lt;br /&gt;
# Print some decks and give them away to customers&lt;br /&gt;
# Reproduce the game exactly but with a corporate-branded package&lt;br /&gt;
# Use the idea and/or source files to produce a similar game but with different attacks/mappings&lt;br /&gt;
# Distribute modified design files&lt;br /&gt;
&lt;br /&gt;
If option 1 above, you can order these in bulk from OWASP and attach your own details below the &amp;quot;compliments of&amp;quot; section on the boxes. There are three aspects to consider for options 2, 3 or 4, or combinations of those - see below. The existing printed decks (and their boxes and leaflets include such text).&lt;br /&gt;
&lt;br /&gt;
''A - Cornucopia License''&lt;br /&gt;
&lt;br /&gt;
The precise wording will depend how the material is being used or reproduced. Under Creative Commons Attribution-ShareAlike 3.0 license it is necessary to attribute all previous contributions (in this case, Microsoft, Boeing, Mitre, etc). The easiest place to put the wording is on the leaflet (folded inside, or separate booklet). The current required long-form wording is:&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license http://creativecommons.org/licenses/by-sa/3.0/&lt;br /&gt;
&lt;br /&gt;
  The files used to create these materials were created from the OWASP project and are also open source, and are licensed under the same conditions. &lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia can be downloaded for free from the OWASP website and printed yourself. The OWASP Cornucopia project source in vendor neutral and unbranded.&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  © 2012-2018 OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
  This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license.&lt;br /&gt;
&lt;br /&gt;
  Acknowledgments:&lt;br /&gt;
&lt;br /&gt;
  Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
&lt;br /&gt;
  Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
&lt;br /&gt;
  Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
&lt;br /&gt;
  Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
&lt;br /&gt;
  Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
&lt;br /&gt;
  Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
&lt;br /&gt;
  Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
The box/container for the cards must have the wording:&lt;br /&gt;
&lt;br /&gt;
  Created by Colin Watson.&lt;br /&gt;
&lt;br /&gt;
  Contains: One pack of Cornucopia Ecommerce Website playing cards. OWASP Cornucopia is open source and can be downloaded free of charge from the OWASP website.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
The following short-form wording must also appear on any materials referencing the outputs (e.g. press releases, leaflets, reports, blog posts):&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license and is © 2012-2016 OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
If any files are distributed electronically, the long-form wording should also be aded in a license.txt file within the distribution.&lt;br /&gt;
&lt;br /&gt;
If the intention is to use the idea only (option 3 above), the long-form, box and short-form wording might be different, and probably simpler. And it might make more sense to start with the Microsoft-provided Elevation of Privilege files (and open source license).&lt;br /&gt;
&lt;br /&gt;
''B - Upcoming update to Cornucopia''&lt;br /&gt;
&lt;br /&gt;
Note that the current print design files are v1.04, and the current Word document is v1.10, but we are in the process of updating all of these to v1.20.&lt;br /&gt;
&lt;br /&gt;
Whatever is used as a starting point, please state the source version, for example: &lt;br /&gt;
&lt;br /&gt;
  Based on OWASP Cornucopia Ecommerce Website Edition v1.04&lt;br /&gt;
&lt;br /&gt;
''C - OWASP brand usage''&lt;br /&gt;
&lt;br /&gt;
Additionally individuals, companies and other organisations must not breach OWASP's brand usage guidelines. &lt;br /&gt;
&lt;br /&gt;
  https://www.owasp.org/index.php/Marketing/Resources#tab=BRAND_GUIDELINES&lt;br /&gt;
&lt;br /&gt;
In the case of Cornucopia, in 2014 Blackfoot Limited produced some printed decks of cards. Blackfoot's name and logo did not appear anywhere on the OWASP-branded cards, and the OWASP logo did not appear on the Blackfoot-branded box and leaflet. In fact there is no OWASP logo on any part of the Blackfoot branded decks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-data-A.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Cornucopia is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Thomas Berson&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Oana Cornea&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Todd Dahl&lt;br /&gt;
* Luis Enriquez&lt;br /&gt;
* Ken Ferris&lt;br /&gt;
* Darío De Filippis&lt;br /&gt;
* Sebastien Gioria&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Timo Goosen&lt;br /&gt;
* Anthony Harrison&lt;br /&gt;
* John Herrlin&lt;br /&gt;
* Jerry Hoff&lt;br /&gt;
* Marios Kourtesis&lt;br /&gt;
* Franck Lacosta&lt;br /&gt;
* Mathias Lemaire&lt;br /&gt;
* Antonis Manaras&lt;br /&gt;
* Jim Manico&lt;br /&gt;
* Mark Miller&lt;br /&gt;
* Cam Morris&lt;br /&gt;
* Susana Romaniz&lt;br /&gt;
* Ravishankar Sahadevan&lt;br /&gt;
* Tao Sauvage&lt;br /&gt;
* Wagner Voltz&lt;br /&gt;
* Stephen de Vries&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
Also:&lt;br /&gt;
&lt;br /&gt;
* Attendees at OWASP London, OWASP Manchester and OWASP Netherlands chapter meetings, the London Gamification meetup, and the training at AppSec USA 2015 in san Francisco who made helpful suggestions and asked challenging questions&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
* Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
* Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
* Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
* Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
* Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
* Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authentication-7.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-joker-a.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Version history (see [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx uploads]):&lt;br /&gt;
* Alpha version (0.40) was issued in August 2012&lt;br /&gt;
* Beta version (1.00) was released in February 2013&lt;br /&gt;
* Stable release (1.02) was released in August 2013, following feedback from mailing list and use with groups of developers&lt;br /&gt;
* Release v1.03 included minor changes&lt;br /&gt;
* Release v1.04 included a text correction on one card&lt;br /&gt;
* Release v1.05 included additional narrative and FAQs&lt;br /&gt;
* Current release v1.10 included cross-references updated for 2014 version of ASVS, contributors updated and minor text changes to cards to improve readability&lt;br /&gt;
* Current release v1.20 included cross-references updated for version 3.0.1 of ASVS and CAPEC v2.8, and many minor text changes including further contributors.&lt;br /&gt;
&lt;br /&gt;
As of May 2016, the priorities are:&lt;br /&gt;
* &amp;lt;strike&amp;gt;Develop Cornucopia Wiki Deck&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Update the document/deck to shorten some card text [completed ready for v1.10]&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVS 2014&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVSv3 2016&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check/update CAPEC mappings&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Translate into French&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Translate into Japanese, Spanish (almost complete May 2016) and other languages (help needed please) - German in progress (from June 2014)&lt;br /&gt;
* &amp;lt;strike&amp;gt;Make card decks available via OWASP Merchandise Store&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create a video &amp;quot;how to play&amp;quot;&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Update printed decks in OWASP Merchandise Store to v1.20 in both EN and ES languages&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Cornucopia is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Cornucopia into that language?&lt;br /&gt;
==Use and Promote the Cornucopia Card Decks==&lt;br /&gt;
Please help raise awareness of Cornucopia by printing cards:&lt;br /&gt;
* Use Cornucopia with specifiers, architects, designers, developers, testers and others, in part to train them, but also to solicit feedback on their usability, practicality and appropriateness for their work&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a mobile app to play the game&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What cards don't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other decks would you like to see?&lt;br /&gt;
==Keep the Cards Updated==&lt;br /&gt;
As the source referenced documents change, we have to update the decks. You may also find errors and omissions. In the first instance, please send a message to the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] if you have identified errors &amp;amp;amp; omissions, have some time to maintain the source documents, or can help in other ways.&lt;br /&gt;
==Create a New Deck==&lt;br /&gt;
The only version currently available is the Cornucopia Ecommerce Website Edition in English. We would like to create a new mobile app specific deck, probably using the wonderful [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] as inspiration for the card source materials. Do you have an idea for your own application security requirements card deck? Perhaps for {{#switchtablink:Mobile App Edition|mobile apps}} or something else?&lt;br /&gt;
&lt;br /&gt;
= About Ecommerce Website Edition =&lt;br /&gt;
{{:Projects/OWASP Cornucopia Ecommerce Website Edition | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]] &lt;br /&gt;
[[Category: Threat_Modeling]] &lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:SAMM-SR-1]] &lt;br /&gt;
[[Category:SAMM-SR-2]] &lt;br /&gt;
[[Category:SAMM-TA-1]] &lt;br /&gt;
[[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=241800</id>
		<title>OWASP Cornucopia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=241800"/>
				<updated>2018-07-13T10:04:10Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Source files */ Link to PT-BR version&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cornucopia-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#Lab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Cornucopia==&lt;br /&gt;
OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology agnostic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
The idea behind Cornucopia is to help development teams, especially those using Agile methodologies, to identify application security requirements and develop security-based user stories. Although the idea had been waiting for enough time to progress it, the final motivation came when [http://www.safecode.org/ SAFECode] published its [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf Practical Security Stories and Security Tasks for Agile Development Environments] in July 2012.&lt;br /&gt;
&lt;br /&gt;
The Microsoft SDL team had already published its super [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] (EoP) but that did not seem to address the most appropriate kind of issues that web application development teams mostly have to address. EoP is a great concept and game strategy, and was [http://blogs.msdn.com/b/sdl/archive/2010/03/02/announcing-elevation-of-privilege-the-threat-modeling-game.aspx published under] a [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License].&lt;br /&gt;
Cornucopia {{#switchtablink:Ecommerce Website Edition|Ecommerce Website Edition}} is based the concepts and game ideas in EoP, but those have been modified to be more relevant to the types of issues ecommerce website developers encounter. It attempts to introduce threat-modelling ideas into development teams that use Agile methodologies, or are more focused on web application weaknesses than other types of software vulnerabilities or are not familiar with STRIDE and DREAD.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The Card Decks==&lt;br /&gt;
&lt;br /&gt;
''Ecommerce Website Edition''&lt;br /&gt;
&lt;br /&gt;
Instead of EoP’s STRIDE suits, Cornucopia suits were selected based on the structure of the [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide] (SCP), but with additional consideration of sections in the [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard], the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide] and David Rook’s [http://www.securityninja.co.uk/secure-development/the-principles-place/ Principles of Secure Development]. These provided five suits, and a sixth called “Cornucopia” was created for everything else: &lt;br /&gt;
&lt;br /&gt;
* Data validation and encoding&lt;br /&gt;
* Authentication&lt;br /&gt;
* Session management&lt;br /&gt;
* Authorization&lt;br /&gt;
* Cryptography&lt;br /&gt;
* Cornucopia&lt;br /&gt;
&lt;br /&gt;
Each suit contains 13 cards (Ace, 2-10, Jack, Queen and King) but, unlike EoP, there are also two Joker cards. The content was mainly drawn from the SCP. Full [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]].&lt;br /&gt;
&lt;br /&gt;
''Other Decks''&lt;br /&gt;
&lt;br /&gt;
Future editions such as for mobile app development will use different sources of information and suits.&lt;br /&gt;
&lt;br /&gt;
==Mappings==&lt;br /&gt;
The other driver for Cornucopia is to link the attacks with requirements and verification techniques. An initial aim had been to reference [http://cwe.mitre.org/ CWE] weakness IDs, but these proved too numerous, and instead it was decided to map each card to [http://capec.mitre.org/ CAPEC] software attack pattern IDs which themselves are mapped to CWEs, so the desired result is achieved.&lt;br /&gt;
&lt;br /&gt;
Each card is also mapped to the 36 primary security stories in the [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode document], as well as to the OWASP [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide SCP v2], [https://www.owasp.org/images/3/33/OWASP_Application_Security_Verification_Standard_3.0.1.pdf ASVS v3.0.1] and [https://www.owasp.org/index.php/OWASP_AppSensor_Project AppSensor] (application attack detection and response) to help teams create their own security-related stories for use in Agile processes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Cornucopia is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] mentioned above, [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), [https://www.owasp.org/index.php/OWASP_Snakes_and_Ladders OWASP Snakes and Ladders], and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Cornucopia? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia is a card game used to help derive application security requirements during the software development life cycle. To start using Cornucopia:&lt;br /&gt;
&lt;br /&gt;
* Download the document&lt;br /&gt;
* Print the cards onto plain paper or pre-scored card&lt;br /&gt;
* Cut/separate the individual cards&lt;br /&gt;
* Identify an application, module or component to assess&lt;br /&gt;
* Invite business owners, architects, developers, testers along for a card game&lt;br /&gt;
* Get those infosec folk to provide chocolate, pizza, beer, flowers or all four as prizes&lt;br /&gt;
* Select a portion of the deck to start with&lt;br /&gt;
* {{#switchtablink:How to Play|Play the game}} to discuss &amp;amp;amp; document security requirements (and to win rounds)&lt;br /&gt;
* Remember, points make prizes!&lt;br /&gt;
&lt;br /&gt;
Listen to the [http://trustedsoftwarealliance.com/2014/03/21/the-owasp-cornucopia-project-with-colin-watson/ OWASP 24/7 Podcast] about Cornucopia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-presentation-small.jpg|link=media:Owaspnl-colinwatson-cornucopia.odp]]&lt;br /&gt;
&lt;br /&gt;
The game rules are in the document download. But the OpenOffice [[media:Owasplondon-colinwatson-cornucopia.odp|project presentation]] includes an animated version of four demonstration rounds. The presentation is recorded [http://youtu.be/Q_LE-8xNXVk on video].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dariodf Darío De Filippis] [mailto:dariodefilippis@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://youtu.be/i5Y0akWj31k How to Play] video&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Cornucopia-scoresheet.pdf Scoresheet]&lt;br /&gt;
* {{#switchtablink:Get the Cards|All sources and downloads...}}&lt;br /&gt;
&lt;br /&gt;
== Reference Files ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:OWASP_SCP_Quick_Reference_Guide_v2.pdf OWASP SCP requirements]&lt;br /&gt;
* [https://www.owasp.org/images/5/58/OWASP_ASVS_Version_2.pdf OWASP ASVS verification IDs]&lt;br /&gt;
* [https://www.owasp.org/index.php/AppSensor_DetectionPoints OWASP AppSensor attack detection point IDs] &lt;br /&gt;
* [http://capec.mitre.org/data/archive/capec_v1.7.1.zip CAPEC IDs]&lt;br /&gt;
* [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode security-focused story IDs]&lt;br /&gt;
&lt;br /&gt;
The OWASP SCP does not include identity values for the requirements, so please use [https://www.owasp.org/index.php/File:Owasp-requirements-numbering.zip this list].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [26 Jun 2018] v1.20 FR released&lt;br /&gt;
* [14 May 2018] Printed deck purchase details updated&lt;br /&gt;
* [23 Aug 2016] Presentation at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [29 Jun 2016] v1.20 released&lt;br /&gt;
* [21 Jan 2016] [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]] published&lt;br /&gt;
* [30 Dec 2015] Darío De Filippis becomes project co-leader&lt;br /&gt;
* [24 Sep 2015] [http://appsecusa2015.sched.org/event/7f3dba889c0ec9e37900e289c9660503#.VZ6aoXhflNY Lightning training] at AppSec USA 2015&lt;br /&gt;
* [01 Jun 2015] [https://youtu.be/i5Y0akWj31k How to Play video] published&lt;br /&gt;
* [20 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - How to play video&lt;br /&gt;
* [31 Mar 2015] v1.10 released&lt;br /&gt;
* [02 Mar 2015] Decks available from [https://www.owasp.org/index.php/OWASP_Merchandise#Cornucopia_Cards OWASP merchandise store]&lt;br /&gt;
* [18 Feb 2015] Project awarded Labs status&lt;br /&gt;
&lt;br /&gt;
==PCIDSS==&lt;br /&gt;
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia Ecommerce Website Edition is referenced in the current [https://www.pcisecuritystandards.org Payment Card Industry Security Standards Council]  information supplement [https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf PCI DSS E-commerce Guidelines] v2, January 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Get the Cards =&lt;br /&gt;
&lt;br /&gt;
==Printed==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-square-logo-350.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Professionally printed decks are available by two methods:&lt;br /&gt;
* Single decks or in bulk from OWASP (v1.20)&lt;br /&gt;
** As promotion items '''by OWASP Leaders''' from their own chapter budgets [https://docs.google.com/a/owasp.org/forms/d/e/1FAIpQLSez9mV97HuqvYhCldE2hYhX3UjQM1oO5bLy44HkOZSpni0OzQ/viewform?formkey=dF85bGtvdWdrd2JjYldNZ1gxSkJxaEE6MQ Chapter and Project Merchandise Request form]&lt;br /&gt;
** For other individuals, organisations and companies, please email [mailto:dawn.aitken@owasp.org dawn.aitken@owasp.org] with purchase enquiries&lt;br /&gt;
* Request a free deck of cards gifted by [http://blackfootuk.com/ Blackfoot UK Limited] or download their donated print-ready artwork:&lt;br /&gt;
** Request a free [http://blackfootuk.com/cornucopia/receive-a-set-of-cards/ pack of cards (v1.10)] (gifted by Blackfoot UK)&lt;br /&gt;
&lt;br /&gt;
==Source files==&lt;br /&gt;
&lt;br /&gt;
Cornucopia - Ecommerce Website Edition:&lt;br /&gt;
* v1.2 (current version)&lt;br /&gt;
** [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN DOC] | [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR DOC] | [https://github.com/wagnerfusca/OWASP-Cornucopia-Translate-Cards---PT PT-BR DOC]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN PDF]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.1 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki]]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjb283ZE5GNmFMM2FGWGl2WC14aDJDQ0ZsNk00 Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.04 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/cornucopia-ecom-1v04-blackfoot.zip Print-Ready design files]  (gifted by Blackfoot UK) 47Mb Zip&lt;br /&gt;
&lt;br /&gt;
The current version of Cornucopia Ecommerce Website Edition cards (v1.20 with updated mapping to ASVS v3.0.1 and CAPEC v2.8, and has some minor text changes on the cards) can be printed using the following methods:&lt;br /&gt;
# Download the free Adobe Illustrator files ([https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ EN]) and get them professionally printed&lt;br /&gt;
# Download and self-print the free document word-processing ([https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN], [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR]) or PDF ([https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN])&lt;br /&gt;
## Print the document onto business card blank cards; or&lt;br /&gt;
## Print the document onto normal card and cut the cards out individually using the guide; or&lt;br /&gt;
# Generate your own cards from the free [https://www.owasp.org/index.php/File:Cornucopia-deck-ecommercewebsite-XML.zip source XML data file]&lt;br /&gt;
&lt;br /&gt;
There are also other ways to obtain particular versions:&lt;br /&gt;
* Download the free [https://www.owasp.org/index.php/File:Owasp_cornucopia_printreadyimages.zip PDF (v1.03)] (gifted by Travelex) &lt;br /&gt;
** Have the cards commercially printed; or&lt;br /&gt;
** Import into your own files (such as [http://lists.owasp.org/pipermail/owasp_cornucopia/2014-January/000018.html this way] suggested by Cam Morris via the mailing list)&lt;br /&gt;
&lt;br /&gt;
OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
Collect/share/use the pseudo-random cards tweeted twice daily [https://twitter.com/OWASPCornucopia @OWASPCornucopia]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How to Play =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-cornucopia-K.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-session-9.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
It is possible to play Cornucopia in many different ways. Here is one way, and explained in a [https://youtu.be/i5Y0akWj31k YouTube video].&lt;br /&gt;
&lt;br /&gt;
== Primary method ==&lt;br /&gt;
&lt;br /&gt;
;A - Preparations&lt;br /&gt;
:A1.	Obtain a deck, or print your own Cornucopia deck and separate/cut out the cards&lt;br /&gt;
:A2.	Identify an application or application process to review; this might be a concept, design or an actual implementation&lt;br /&gt;
:A3.	Create a data flow diagram&lt;br /&gt;
:A4.	Identify and invite a group of 3-6 architects, developers, testers and other business stakeholders together and sit around a table (try to include someone fairly familiar with application security)&lt;br /&gt;
:A5.	Have some prizes to hand (gold stars, chocolate, pizza, beer or flowers depending upon your office culture)&lt;br /&gt;
;B - Play&lt;br /&gt;
:One suit - Cornucopia - acts as trumps. Aces are high (i.e. they beat Kings). It helps if there is someone dedicated to documenting the results who is not playing.&lt;br /&gt;
:B1.	Remove the Jokers and a few low-score (2, 3, 4) cards from Cornucopia suit to ensure each player will have the same number of cards&lt;br /&gt;
:B2.	Shuffle the pack and deal all the cards&lt;br /&gt;
:B3.	To begin, choose a player randomly who will play the first card - they can play any card from their hand except from the trump suit - Cornucopia&lt;br /&gt;
:B4.	To play a card, each player must read it out aloud, and explain how (or not) the threat could apply (the player gets a point for attacks that work, and the group thinks it is an actionable bug) - don’t try to think of mitigations at this stage, and don’t exclude a threat just because it is believed it is already mitigated - someone record the card on the score sheet&lt;br /&gt;
:B5.	Play clockwise, each person must play a card in the same way; if you have any card of the matching lead suit you must play one of those, otherwise they can play a card from any other suit. Only a higher card of the same suit, or the highest card in the trump suit Cornucopia, wins the hand.&lt;br /&gt;
:B6.	The person who wins the round, leads the next round (i.e. they play first), and thus defines the next lead suit&lt;br /&gt;
:B7.	Repeat until all the cards are played&lt;br /&gt;
;C - Scoring&lt;br /&gt;
:The objective is to identify applicable threats, and win hands (rounds):&lt;br /&gt;
:C1.	Score +1 for each card you can identify as a valid threat to the application under consideration&lt;br /&gt;
:C2.	Score +1 if you win a round&lt;br /&gt;
:C3.	Once all cards have been played, whoever has the most points wins&lt;br /&gt;
;D - Closure&lt;br /&gt;
:D1.	Review all the applicable threats and the matching security requirements&lt;br /&gt;
:D2.	Create user stories, specifications and test cases as required for your development methodology&lt;br /&gt;
&lt;br /&gt;
==Alternative game rules==&lt;br /&gt;
&lt;br /&gt;
* If you are new to the game, remove the two Joker cards to begin with. Add the Joker cards back in once people become more familiar with the process. Apart from the “trumps card game” rules described above which are very similar to the EoP, the deck can also be played as the “twenty-one card game” (also known as “pontoon” or “blackjack”) which normally reduces the number of cards played in each round.&lt;br /&gt;
* Practice on an imaginary application, or even a future planned application, rather than trying to find fault with existing applications until the participants are happy with the usefulness of the game.&lt;br /&gt;
* Consider just playing with one suit to make a shorter session – but try to cover all the suits for every project. Or even better just play one hand with some pre-selected cards, and score only on the ability to identify security requirements. Perhaps have one game of each suit each day for a week or so, if the participants cannot spare long enough for a full deck.&lt;br /&gt;
* Some teams have preferred to play a full hand of cards, and then discuss what is on the cards after each round (instead of after each person plays a card).&lt;br /&gt;
* Another suggestion is that if a player fails to identify the card is relevant, allow other players to suggest ideas, and potentially let them gain the point for the card. Consider allowing extra points for especially good contributions.&lt;br /&gt;
* You can even play by yourself. Just use the cards to act as thought-provokers. Involving more people will be beneficial though.&lt;br /&gt;
* In Microsoft's EoP guidance, they recommend cheating as a good game strategy&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authorization-8.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-cryptography-j.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
; Can I copy or edit the game?&lt;br /&gt;
:Yes of course. All OWASP materials are free to do with as you like provided you comply with the Creative Commons Attribution-ShareAlike 3.0 license. Perhaps if you create a new version, you might donate it to the OWASP Cornucopia Project?&lt;br /&gt;
&lt;br /&gt;
; How can I get involved?&lt;br /&gt;
: Please send ideas or offers of help to the project’s mailing list.&lt;br /&gt;
&lt;br /&gt;
; How were the attackers’ names chosen?&lt;br /&gt;
: EoP begins every description with words like &amp;quot;An attacker can...&amp;quot;. These have to be phrased as an attack but I was not keen on the anonymous terminology, wanting something more engaging, and therefore used personal names. These can be thought of as external or internal people or aliases for computer systems. But instead of just random names, I thought how they might reflect the OWASP community aspect. Therefore, apart from &amp;quot;Alice and Bob&amp;quot;, I use the given (first) names of current and recent OWASP employees and Board members (assigned in no order), and then randomly selected the remaining 50 or so names from the current list of paying individual OWASP members. No name was used more than once, and where people had provided two personal names, I dropped one part to try to ensure no-one can be easily identified. Names were not deliberately allocated to any particular attack, defence or requirement. The cultural and gender mix simply reflects theses sources of names, and is not meant to be world-representative.&lt;br /&gt;
&lt;br /&gt;
; Why aren’t there any images on the card faces?&lt;br /&gt;
: There is quite a lot of text on the cards, and the cross-referencing takes up space too. But it would be great to have additional design elements included. Any volunteers?&lt;br /&gt;
&lt;br /&gt;
; Are the attacks ranked by the number on the card?&lt;br /&gt;
: Only approximately. The risk will be application and organisation dependent, due to varying security and compliance requirements, so your own severity rating may place the cards in some other order than the numbers on the cards.&lt;br /&gt;
&lt;br /&gt;
; How long does it take to play a round of cards using the full deck?&lt;br /&gt;
: This depends upon the amount of discussion and how familiar the players are with application security concepts. But perhaps allow 1.5 to 2.0 hours for 4-6 people.&lt;br /&gt;
&lt;br /&gt;
; What sort of people should play the game?&lt;br /&gt;
:Always try to have a mix of roles who can contribute alternative perspectives. But include someone who has a reasonable knowledge of application vulnerability terminology. Otherwise try to include a mix of architects, developers, testers and a relevant project manager or business owner.&lt;br /&gt;
&lt;br /&gt;
; Who should take notes and record scores?&lt;br /&gt;
: It is better if that someone else, not playing the game, takes notes about the requirements identified and issues discussed. This could be used as training for a more junior developer, or performed by the project manager. Some organisations have made a recording to review afterwards when the requirements are written up more formally.&lt;br /&gt;
&lt;br /&gt;
; Should we always use the full deck of cards?&lt;br /&gt;
: No. A smaller deck is quicker to play. Start your first game with only enough cards for two or three rounds. Always consider removing cards that are not appropriate at all of the target application or function being reviewed. For the first few times people play the game it is also usually better to remove the Aces and the two Jokers. It is also usual to play the game without any trumps suit until people are more familiar with the idea.&lt;br /&gt;
&lt;br /&gt;
; What should players do when they have an Ace card that says “invented a new X attack”?&lt;br /&gt;
: The player can make up any attack they think is valid, but must match the suit of the card e.g. data validation and encoding). With players new to the game, it can be better to remove these to begin with.&lt;br /&gt;
&lt;br /&gt;
; I don’t understand what the attack means on each card - is there more detailed information?&lt;br /&gt;
: Yes, the Wiki Deck at was created to help players understand the attacks. See [https://www.owasp.org/index.php/Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck Wiki Deck].&lt;br /&gt;
&lt;br /&gt;
; My company wants to print its own version of OWASP Cornucopia - what license do we need to refer to?&lt;br /&gt;
: What is required/reasonable might depend upon how you propose to use the source Cornucopia material. See fuller answer immediately below.&lt;br /&gt;
&lt;br /&gt;
Some examples of re-using or reproducing Cornucopia are:&lt;br /&gt;
&lt;br /&gt;
# Print some decks and give them away to customers&lt;br /&gt;
# Reproduce the game exactly but with a corporate-branded package&lt;br /&gt;
# Use the idea and/or source files to produce a similar game but with different attacks/mappings&lt;br /&gt;
# Distribute modified design files&lt;br /&gt;
&lt;br /&gt;
If option 1 above, you can order these in bulk from OWASP and attach your own details below the &amp;quot;compliments of&amp;quot; section on the boxes. There are three aspects to consider for options 2, 3 or 4, or combinations of those - see below. The existing printed decks (and their boxes and leaflets include such text).&lt;br /&gt;
&lt;br /&gt;
''A - Cornucopia License''&lt;br /&gt;
&lt;br /&gt;
The precise wording will depend how the material is being used or reproduced. Under Creative Commons Attribution-ShareAlike 3.0 license it is necessary to attribute all previous contributions (in this case, Microsoft, Boeing, Mitre, etc). The easiest place to put the wording is on the leaflet (folded inside, or separate booklet). The current required long-form wording is:&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license http://creativecommons.org/licenses/by-sa/3.0/&lt;br /&gt;
&lt;br /&gt;
  The files used to create these materials were created from the OWASP project and are also open source, and are licensed under the same conditions. &lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia can be downloaded for free from the OWASP website and printed yourself. The OWASP Cornucopia project source in vendor neutral and unbranded.&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  © 2012-2018 OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
  This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license.&lt;br /&gt;
&lt;br /&gt;
  Acknowledgments:&lt;br /&gt;
&lt;br /&gt;
  Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
&lt;br /&gt;
  Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
&lt;br /&gt;
  Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
&lt;br /&gt;
  Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
&lt;br /&gt;
  Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
&lt;br /&gt;
  Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
&lt;br /&gt;
  Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
The box/container for the cards must have the wording:&lt;br /&gt;
&lt;br /&gt;
  Created by Colin Watson.&lt;br /&gt;
&lt;br /&gt;
  Contains: One pack of Cornucopia Ecommerce Website playing cards. OWASP Cornucopia is open source and can be downloaded free of charge from the OWASP website.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
The following short-form wording must also appear on any materials referencing the outputs (e.g. press releases, leaflets, reports, blog posts):&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license and is © 2012-2016 OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
If any files are distributed electronically, the long-form wording should also be aded in a license.txt file within the distribution.&lt;br /&gt;
&lt;br /&gt;
If the intention is to use the idea only (option 3 above), the long-form, box and short-form wording might be different, and probably simpler. And it might make more sense to start with the Microsoft-provided Elevation of Privilege files (and open source license).&lt;br /&gt;
&lt;br /&gt;
''B - Upcoming update to Cornucopia''&lt;br /&gt;
&lt;br /&gt;
Note that the current print design files are v1.04, and the current Word document is v1.10, but we are in the process of updating all of these to v1.20.&lt;br /&gt;
&lt;br /&gt;
Whatever is used as a starting point, please state the source version, for example: &lt;br /&gt;
&lt;br /&gt;
  Based on OWASP Cornucopia Ecommerce Website Edition v1.04&lt;br /&gt;
&lt;br /&gt;
''C - OWASP brand usage''&lt;br /&gt;
&lt;br /&gt;
Additionally individuals, companies and other organisations must not breach OWASP's brand usage guidelines. &lt;br /&gt;
&lt;br /&gt;
  https://www.owasp.org/index.php/Marketing/Resources#tab=BRAND_GUIDELINES&lt;br /&gt;
&lt;br /&gt;
In the case of Cornucopia, in 2014 Blackfoot Limited produced some printed decks of cards. Blackfoot's name and logo did not appear anywhere on the OWASP-branded cards, and the OWASP logo did not appear on the Blackfoot-branded box and leaflet. In fact there is no OWASP logo on any part of the Blackfoot branded decks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-data-A.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Cornucopia is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Thomas Berson&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Oana Cornea&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Todd Dahl&lt;br /&gt;
* Luis Enriquez&lt;br /&gt;
* Ken Ferris&lt;br /&gt;
* Darío De Filippis&lt;br /&gt;
* Sebastien Gioria&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Timo Goosen&lt;br /&gt;
* Anthony Harrison&lt;br /&gt;
* John Herrlin&lt;br /&gt;
* Jerry Hoff&lt;br /&gt;
* Marios Kourtesis&lt;br /&gt;
* Franck Lacosta&lt;br /&gt;
* Mathias Lemaire&lt;br /&gt;
* Antonis Manaras&lt;br /&gt;
* Jim Manico&lt;br /&gt;
* Mark Miller&lt;br /&gt;
* Cam Morris&lt;br /&gt;
* Susana Romaniz&lt;br /&gt;
* Ravishankar Sahadevan&lt;br /&gt;
* Tao Sauvage&lt;br /&gt;
* Wagner Voltz&lt;br /&gt;
* Stephen de Vries&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
Also:&lt;br /&gt;
&lt;br /&gt;
* Attendees at OWASP London, OWASP Manchester and OWASP Netherlands chapter meetings, the London Gamification meetup, and the training at AppSec USA 2015 in san Francisco who made helpful suggestions and asked challenging questions&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
* Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
* Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
* Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
* Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
* Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
* Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authentication-7.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-joker-a.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Version history (see [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx uploads]):&lt;br /&gt;
* Alpha version (0.40) was issued in August 2012&lt;br /&gt;
* Beta version (1.00) was released in February 2013&lt;br /&gt;
* Stable release (1.02) was released in August 2013, following feedback from mailing list and use with groups of developers&lt;br /&gt;
* Release v1.03 included minor changes&lt;br /&gt;
* Release v1.04 included a text correction on one card&lt;br /&gt;
* Release v1.05 included additional narrative and FAQs&lt;br /&gt;
* Current release v1.10 included cross-references updated for 2014 version of ASVS, contributors updated and minor text changes to cards to improve readability&lt;br /&gt;
* Current release v1.20 included cross-references updated for version 3.0.1 of ASVS and CAPEC v2.8, and many minor text changes including further contributors.&lt;br /&gt;
&lt;br /&gt;
As of May 2016, the priorities are:&lt;br /&gt;
* &amp;lt;strike&amp;gt;Develop Cornucopia Wiki Deck&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Update the document/deck to shorten some card text [completed ready for v1.10]&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVS 2014&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVSv3 2016&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check/update CAPEC mappings&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Translate into French&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Translate into Japanese, Spanish (almost complete May 2016) and other languages (help needed please) - German in progress (from June 2014)&lt;br /&gt;
* &amp;lt;strike&amp;gt;Make card decks available via OWASP Merchandise Store&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create a video &amp;quot;how to play&amp;quot;&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Update printed decks in OWASP Merchandise Store to v1.20 in both EN and ES languages&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Cornucopia is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Cornucopia into that language?&lt;br /&gt;
==Use and Promote the Cornucopia Card Decks==&lt;br /&gt;
Please help raise awareness of Cornucopia by printing cards:&lt;br /&gt;
* Use Cornucopia with specifiers, architects, designers, developers, testers and others, in part to train them, but also to solicit feedback on their usability, practicality and appropriateness for their work&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a mobile app to play the game&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What cards don't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other decks would you like to see?&lt;br /&gt;
==Keep the Cards Updated==&lt;br /&gt;
As the source referenced documents change, we have to update the decks. You may also find errors and omissions. In the first instance, please send a message to the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] if you have identified errors &amp;amp;amp; omissions, have some time to maintain the source documents, or can help in other ways.&lt;br /&gt;
==Create a New Deck==&lt;br /&gt;
The only version currently available is the Cornucopia Ecommerce Website Edition in English. We would like to create a new mobile app specific deck, probably using the wonderful [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] as inspiration for the card source materials. Do you have an idea for your own application security requirements card deck? Perhaps for {{#switchtablink:Mobile App Edition|mobile apps}} or something else?&lt;br /&gt;
&lt;br /&gt;
= About Ecommerce Website Edition =&lt;br /&gt;
{{:Projects/OWASP Cornucopia Ecommerce Website Edition | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]] &lt;br /&gt;
[[Category: Threat_Modeling]] &lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:SAMM-SR-1]] &lt;br /&gt;
[[Category:SAMM-SR-2]] &lt;br /&gt;
[[Category:SAMM-TA-1]] &lt;br /&gt;
[[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=241799</id>
		<title>OWASP Cornucopia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=241799"/>
				<updated>2018-07-13T09:59:45Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Volunteers */ Added Wagner Voltz&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cornucopia-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#Lab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Cornucopia==&lt;br /&gt;
OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology agnostic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
The idea behind Cornucopia is to help development teams, especially those using Agile methodologies, to identify application security requirements and develop security-based user stories. Although the idea had been waiting for enough time to progress it, the final motivation came when [http://www.safecode.org/ SAFECode] published its [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf Practical Security Stories and Security Tasks for Agile Development Environments] in July 2012.&lt;br /&gt;
&lt;br /&gt;
The Microsoft SDL team had already published its super [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] (EoP) but that did not seem to address the most appropriate kind of issues that web application development teams mostly have to address. EoP is a great concept and game strategy, and was [http://blogs.msdn.com/b/sdl/archive/2010/03/02/announcing-elevation-of-privilege-the-threat-modeling-game.aspx published under] a [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License].&lt;br /&gt;
Cornucopia {{#switchtablink:Ecommerce Website Edition|Ecommerce Website Edition}} is based the concepts and game ideas in EoP, but those have been modified to be more relevant to the types of issues ecommerce website developers encounter. It attempts to introduce threat-modelling ideas into development teams that use Agile methodologies, or are more focused on web application weaknesses than other types of software vulnerabilities or are not familiar with STRIDE and DREAD.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The Card Decks==&lt;br /&gt;
&lt;br /&gt;
''Ecommerce Website Edition''&lt;br /&gt;
&lt;br /&gt;
Instead of EoP’s STRIDE suits, Cornucopia suits were selected based on the structure of the [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide] (SCP), but with additional consideration of sections in the [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard], the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide] and David Rook’s [http://www.securityninja.co.uk/secure-development/the-principles-place/ Principles of Secure Development]. These provided five suits, and a sixth called “Cornucopia” was created for everything else: &lt;br /&gt;
&lt;br /&gt;
* Data validation and encoding&lt;br /&gt;
* Authentication&lt;br /&gt;
* Session management&lt;br /&gt;
* Authorization&lt;br /&gt;
* Cryptography&lt;br /&gt;
* Cornucopia&lt;br /&gt;
&lt;br /&gt;
Each suit contains 13 cards (Ace, 2-10, Jack, Queen and King) but, unlike EoP, there are also two Joker cards. The content was mainly drawn from the SCP. Full [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]].&lt;br /&gt;
&lt;br /&gt;
''Other Decks''&lt;br /&gt;
&lt;br /&gt;
Future editions such as for mobile app development will use different sources of information and suits.&lt;br /&gt;
&lt;br /&gt;
==Mappings==&lt;br /&gt;
The other driver for Cornucopia is to link the attacks with requirements and verification techniques. An initial aim had been to reference [http://cwe.mitre.org/ CWE] weakness IDs, but these proved too numerous, and instead it was decided to map each card to [http://capec.mitre.org/ CAPEC] software attack pattern IDs which themselves are mapped to CWEs, so the desired result is achieved.&lt;br /&gt;
&lt;br /&gt;
Each card is also mapped to the 36 primary security stories in the [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode document], as well as to the OWASP [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide SCP v2], [https://www.owasp.org/images/3/33/OWASP_Application_Security_Verification_Standard_3.0.1.pdf ASVS v3.0.1] and [https://www.owasp.org/index.php/OWASP_AppSensor_Project AppSensor] (application attack detection and response) to help teams create their own security-related stories for use in Agile processes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Cornucopia is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] mentioned above, [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), [https://www.owasp.org/index.php/OWASP_Snakes_and_Ladders OWASP Snakes and Ladders], and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Cornucopia? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia is a card game used to help derive application security requirements during the software development life cycle. To start using Cornucopia:&lt;br /&gt;
&lt;br /&gt;
* Download the document&lt;br /&gt;
* Print the cards onto plain paper or pre-scored card&lt;br /&gt;
* Cut/separate the individual cards&lt;br /&gt;
* Identify an application, module or component to assess&lt;br /&gt;
* Invite business owners, architects, developers, testers along for a card game&lt;br /&gt;
* Get those infosec folk to provide chocolate, pizza, beer, flowers or all four as prizes&lt;br /&gt;
* Select a portion of the deck to start with&lt;br /&gt;
* {{#switchtablink:How to Play|Play the game}} to discuss &amp;amp;amp; document security requirements (and to win rounds)&lt;br /&gt;
* Remember, points make prizes!&lt;br /&gt;
&lt;br /&gt;
Listen to the [http://trustedsoftwarealliance.com/2014/03/21/the-owasp-cornucopia-project-with-colin-watson/ OWASP 24/7 Podcast] about Cornucopia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-presentation-small.jpg|link=media:Owaspnl-colinwatson-cornucopia.odp]]&lt;br /&gt;
&lt;br /&gt;
The game rules are in the document download. But the OpenOffice [[media:Owasplondon-colinwatson-cornucopia.odp|project presentation]] includes an animated version of four demonstration rounds. The presentation is recorded [http://youtu.be/Q_LE-8xNXVk on video].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dariodf Darío De Filippis] [mailto:dariodefilippis@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://youtu.be/i5Y0akWj31k How to Play] video&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Cornucopia-scoresheet.pdf Scoresheet]&lt;br /&gt;
* {{#switchtablink:Get the Cards|All sources and downloads...}}&lt;br /&gt;
&lt;br /&gt;
== Reference Files ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:OWASP_SCP_Quick_Reference_Guide_v2.pdf OWASP SCP requirements]&lt;br /&gt;
* [https://www.owasp.org/images/5/58/OWASP_ASVS_Version_2.pdf OWASP ASVS verification IDs]&lt;br /&gt;
* [https://www.owasp.org/index.php/AppSensor_DetectionPoints OWASP AppSensor attack detection point IDs] &lt;br /&gt;
* [http://capec.mitre.org/data/archive/capec_v1.7.1.zip CAPEC IDs]&lt;br /&gt;
* [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode security-focused story IDs]&lt;br /&gt;
&lt;br /&gt;
The OWASP SCP does not include identity values for the requirements, so please use [https://www.owasp.org/index.php/File:Owasp-requirements-numbering.zip this list].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [26 Jun 2018] v1.20 FR released&lt;br /&gt;
* [14 May 2018] Printed deck purchase details updated&lt;br /&gt;
* [23 Aug 2016] Presentation at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [29 Jun 2016] v1.20 released&lt;br /&gt;
* [21 Jan 2016] [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]] published&lt;br /&gt;
* [30 Dec 2015] Darío De Filippis becomes project co-leader&lt;br /&gt;
* [24 Sep 2015] [http://appsecusa2015.sched.org/event/7f3dba889c0ec9e37900e289c9660503#.VZ6aoXhflNY Lightning training] at AppSec USA 2015&lt;br /&gt;
* [01 Jun 2015] [https://youtu.be/i5Y0akWj31k How to Play video] published&lt;br /&gt;
* [20 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - How to play video&lt;br /&gt;
* [31 Mar 2015] v1.10 released&lt;br /&gt;
* [02 Mar 2015] Decks available from [https://www.owasp.org/index.php/OWASP_Merchandise#Cornucopia_Cards OWASP merchandise store]&lt;br /&gt;
* [18 Feb 2015] Project awarded Labs status&lt;br /&gt;
&lt;br /&gt;
==PCIDSS==&lt;br /&gt;
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia Ecommerce Website Edition is referenced in the current [https://www.pcisecuritystandards.org Payment Card Industry Security Standards Council]  information supplement [https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf PCI DSS E-commerce Guidelines] v2, January 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Get the Cards =&lt;br /&gt;
&lt;br /&gt;
==Printed==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-square-logo-350.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Professionally printed decks are available by two methods:&lt;br /&gt;
* Single decks or in bulk from OWASP (v1.20)&lt;br /&gt;
** As promotion items '''by OWASP Leaders''' from their own chapter budgets [https://docs.google.com/a/owasp.org/forms/d/e/1FAIpQLSez9mV97HuqvYhCldE2hYhX3UjQM1oO5bLy44HkOZSpni0OzQ/viewform?formkey=dF85bGtvdWdrd2JjYldNZ1gxSkJxaEE6MQ Chapter and Project Merchandise Request form]&lt;br /&gt;
** For other individuals, organisations and companies, please email [mailto:dawn.aitken@owasp.org dawn.aitken@owasp.org] with purchase enquiries&lt;br /&gt;
* Request a free deck of cards gifted by [http://blackfootuk.com/ Blackfoot UK Limited] or download their donated print-ready artwork:&lt;br /&gt;
** Request a free [http://blackfootuk.com/cornucopia/receive-a-set-of-cards/ pack of cards (v1.10)] (gifted by Blackfoot UK)&lt;br /&gt;
&lt;br /&gt;
==Source files==&lt;br /&gt;
&lt;br /&gt;
Cornucopia - Ecommerce Website Edition:&lt;br /&gt;
* v1.20 (current version)&lt;br /&gt;
** [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN DOC] | [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR DOC]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN PDF]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.10 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki]]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjb283ZE5GNmFMM2FGWGl2WC14aDJDQ0ZsNk00 Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.04 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/cornucopia-ecom-1v04-blackfoot.zip Print-Ready design files]  (gifted by Blackfoot UK) 47Mb Zip&lt;br /&gt;
&lt;br /&gt;
The current version of Cornucopia Ecommerce Website Edition cards (v1.20 with updated mapping to ASVS v3.0.1 and CAPEC v2.8, and has some minor text changes on the cards) can be printed using the following methods:&lt;br /&gt;
# Download the free Adobe Illustrator files ([https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ EN]) and get them professionally printed&lt;br /&gt;
# Download and self-print the free document word-processing ([https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN], [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR]) or PDF ([https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN])&lt;br /&gt;
## Print the document onto business card blank cards; or&lt;br /&gt;
## Print the document onto normal card and cut the cards out individually using the guide; or&lt;br /&gt;
# Generate your own cards from the free [https://www.owasp.org/index.php/File:Cornucopia-deck-ecommercewebsite-XML.zip source XML data file]&lt;br /&gt;
&lt;br /&gt;
There are also other ways to obtain particular versions:&lt;br /&gt;
* Download the free [https://www.owasp.org/index.php/File:Owasp_cornucopia_printreadyimages.zip PDF (v1.03)] (gifted by Travelex) &lt;br /&gt;
** Have the cards commercially printed; or&lt;br /&gt;
** Import into your own files (such as [http://lists.owasp.org/pipermail/owasp_cornucopia/2014-January/000018.html this way] suggested by Cam Morris via the mailing list)&lt;br /&gt;
&lt;br /&gt;
OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
Collect/share/use the pseudo-random cards tweeted twice daily [https://twitter.com/OWASPCornucopia @OWASPCornucopia]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How to Play =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-cornucopia-K.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-session-9.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
It is possible to play Cornucopia in many different ways. Here is one way, and explained in a [https://youtu.be/i5Y0akWj31k YouTube video].&lt;br /&gt;
&lt;br /&gt;
== Primary method ==&lt;br /&gt;
&lt;br /&gt;
;A - Preparations&lt;br /&gt;
:A1.	Obtain a deck, or print your own Cornucopia deck and separate/cut out the cards&lt;br /&gt;
:A2.	Identify an application or application process to review; this might be a concept, design or an actual implementation&lt;br /&gt;
:A3.	Create a data flow diagram&lt;br /&gt;
:A4.	Identify and invite a group of 3-6 architects, developers, testers and other business stakeholders together and sit around a table (try to include someone fairly familiar with application security)&lt;br /&gt;
:A5.	Have some prizes to hand (gold stars, chocolate, pizza, beer or flowers depending upon your office culture)&lt;br /&gt;
;B - Play&lt;br /&gt;
:One suit - Cornucopia - acts as trumps. Aces are high (i.e. they beat Kings). It helps if there is someone dedicated to documenting the results who is not playing.&lt;br /&gt;
:B1.	Remove the Jokers and a few low-score (2, 3, 4) cards from Cornucopia suit to ensure each player will have the same number of cards&lt;br /&gt;
:B2.	Shuffle the pack and deal all the cards&lt;br /&gt;
:B3.	To begin, choose a player randomly who will play the first card - they can play any card from their hand except from the trump suit - Cornucopia&lt;br /&gt;
:B4.	To play a card, each player must read it out aloud, and explain how (or not) the threat could apply (the player gets a point for attacks that work, and the group thinks it is an actionable bug) - don’t try to think of mitigations at this stage, and don’t exclude a threat just because it is believed it is already mitigated - someone record the card on the score sheet&lt;br /&gt;
:B5.	Play clockwise, each person must play a card in the same way; if you have any card of the matching lead suit you must play one of those, otherwise they can play a card from any other suit. Only a higher card of the same suit, or the highest card in the trump suit Cornucopia, wins the hand.&lt;br /&gt;
:B6.	The person who wins the round, leads the next round (i.e. they play first), and thus defines the next lead suit&lt;br /&gt;
:B7.	Repeat until all the cards are played&lt;br /&gt;
;C - Scoring&lt;br /&gt;
:The objective is to identify applicable threats, and win hands (rounds):&lt;br /&gt;
:C1.	Score +1 for each card you can identify as a valid threat to the application under consideration&lt;br /&gt;
:C2.	Score +1 if you win a round&lt;br /&gt;
:C3.	Once all cards have been played, whoever has the most points wins&lt;br /&gt;
;D - Closure&lt;br /&gt;
:D1.	Review all the applicable threats and the matching security requirements&lt;br /&gt;
:D2.	Create user stories, specifications and test cases as required for your development methodology&lt;br /&gt;
&lt;br /&gt;
==Alternative game rules==&lt;br /&gt;
&lt;br /&gt;
* If you are new to the game, remove the two Joker cards to begin with. Add the Joker cards back in once people become more familiar with the process. Apart from the “trumps card game” rules described above which are very similar to the EoP, the deck can also be played as the “twenty-one card game” (also known as “pontoon” or “blackjack”) which normally reduces the number of cards played in each round.&lt;br /&gt;
* Practice on an imaginary application, or even a future planned application, rather than trying to find fault with existing applications until the participants are happy with the usefulness of the game.&lt;br /&gt;
* Consider just playing with one suit to make a shorter session – but try to cover all the suits for every project. Or even better just play one hand with some pre-selected cards, and score only on the ability to identify security requirements. Perhaps have one game of each suit each day for a week or so, if the participants cannot spare long enough for a full deck.&lt;br /&gt;
* Some teams have preferred to play a full hand of cards, and then discuss what is on the cards after each round (instead of after each person plays a card).&lt;br /&gt;
* Another suggestion is that if a player fails to identify the card is relevant, allow other players to suggest ideas, and potentially let them gain the point for the card. Consider allowing extra points for especially good contributions.&lt;br /&gt;
* You can even play by yourself. Just use the cards to act as thought-provokers. Involving more people will be beneficial though.&lt;br /&gt;
* In Microsoft's EoP guidance, they recommend cheating as a good game strategy&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authorization-8.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-cryptography-j.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
; Can I copy or edit the game?&lt;br /&gt;
:Yes of course. All OWASP materials are free to do with as you like provided you comply with the Creative Commons Attribution-ShareAlike 3.0 license. Perhaps if you create a new version, you might donate it to the OWASP Cornucopia Project?&lt;br /&gt;
&lt;br /&gt;
; How can I get involved?&lt;br /&gt;
: Please send ideas or offers of help to the project’s mailing list.&lt;br /&gt;
&lt;br /&gt;
; How were the attackers’ names chosen?&lt;br /&gt;
: EoP begins every description with words like &amp;quot;An attacker can...&amp;quot;. These have to be phrased as an attack but I was not keen on the anonymous terminology, wanting something more engaging, and therefore used personal names. These can be thought of as external or internal people or aliases for computer systems. But instead of just random names, I thought how they might reflect the OWASP community aspect. Therefore, apart from &amp;quot;Alice and Bob&amp;quot;, I use the given (first) names of current and recent OWASP employees and Board members (assigned in no order), and then randomly selected the remaining 50 or so names from the current list of paying individual OWASP members. No name was used more than once, and where people had provided two personal names, I dropped one part to try to ensure no-one can be easily identified. Names were not deliberately allocated to any particular attack, defence or requirement. The cultural and gender mix simply reflects theses sources of names, and is not meant to be world-representative.&lt;br /&gt;
&lt;br /&gt;
; Why aren’t there any images on the card faces?&lt;br /&gt;
: There is quite a lot of text on the cards, and the cross-referencing takes up space too. But it would be great to have additional design elements included. Any volunteers?&lt;br /&gt;
&lt;br /&gt;
; Are the attacks ranked by the number on the card?&lt;br /&gt;
: Only approximately. The risk will be application and organisation dependent, due to varying security and compliance requirements, so your own severity rating may place the cards in some other order than the numbers on the cards.&lt;br /&gt;
&lt;br /&gt;
; How long does it take to play a round of cards using the full deck?&lt;br /&gt;
: This depends upon the amount of discussion and how familiar the players are with application security concepts. But perhaps allow 1.5 to 2.0 hours for 4-6 people.&lt;br /&gt;
&lt;br /&gt;
; What sort of people should play the game?&lt;br /&gt;
:Always try to have a mix of roles who can contribute alternative perspectives. But include someone who has a reasonable knowledge of application vulnerability terminology. Otherwise try to include a mix of architects, developers, testers and a relevant project manager or business owner.&lt;br /&gt;
&lt;br /&gt;
; Who should take notes and record scores?&lt;br /&gt;
: It is better if that someone else, not playing the game, takes notes about the requirements identified and issues discussed. This could be used as training for a more junior developer, or performed by the project manager. Some organisations have made a recording to review afterwards when the requirements are written up more formally.&lt;br /&gt;
&lt;br /&gt;
; Should we always use the full deck of cards?&lt;br /&gt;
: No. A smaller deck is quicker to play. Start your first game with only enough cards for two or three rounds. Always consider removing cards that are not appropriate at all of the target application or function being reviewed. For the first few times people play the game it is also usually better to remove the Aces and the two Jokers. It is also usual to play the game without any trumps suit until people are more familiar with the idea.&lt;br /&gt;
&lt;br /&gt;
; What should players do when they have an Ace card that says “invented a new X attack”?&lt;br /&gt;
: The player can make up any attack they think is valid, but must match the suit of the card e.g. data validation and encoding). With players new to the game, it can be better to remove these to begin with.&lt;br /&gt;
&lt;br /&gt;
; I don’t understand what the attack means on each card - is there more detailed information?&lt;br /&gt;
: Yes, the Wiki Deck at was created to help players understand the attacks. See [https://www.owasp.org/index.php/Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck Wiki Deck].&lt;br /&gt;
&lt;br /&gt;
; My company wants to print its own version of OWASP Cornucopia - what license do we need to refer to?&lt;br /&gt;
: What is required/reasonable might depend upon how you propose to use the source Cornucopia material. See fuller answer immediately below.&lt;br /&gt;
&lt;br /&gt;
Some examples of re-using or reproducing Cornucopia are:&lt;br /&gt;
&lt;br /&gt;
# Print some decks and give them away to customers&lt;br /&gt;
# Reproduce the game exactly but with a corporate-branded package&lt;br /&gt;
# Use the idea and/or source files to produce a similar game but with different attacks/mappings&lt;br /&gt;
# Distribute modified design files&lt;br /&gt;
&lt;br /&gt;
If option 1 above, you can order these in bulk from OWASP and attach your own details below the &amp;quot;compliments of&amp;quot; section on the boxes. There are three aspects to consider for options 2, 3 or 4, or combinations of those - see below. The existing printed decks (and their boxes and leaflets include such text).&lt;br /&gt;
&lt;br /&gt;
''A - Cornucopia License''&lt;br /&gt;
&lt;br /&gt;
The precise wording will depend how the material is being used or reproduced. Under Creative Commons Attribution-ShareAlike 3.0 license it is necessary to attribute all previous contributions (in this case, Microsoft, Boeing, Mitre, etc). The easiest place to put the wording is on the leaflet (folded inside, or separate booklet). The current required long-form wording is:&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license http://creativecommons.org/licenses/by-sa/3.0/&lt;br /&gt;
&lt;br /&gt;
  The files used to create these materials were created from the OWASP project and are also open source, and are licensed under the same conditions. &lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia can be downloaded for free from the OWASP website and printed yourself. The OWASP Cornucopia project source in vendor neutral and unbranded.&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  © 2012-2018 OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
  This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license.&lt;br /&gt;
&lt;br /&gt;
  Acknowledgments:&lt;br /&gt;
&lt;br /&gt;
  Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
&lt;br /&gt;
  Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
&lt;br /&gt;
  Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
&lt;br /&gt;
  Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
&lt;br /&gt;
  Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
&lt;br /&gt;
  Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
&lt;br /&gt;
  Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
The box/container for the cards must have the wording:&lt;br /&gt;
&lt;br /&gt;
  Created by Colin Watson.&lt;br /&gt;
&lt;br /&gt;
  Contains: One pack of Cornucopia Ecommerce Website playing cards. OWASP Cornucopia is open source and can be downloaded free of charge from the OWASP website.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
The following short-form wording must also appear on any materials referencing the outputs (e.g. press releases, leaflets, reports, blog posts):&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license and is © 2012-2016 OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
If any files are distributed electronically, the long-form wording should also be aded in a license.txt file within the distribution.&lt;br /&gt;
&lt;br /&gt;
If the intention is to use the idea only (option 3 above), the long-form, box and short-form wording might be different, and probably simpler. And it might make more sense to start with the Microsoft-provided Elevation of Privilege files (and open source license).&lt;br /&gt;
&lt;br /&gt;
''B - Upcoming update to Cornucopia''&lt;br /&gt;
&lt;br /&gt;
Note that the current print design files are v1.04, and the current Word document is v1.10, but we are in the process of updating all of these to v1.20.&lt;br /&gt;
&lt;br /&gt;
Whatever is used as a starting point, please state the source version, for example: &lt;br /&gt;
&lt;br /&gt;
  Based on OWASP Cornucopia Ecommerce Website Edition v1.04&lt;br /&gt;
&lt;br /&gt;
''C - OWASP brand usage''&lt;br /&gt;
&lt;br /&gt;
Additionally individuals, companies and other organisations must not breach OWASP's brand usage guidelines. &lt;br /&gt;
&lt;br /&gt;
  https://www.owasp.org/index.php/Marketing/Resources#tab=BRAND_GUIDELINES&lt;br /&gt;
&lt;br /&gt;
In the case of Cornucopia, in 2014 Blackfoot Limited produced some printed decks of cards. Blackfoot's name and logo did not appear anywhere on the OWASP-branded cards, and the OWASP logo did not appear on the Blackfoot-branded box and leaflet. In fact there is no OWASP logo on any part of the Blackfoot branded decks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-data-A.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Cornucopia is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Thomas Berson&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Oana Cornea&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Todd Dahl&lt;br /&gt;
* Luis Enriquez&lt;br /&gt;
* Ken Ferris&lt;br /&gt;
* Darío De Filippis&lt;br /&gt;
* Sebastien Gioria&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Timo Goosen&lt;br /&gt;
* Anthony Harrison&lt;br /&gt;
* John Herrlin&lt;br /&gt;
* Jerry Hoff&lt;br /&gt;
* Marios Kourtesis&lt;br /&gt;
* Franck Lacosta&lt;br /&gt;
* Mathias Lemaire&lt;br /&gt;
* Antonis Manaras&lt;br /&gt;
* Jim Manico&lt;br /&gt;
* Mark Miller&lt;br /&gt;
* Cam Morris&lt;br /&gt;
* Susana Romaniz&lt;br /&gt;
* Ravishankar Sahadevan&lt;br /&gt;
* Tao Sauvage&lt;br /&gt;
* Wagner Voltz&lt;br /&gt;
* Stephen de Vries&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
Also:&lt;br /&gt;
&lt;br /&gt;
* Attendees at OWASP London, OWASP Manchester and OWASP Netherlands chapter meetings, the London Gamification meetup, and the training at AppSec USA 2015 in san Francisco who made helpful suggestions and asked challenging questions&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
* Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
* Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
* Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
* Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
* Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
* Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authentication-7.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-joker-a.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Version history (see [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx uploads]):&lt;br /&gt;
* Alpha version (0.40) was issued in August 2012&lt;br /&gt;
* Beta version (1.00) was released in February 2013&lt;br /&gt;
* Stable release (1.02) was released in August 2013, following feedback from mailing list and use with groups of developers&lt;br /&gt;
* Release v1.03 included minor changes&lt;br /&gt;
* Release v1.04 included a text correction on one card&lt;br /&gt;
* Release v1.05 included additional narrative and FAQs&lt;br /&gt;
* Current release v1.10 included cross-references updated for 2014 version of ASVS, contributors updated and minor text changes to cards to improve readability&lt;br /&gt;
* Current release v1.20 included cross-references updated for version 3.0.1 of ASVS and CAPEC v2.8, and many minor text changes including further contributors.&lt;br /&gt;
&lt;br /&gt;
As of May 2016, the priorities are:&lt;br /&gt;
* &amp;lt;strike&amp;gt;Develop Cornucopia Wiki Deck&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Update the document/deck to shorten some card text [completed ready for v1.10]&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVS 2014&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVSv3 2016&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check/update CAPEC mappings&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Translate into French&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Translate into Japanese, Spanish (almost complete May 2016) and other languages (help needed please) - German in progress (from June 2014)&lt;br /&gt;
* &amp;lt;strike&amp;gt;Make card decks available via OWASP Merchandise Store&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create a video &amp;quot;how to play&amp;quot;&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Update printed decks in OWASP Merchandise Store to v1.20 in both EN and ES languages&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Cornucopia is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Cornucopia into that language?&lt;br /&gt;
==Use and Promote the Cornucopia Card Decks==&lt;br /&gt;
Please help raise awareness of Cornucopia by printing cards:&lt;br /&gt;
* Use Cornucopia with specifiers, architects, designers, developers, testers and others, in part to train them, but also to solicit feedback on their usability, practicality and appropriateness for their work&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a mobile app to play the game&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What cards don't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other decks would you like to see?&lt;br /&gt;
==Keep the Cards Updated==&lt;br /&gt;
As the source referenced documents change, we have to update the decks. You may also find errors and omissions. In the first instance, please send a message to the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] if you have identified errors &amp;amp;amp; omissions, have some time to maintain the source documents, or can help in other ways.&lt;br /&gt;
==Create a New Deck==&lt;br /&gt;
The only version currently available is the Cornucopia Ecommerce Website Edition in English. We would like to create a new mobile app specific deck, probably using the wonderful [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] as inspiration for the card source materials. Do you have an idea for your own application security requirements card deck? Perhaps for {{#switchtablink:Mobile App Edition|mobile apps}} or something else?&lt;br /&gt;
&lt;br /&gt;
= About Ecommerce Website Edition =&lt;br /&gt;
{{:Projects/OWASP Cornucopia Ecommerce Website Edition | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]] &lt;br /&gt;
[[Category: Threat_Modeling]] &lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:SAMM-SR-1]] &lt;br /&gt;
[[Category:SAMM-SR-2]] &lt;br /&gt;
[[Category:SAMM-TA-1]] &lt;br /&gt;
[[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=241528</id>
		<title>OWASP Cornucopia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=241528"/>
				<updated>2018-06-26T15:39:58Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: News updated / Roadmap updated&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cornucopia-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#Lab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Cornucopia==&lt;br /&gt;
OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology agnostic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
The idea behind Cornucopia is to help development teams, especially those using Agile methodologies, to identify application security requirements and develop security-based user stories. Although the idea had been waiting for enough time to progress it, the final motivation came when [http://www.safecode.org/ SAFECode] published its [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf Practical Security Stories and Security Tasks for Agile Development Environments] in July 2012.&lt;br /&gt;
&lt;br /&gt;
The Microsoft SDL team had already published its super [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] (EoP) but that did not seem to address the most appropriate kind of issues that web application development teams mostly have to address. EoP is a great concept and game strategy, and was [http://blogs.msdn.com/b/sdl/archive/2010/03/02/announcing-elevation-of-privilege-the-threat-modeling-game.aspx published under] a [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License].&lt;br /&gt;
Cornucopia {{#switchtablink:Ecommerce Website Edition|Ecommerce Website Edition}} is based the concepts and game ideas in EoP, but those have been modified to be more relevant to the types of issues ecommerce website developers encounter. It attempts to introduce threat-modelling ideas into development teams that use Agile methodologies, or are more focused on web application weaknesses than other types of software vulnerabilities or are not familiar with STRIDE and DREAD.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The Card Decks==&lt;br /&gt;
&lt;br /&gt;
''Ecommerce Website Edition''&lt;br /&gt;
&lt;br /&gt;
Instead of EoP’s STRIDE suits, Cornucopia suits were selected based on the structure of the [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide] (SCP), but with additional consideration of sections in the [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard], the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide] and David Rook’s [http://www.securityninja.co.uk/secure-development/the-principles-place/ Principles of Secure Development]. These provided five suits, and a sixth called “Cornucopia” was created for everything else: &lt;br /&gt;
&lt;br /&gt;
* Data validation and encoding&lt;br /&gt;
* Authentication&lt;br /&gt;
* Session management&lt;br /&gt;
* Authorization&lt;br /&gt;
* Cryptography&lt;br /&gt;
* Cornucopia&lt;br /&gt;
&lt;br /&gt;
Each suit contains 13 cards (Ace, 2-10, Jack, Queen and King) but, unlike EoP, there are also two Joker cards. The content was mainly drawn from the SCP. Full [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]].&lt;br /&gt;
&lt;br /&gt;
''Other Decks''&lt;br /&gt;
&lt;br /&gt;
Future editions such as for mobile app development will use different sources of information and suits.&lt;br /&gt;
&lt;br /&gt;
==Mappings==&lt;br /&gt;
The other driver for Cornucopia is to link the attacks with requirements and verification techniques. An initial aim had been to reference [http://cwe.mitre.org/ CWE] weakness IDs, but these proved too numerous, and instead it was decided to map each card to [http://capec.mitre.org/ CAPEC] software attack pattern IDs which themselves are mapped to CWEs, so the desired result is achieved.&lt;br /&gt;
&lt;br /&gt;
Each card is also mapped to the 36 primary security stories in the [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode document], as well as to the OWASP [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide SCP v2], [https://www.owasp.org/images/3/33/OWASP_Application_Security_Verification_Standard_3.0.1.pdf ASVS v3.0.1] and [https://www.owasp.org/index.php/OWASP_AppSensor_Project AppSensor] (application attack detection and response) to help teams create their own security-related stories for use in Agile processes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Cornucopia is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] mentioned above, [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), [https://www.owasp.org/index.php/OWASP_Snakes_and_Ladders OWASP Snakes and Ladders], and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Cornucopia? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia is a card game used to help derive application security requirements during the software development life cycle. To start using Cornucopia:&lt;br /&gt;
&lt;br /&gt;
* Download the document&lt;br /&gt;
* Print the cards onto plain paper or pre-scored card&lt;br /&gt;
* Cut/separate the individual cards&lt;br /&gt;
* Identify an application, module or component to assess&lt;br /&gt;
* Invite business owners, architects, developers, testers along for a card game&lt;br /&gt;
* Get those infosec folk to provide chocolate, pizza, beer, flowers or all four as prizes&lt;br /&gt;
* Select a portion of the deck to start with&lt;br /&gt;
* {{#switchtablink:How to Play|Play the game}} to discuss &amp;amp;amp; document security requirements (and to win rounds)&lt;br /&gt;
* Remember, points make prizes!&lt;br /&gt;
&lt;br /&gt;
Listen to the [http://trustedsoftwarealliance.com/2014/03/21/the-owasp-cornucopia-project-with-colin-watson/ OWASP 24/7 Podcast] about Cornucopia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-presentation-small.jpg|link=media:Owaspnl-colinwatson-cornucopia.odp]]&lt;br /&gt;
&lt;br /&gt;
The game rules are in the document download. But the OpenOffice [[media:Owasplondon-colinwatson-cornucopia.odp|project presentation]] includes an animated version of four demonstration rounds. The presentation is recorded [http://youtu.be/Q_LE-8xNXVk on video].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dariodf Darío De Filippis] [mailto:dariodefilippis@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://youtu.be/i5Y0akWj31k How to Play] video&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Cornucopia-scoresheet.pdf Scoresheet]&lt;br /&gt;
* {{#switchtablink:Get the Cards|All sources and downloads...}}&lt;br /&gt;
&lt;br /&gt;
== Reference Files ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:OWASP_SCP_Quick_Reference_Guide_v2.pdf OWASP SCP requirements]&lt;br /&gt;
* [https://www.owasp.org/images/5/58/OWASP_ASVS_Version_2.pdf OWASP ASVS verification IDs]&lt;br /&gt;
* [https://www.owasp.org/index.php/AppSensor_DetectionPoints OWASP AppSensor attack detection point IDs] &lt;br /&gt;
* [http://capec.mitre.org/data/archive/capec_v1.7.1.zip CAPEC IDs]&lt;br /&gt;
* [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode security-focused story IDs]&lt;br /&gt;
&lt;br /&gt;
The OWASP SCP does not include identity values for the requirements, so please use [https://www.owasp.org/index.php/File:Owasp-requirements-numbering.zip this list].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [26 Jun 2018] v1.20 FR released&lt;br /&gt;
* [14 May 2018] Printed deck purchase details updated&lt;br /&gt;
* [23 Aug 2016] Presentation at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [29 Jun 2016] v1.20 released&lt;br /&gt;
* [21 Jan 2016] [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]] published&lt;br /&gt;
* [30 Dec 2015] Darío De Filippis becomes project co-leader&lt;br /&gt;
* [24 Sep 2015] [http://appsecusa2015.sched.org/event/7f3dba889c0ec9e37900e289c9660503#.VZ6aoXhflNY Lightning training] at AppSec USA 2015&lt;br /&gt;
* [01 Jun 2015] [https://youtu.be/i5Y0akWj31k How to Play video] published&lt;br /&gt;
* [20 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - How to play video&lt;br /&gt;
* [31 Mar 2015] v1.10 released&lt;br /&gt;
* [02 Mar 2015] Decks available from [https://www.owasp.org/index.php/OWASP_Merchandise#Cornucopia_Cards OWASP merchandise store]&lt;br /&gt;
* [18 Feb 2015] Project awarded Labs status&lt;br /&gt;
&lt;br /&gt;
==PCIDSS==&lt;br /&gt;
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia Ecommerce Website Edition is referenced in the current [https://www.pcisecuritystandards.org Payment Card Industry Security Standards Council]  information supplement [https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf PCI DSS E-commerce Guidelines] v2, January 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Get the Cards =&lt;br /&gt;
&lt;br /&gt;
==Printed==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-square-logo-350.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Professionally printed decks are available by two methods:&lt;br /&gt;
* Single decks or in bulk from OWASP (v1.20)&lt;br /&gt;
** As promotion items '''by OWASP Leaders''' from their own chapter budgets [https://docs.google.com/a/owasp.org/forms/d/e/1FAIpQLSez9mV97HuqvYhCldE2hYhX3UjQM1oO5bLy44HkOZSpni0OzQ/viewform?formkey=dF85bGtvdWdrd2JjYldNZ1gxSkJxaEE6MQ Chapter and Project Merchandise Request form]&lt;br /&gt;
** For other individuals, organisations and companies, please email [mailto:dawn.aitken@owasp.org dawn.aitken@owasp.org] with purchase enquiries&lt;br /&gt;
* Request a free deck of cards gifted by [http://blackfootuk.com/ Blackfoot UK Limited] or download their donated print-ready artwork:&lt;br /&gt;
** Request a free [http://blackfootuk.com/cornucopia/receive-a-set-of-cards/ pack of cards (v1.10)] (gifted by Blackfoot UK)&lt;br /&gt;
&lt;br /&gt;
==Source files==&lt;br /&gt;
&lt;br /&gt;
Cornucopia - Ecommerce Website Edition:&lt;br /&gt;
* v1.20 (current version)&lt;br /&gt;
** [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN DOC] | [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR DOC]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN PDF]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.10 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki]]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjb283ZE5GNmFMM2FGWGl2WC14aDJDQ0ZsNk00 Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.04 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/cornucopia-ecom-1v04-blackfoot.zip Print-Ready design files]  (gifted by Blackfoot UK) 47Mb Zip&lt;br /&gt;
&lt;br /&gt;
The current version of Cornucopia Ecommerce Website Edition cards (v1.20 with updated mapping to ASVS v3.0.1 and CAPEC v2.8, and has some minor text changes on the cards) can be printed using the following methods:&lt;br /&gt;
# Download the free Adobe Illustrator files ([https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ EN]) and get them professionally printed&lt;br /&gt;
# Download and self-print the free document word-processing ([https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN], [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR]) or PDF ([https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN])&lt;br /&gt;
## Print the document onto business card blank cards; or&lt;br /&gt;
## Print the document onto normal card and cut the cards out individually using the guide; or&lt;br /&gt;
# Generate your own cards from the free [https://www.owasp.org/index.php/File:Cornucopia-deck-ecommercewebsite-XML.zip source XML data file]&lt;br /&gt;
&lt;br /&gt;
There are also other ways to obtain particular versions:&lt;br /&gt;
* Download the free [https://www.owasp.org/index.php/File:Owasp_cornucopia_printreadyimages.zip PDF (v1.03)] (gifted by Travelex) &lt;br /&gt;
** Have the cards commercially printed; or&lt;br /&gt;
** Import into your own files (such as [http://lists.owasp.org/pipermail/owasp_cornucopia/2014-January/000018.html this way] suggested by Cam Morris via the mailing list)&lt;br /&gt;
&lt;br /&gt;
OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
Collect/share/use the pseudo-random cards tweeted twice daily [https://twitter.com/OWASPCornucopia @OWASPCornucopia]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How to Play =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-cornucopia-K.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-session-9.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
It is possible to play Cornucopia in many different ways. Here is one way, and explained in a [https://youtu.be/i5Y0akWj31k YouTube video].&lt;br /&gt;
&lt;br /&gt;
== Primary method ==&lt;br /&gt;
&lt;br /&gt;
;A - Preparations&lt;br /&gt;
:A1.	Obtain a deck, or print your own Cornucopia deck and separate/cut out the cards&lt;br /&gt;
:A2.	Identify an application or application process to review; this might be a concept, design or an actual implementation&lt;br /&gt;
:A3.	Create a data flow diagram&lt;br /&gt;
:A4.	Identify and invite a group of 3-6 architects, developers, testers and other business stakeholders together and sit around a table (try to include someone fairly familiar with application security)&lt;br /&gt;
:A5.	Have some prizes to hand (gold stars, chocolate, pizza, beer or flowers depending upon your office culture)&lt;br /&gt;
;B - Play&lt;br /&gt;
:One suit - Cornucopia - acts as trumps. Aces are high (i.e. they beat Kings). It helps if there is someone dedicated to documenting the results who is not playing.&lt;br /&gt;
:B1.	Remove the Jokers and a few low-score (2, 3, 4) cards from Cornucopia suit to ensure each player will have the same number of cards&lt;br /&gt;
:B2.	Shuffle the pack and deal all the cards&lt;br /&gt;
:B3.	To begin, choose a player randomly who will play the first card - they can play any card from their hand except from the trump suit - Cornucopia&lt;br /&gt;
:B4.	To play a card, each player must read it out aloud, and explain how (or not) the threat could apply (the player gets a point for attacks that work, and the group thinks it is an actionable bug) - don’t try to think of mitigations at this stage, and don’t exclude a threat just because it is believed it is already mitigated - someone record the card on the score sheet&lt;br /&gt;
:B5.	Play clockwise, each person must play a card in the same way; if you have any card of the matching lead suit you must play one of those, otherwise they can play a card from any other suit. Only a higher card of the same suit, or the highest card in the trump suit Cornucopia, wins the hand.&lt;br /&gt;
:B6.	The person who wins the round, leads the next round (i.e. they play first), and thus defines the next lead suit&lt;br /&gt;
:B7.	Repeat until all the cards are played&lt;br /&gt;
;C - Scoring&lt;br /&gt;
:The objective is to identify applicable threats, and win hands (rounds):&lt;br /&gt;
:C1.	Score +1 for each card you can identify as a valid threat to the application under consideration&lt;br /&gt;
:C2.	Score +1 if you win a round&lt;br /&gt;
:C3.	Once all cards have been played, whoever has the most points wins&lt;br /&gt;
;D - Closure&lt;br /&gt;
:D1.	Review all the applicable threats and the matching security requirements&lt;br /&gt;
:D2.	Create user stories, specifications and test cases as required for your development methodology&lt;br /&gt;
&lt;br /&gt;
==Alternative game rules==&lt;br /&gt;
&lt;br /&gt;
* If you are new to the game, remove the two Joker cards to begin with. Add the Joker cards back in once people become more familiar with the process. Apart from the “trumps card game” rules described above which are very similar to the EoP, the deck can also be played as the “twenty-one card game” (also known as “pontoon” or “blackjack”) which normally reduces the number of cards played in each round.&lt;br /&gt;
* Practice on an imaginary application, or even a future planned application, rather than trying to find fault with existing applications until the participants are happy with the usefulness of the game.&lt;br /&gt;
* Consider just playing with one suit to make a shorter session – but try to cover all the suits for every project. Or even better just play one hand with some pre-selected cards, and score only on the ability to identify security requirements. Perhaps have one game of each suit each day for a week or so, if the participants cannot spare long enough for a full deck.&lt;br /&gt;
* Some teams have preferred to play a full hand of cards, and then discuss what is on the cards after each round (instead of after each person plays a card).&lt;br /&gt;
* Another suggestion is that if a player fails to identify the card is relevant, allow other players to suggest ideas, and potentially let them gain the point for the card. Consider allowing extra points for especially good contributions.&lt;br /&gt;
* You can even play by yourself. Just use the cards to act as thought-provokers. Involving more people will be beneficial though.&lt;br /&gt;
* In Microsoft's EoP guidance, they recommend cheating as a good game strategy&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authorization-8.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-cryptography-j.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
; Can I copy or edit the game?&lt;br /&gt;
:Yes of course. All OWASP materials are free to do with as you like provided you comply with the Creative Commons Attribution-ShareAlike 3.0 license. Perhaps if you create a new version, you might donate it to the OWASP Cornucopia Project?&lt;br /&gt;
&lt;br /&gt;
; How can I get involved?&lt;br /&gt;
: Please send ideas or offers of help to the project’s mailing list.&lt;br /&gt;
&lt;br /&gt;
; How were the attackers’ names chosen?&lt;br /&gt;
: EoP begins every description with words like &amp;quot;An attacker can...&amp;quot;. These have to be phrased as an attack but I was not keen on the anonymous terminology, wanting something more engaging, and therefore used personal names. These can be thought of as external or internal people or aliases for computer systems. But instead of just random names, I thought how they might reflect the OWASP community aspect. Therefore, apart from &amp;quot;Alice and Bob&amp;quot;, I use the given (first) names of current and recent OWASP employees and Board members (assigned in no order), and then randomly selected the remaining 50 or so names from the current list of paying individual OWASP members. No name was used more than once, and where people had provided two personal names, I dropped one part to try to ensure no-one can be easily identified. Names were not deliberately allocated to any particular attack, defence or requirement. The cultural and gender mix simply reflects theses sources of names, and is not meant to be world-representative.&lt;br /&gt;
&lt;br /&gt;
; Why aren’t there any images on the card faces?&lt;br /&gt;
: There is quite a lot of text on the cards, and the cross-referencing takes up space too. But it would be great to have additional design elements included. Any volunteers?&lt;br /&gt;
&lt;br /&gt;
; Are the attacks ranked by the number on the card?&lt;br /&gt;
: Only approximately. The risk will be application and organisation dependent, due to varying security and compliance requirements, so your own severity rating may place the cards in some other order than the numbers on the cards.&lt;br /&gt;
&lt;br /&gt;
; How long does it take to play a round of cards using the full deck?&lt;br /&gt;
: This depends upon the amount of discussion and how familiar the players are with application security concepts. But perhaps allow 1.5 to 2.0 hours for 4-6 people.&lt;br /&gt;
&lt;br /&gt;
; What sort of people should play the game?&lt;br /&gt;
:Always try to have a mix of roles who can contribute alternative perspectives. But include someone who has a reasonable knowledge of application vulnerability terminology. Otherwise try to include a mix of architects, developers, testers and a relevant project manager or business owner.&lt;br /&gt;
&lt;br /&gt;
; Who should take notes and record scores?&lt;br /&gt;
: It is better if that someone else, not playing the game, takes notes about the requirements identified and issues discussed. This could be used as training for a more junior developer, or performed by the project manager. Some organisations have made a recording to review afterwards when the requirements are written up more formally.&lt;br /&gt;
&lt;br /&gt;
; Should we always use the full deck of cards?&lt;br /&gt;
: No. A smaller deck is quicker to play. Start your first game with only enough cards for two or three rounds. Always consider removing cards that are not appropriate at all of the target application or function being reviewed. For the first few times people play the game it is also usually better to remove the Aces and the two Jokers. It is also usual to play the game without any trumps suit until people are more familiar with the idea.&lt;br /&gt;
&lt;br /&gt;
; What should players do when they have an Ace card that says “invented a new X attack”?&lt;br /&gt;
: The player can make up any attack they think is valid, but must match the suit of the card e.g. data validation and encoding). With players new to the game, it can be better to remove these to begin with.&lt;br /&gt;
&lt;br /&gt;
; I don’t understand what the attack means on each card - is there more detailed information?&lt;br /&gt;
: Yes, the Wiki Deck at was created to help players understand the attacks. See [https://www.owasp.org/index.php/Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck Wiki Deck].&lt;br /&gt;
&lt;br /&gt;
; My company wants to print its own version of OWASP Cornucopia - what license do we need to refer to?&lt;br /&gt;
: What is required/reasonable might depend upon how you propose to use the source Cornucopia material. See fuller answer immediately below.&lt;br /&gt;
&lt;br /&gt;
Some examples of re-using or reproducing Cornucopia are:&lt;br /&gt;
&lt;br /&gt;
# Print some decks and give them away to customers&lt;br /&gt;
# Reproduce the game exactly but with a corporate-branded package&lt;br /&gt;
# Use the idea and/or source files to produce a similar game but with different attacks/mappings&lt;br /&gt;
# Distribute modified design files&lt;br /&gt;
&lt;br /&gt;
If option 1 above, you can order these in bulk from OWASP and attach your own details below the &amp;quot;compliments of&amp;quot; section on the boxes. There are three aspects to consider for options 2, 3 or 4, or combinations of those - see below. The existing printed decks (and their boxes and leaflets include such text).&lt;br /&gt;
&lt;br /&gt;
''A - Cornucopia License''&lt;br /&gt;
&lt;br /&gt;
The precise wording will depend how the material is being used or reproduced. Under Creative Commons Attribution-ShareAlike 3.0 license it is necessary to attribute all previous contributions (in this case, Microsoft, Boeing, Mitre, etc). The easiest place to put the wording is on the leaflet (folded inside, or separate booklet). The current required long-form wording is:&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license http://creativecommons.org/licenses/by-sa/3.0/&lt;br /&gt;
&lt;br /&gt;
  The files used to create these materials were created from the OWASP project and are also open source, and are licensed under the same conditions. &lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia can be downloaded for free from the OWASP website and printed yourself. The OWASP Cornucopia project source in vendor neutral and unbranded.&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  © 2012-2018 OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
  This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license.&lt;br /&gt;
&lt;br /&gt;
  Acknowledgments:&lt;br /&gt;
&lt;br /&gt;
  Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
&lt;br /&gt;
  Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
&lt;br /&gt;
  Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
&lt;br /&gt;
  Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
&lt;br /&gt;
  Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
&lt;br /&gt;
  Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
&lt;br /&gt;
  Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
The box/container for the cards must have the wording:&lt;br /&gt;
&lt;br /&gt;
  Created by Colin Watson.&lt;br /&gt;
&lt;br /&gt;
  Contains: One pack of Cornucopia Ecommerce Website playing cards. OWASP Cornucopia is open source and can be downloaded free of charge from the OWASP website.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
The following short-form wording must also appear on any materials referencing the outputs (e.g. press releases, leaflets, reports, blog posts):&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license and is © 2012-2016 OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
If any files are distributed electronically, the long-form wording should also be aded in a license.txt file within the distribution.&lt;br /&gt;
&lt;br /&gt;
If the intention is to use the idea only (option 3 above), the long-form, box and short-form wording might be different, and probably simpler. And it might make more sense to start with the Microsoft-provided Elevation of Privilege files (and open source license).&lt;br /&gt;
&lt;br /&gt;
''B - Upcoming update to Cornucopia''&lt;br /&gt;
&lt;br /&gt;
Note that the current print design files are v1.04, and the current Word document is v1.10, but we are in the process of updating all of these to v1.20.&lt;br /&gt;
&lt;br /&gt;
Whatever is used as a starting point, please state the source version, for example: &lt;br /&gt;
&lt;br /&gt;
  Based on OWASP Cornucopia Ecommerce Website Edition v1.04&lt;br /&gt;
&lt;br /&gt;
''C - OWASP brand usage''&lt;br /&gt;
&lt;br /&gt;
Additionally individuals, companies and other organisations must not breach OWASP's brand usage guidelines. &lt;br /&gt;
&lt;br /&gt;
  https://www.owasp.org/index.php/Marketing/Resources#tab=BRAND_GUIDELINES&lt;br /&gt;
&lt;br /&gt;
In the case of Cornucopia, in 2014 Blackfoot Limited produced some printed decks of cards. Blackfoot's name and logo did not appear anywhere on the OWASP-branded cards, and the OWASP logo did not appear on the Blackfoot-branded box and leaflet. In fact there is no OWASP logo on any part of the Blackfoot branded decks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-data-A.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Cornucopia is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Thomas Berson&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Oana Cornea&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Todd Dahl&lt;br /&gt;
* Luis Enriquez&lt;br /&gt;
* Ken Ferris&lt;br /&gt;
* Darío De Filippis&lt;br /&gt;
* Sebastien Gioria&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Timo Goosen&lt;br /&gt;
* Anthony Harrison&lt;br /&gt;
* John Herrlin&lt;br /&gt;
* Jerry Hoff&lt;br /&gt;
* Marios Kourtesis&lt;br /&gt;
* Franck Lacosta&lt;br /&gt;
* Mathias Lemaire&lt;br /&gt;
* Antonis Manaras&lt;br /&gt;
* Jim Manico&lt;br /&gt;
* Mark Miller&lt;br /&gt;
* Cam Morris&lt;br /&gt;
* Susana Romaniz&lt;br /&gt;
* Ravishankar Sahadevan&lt;br /&gt;
* Tao Sauvage&lt;br /&gt;
* Stephen de Vries&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
Also:&lt;br /&gt;
&lt;br /&gt;
* Attendees at OWASP London, OWASP Manchester and OWASP Netherlands chapter meetings, the London Gamification meetup, and the training at AppSec USA 2015 in san Francisco who made helpful suggestions and asked challenging questions&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
* Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
* Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
* Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
* Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
* Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
* Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authentication-7.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-joker-a.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Version history (see [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx uploads]):&lt;br /&gt;
* Alpha version (0.40) was issued in August 2012&lt;br /&gt;
* Beta version (1.00) was released in February 2013&lt;br /&gt;
* Stable release (1.02) was released in August 2013, following feedback from mailing list and use with groups of developers&lt;br /&gt;
* Release v1.03 included minor changes&lt;br /&gt;
* Release v1.04 included a text correction on one card&lt;br /&gt;
* Release v1.05 included additional narrative and FAQs&lt;br /&gt;
* Current release v1.10 included cross-references updated for 2014 version of ASVS, contributors updated and minor text changes to cards to improve readability&lt;br /&gt;
* Current release v1.20 included cross-references updated for version 3.0.1 of ASVS and CAPEC v2.8, and many minor text changes including further contributors.&lt;br /&gt;
&lt;br /&gt;
As of May 2016, the priorities are:&lt;br /&gt;
* &amp;lt;strike&amp;gt;Develop Cornucopia Wiki Deck&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Update the document/deck to shorten some card text [completed ready for v1.10]&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVS 2014&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVSv3 2016&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check/update CAPEC mappings&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Translate into French&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Translate into Japanese, Spanish (almost complete May 2016) and other languages (help needed please) - German in progress (from June 2014)&lt;br /&gt;
* &amp;lt;strike&amp;gt;Make card decks available via OWASP Merchandise Store&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create a video &amp;quot;how to play&amp;quot;&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Update printed decks in OWASP Merchandise Store to v1.20 in both EN and ES languages&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Cornucopia is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Cornucopia into that language?&lt;br /&gt;
==Use and Promote the Cornucopia Card Decks==&lt;br /&gt;
Please help raise awareness of Cornucopia by printing cards:&lt;br /&gt;
* Use Cornucopia with specifiers, architects, designers, developers, testers and others, in part to train them, but also to solicit feedback on their usability, practicality and appropriateness for their work&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a mobile app to play the game&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What cards don't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other decks would you like to see?&lt;br /&gt;
==Keep the Cards Updated==&lt;br /&gt;
As the source referenced documents change, we have to update the decks. You may also find errors and omissions. In the first instance, please send a message to the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] if you have identified errors &amp;amp;amp; omissions, have some time to maintain the source documents, or can help in other ways.&lt;br /&gt;
==Create a New Deck==&lt;br /&gt;
The only version currently available is the Cornucopia Ecommerce Website Edition in English. We would like to create a new mobile app specific deck, probably using the wonderful [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] as inspiration for the card source materials. Do you have an idea for your own application security requirements card deck? Perhaps for {{#switchtablink:Mobile App Edition|mobile apps}} or something else?&lt;br /&gt;
&lt;br /&gt;
= About Ecommerce Website Edition =&lt;br /&gt;
{{:Projects/OWASP Cornucopia Ecommerce Website Edition | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]] &lt;br /&gt;
[[Category: Threat_Modeling]] &lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:SAMM-SR-1]] &lt;br /&gt;
[[Category:SAMM-SR-2]] &lt;br /&gt;
[[Category:SAMM-TA-1]] &lt;br /&gt;
[[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=241527</id>
		<title>OWASP Cornucopia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=241527"/>
				<updated>2018-06-26T15:35:56Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Source files */ Updated current version print instructions&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cornucopia-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#Lab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Cornucopia==&lt;br /&gt;
OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology agnostic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
The idea behind Cornucopia is to help development teams, especially those using Agile methodologies, to identify application security requirements and develop security-based user stories. Although the idea had been waiting for enough time to progress it, the final motivation came when [http://www.safecode.org/ SAFECode] published its [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf Practical Security Stories and Security Tasks for Agile Development Environments] in July 2012.&lt;br /&gt;
&lt;br /&gt;
The Microsoft SDL team had already published its super [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] (EoP) but that did not seem to address the most appropriate kind of issues that web application development teams mostly have to address. EoP is a great concept and game strategy, and was [http://blogs.msdn.com/b/sdl/archive/2010/03/02/announcing-elevation-of-privilege-the-threat-modeling-game.aspx published under] a [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License].&lt;br /&gt;
Cornucopia {{#switchtablink:Ecommerce Website Edition|Ecommerce Website Edition}} is based the concepts and game ideas in EoP, but those have been modified to be more relevant to the types of issues ecommerce website developers encounter. It attempts to introduce threat-modelling ideas into development teams that use Agile methodologies, or are more focused on web application weaknesses than other types of software vulnerabilities or are not familiar with STRIDE and DREAD.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The Card Decks==&lt;br /&gt;
&lt;br /&gt;
''Ecommerce Website Edition''&lt;br /&gt;
&lt;br /&gt;
Instead of EoP’s STRIDE suits, Cornucopia suits were selected based on the structure of the [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide] (SCP), but with additional consideration of sections in the [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard], the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide] and David Rook’s [http://www.securityninja.co.uk/secure-development/the-principles-place/ Principles of Secure Development]. These provided five suits, and a sixth called “Cornucopia” was created for everything else: &lt;br /&gt;
&lt;br /&gt;
* Data validation and encoding&lt;br /&gt;
* Authentication&lt;br /&gt;
* Session management&lt;br /&gt;
* Authorization&lt;br /&gt;
* Cryptography&lt;br /&gt;
* Cornucopia&lt;br /&gt;
&lt;br /&gt;
Each suit contains 13 cards (Ace, 2-10, Jack, Queen and King) but, unlike EoP, there are also two Joker cards. The content was mainly drawn from the SCP. Full [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]].&lt;br /&gt;
&lt;br /&gt;
''Other Decks''&lt;br /&gt;
&lt;br /&gt;
Future editions such as for mobile app development will use different sources of information and suits.&lt;br /&gt;
&lt;br /&gt;
==Mappings==&lt;br /&gt;
The other driver for Cornucopia is to link the attacks with requirements and verification techniques. An initial aim had been to reference [http://cwe.mitre.org/ CWE] weakness IDs, but these proved too numerous, and instead it was decided to map each card to [http://capec.mitre.org/ CAPEC] software attack pattern IDs which themselves are mapped to CWEs, so the desired result is achieved.&lt;br /&gt;
&lt;br /&gt;
Each card is also mapped to the 36 primary security stories in the [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode document], as well as to the OWASP [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide SCP v2], [https://www.owasp.org/images/3/33/OWASP_Application_Security_Verification_Standard_3.0.1.pdf ASVS v3.0.1] and [https://www.owasp.org/index.php/OWASP_AppSensor_Project AppSensor] (application attack detection and response) to help teams create their own security-related stories for use in Agile processes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Cornucopia is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] mentioned above, [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), [https://www.owasp.org/index.php/OWASP_Snakes_and_Ladders OWASP Snakes and Ladders], and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Cornucopia? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia is a card game used to help derive application security requirements during the software development life cycle. To start using Cornucopia:&lt;br /&gt;
&lt;br /&gt;
* Download the document&lt;br /&gt;
* Print the cards onto plain paper or pre-scored card&lt;br /&gt;
* Cut/separate the individual cards&lt;br /&gt;
* Identify an application, module or component to assess&lt;br /&gt;
* Invite business owners, architects, developers, testers along for a card game&lt;br /&gt;
* Get those infosec folk to provide chocolate, pizza, beer, flowers or all four as prizes&lt;br /&gt;
* Select a portion of the deck to start with&lt;br /&gt;
* {{#switchtablink:How to Play|Play the game}} to discuss &amp;amp;amp; document security requirements (and to win rounds)&lt;br /&gt;
* Remember, points make prizes!&lt;br /&gt;
&lt;br /&gt;
Listen to the [http://trustedsoftwarealliance.com/2014/03/21/the-owasp-cornucopia-project-with-colin-watson/ OWASP 24/7 Podcast] about Cornucopia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-presentation-small.jpg|link=media:Owaspnl-colinwatson-cornucopia.odp]]&lt;br /&gt;
&lt;br /&gt;
The game rules are in the document download. But the OpenOffice [[media:Owasplondon-colinwatson-cornucopia.odp|project presentation]] includes an animated version of four demonstration rounds. The presentation is recorded [http://youtu.be/Q_LE-8xNXVk on video].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dariodf Darío De Filippis] [mailto:dariodefilippis@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://youtu.be/i5Y0akWj31k How to Play] video&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Cornucopia-scoresheet.pdf Scoresheet]&lt;br /&gt;
* {{#switchtablink:Get the Cards|All sources and downloads...}}&lt;br /&gt;
&lt;br /&gt;
== Reference Files ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:OWASP_SCP_Quick_Reference_Guide_v2.pdf OWASP SCP requirements]&lt;br /&gt;
* [https://www.owasp.org/images/5/58/OWASP_ASVS_Version_2.pdf OWASP ASVS verification IDs]&lt;br /&gt;
* [https://www.owasp.org/index.php/AppSensor_DetectionPoints OWASP AppSensor attack detection point IDs] &lt;br /&gt;
* [http://capec.mitre.org/data/archive/capec_v1.7.1.zip CAPEC IDs]&lt;br /&gt;
* [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode security-focused story IDs]&lt;br /&gt;
&lt;br /&gt;
The OWASP SCP does not include identity values for the requirements, so please use [https://www.owasp.org/index.php/File:Owasp-requirements-numbering.zip this list].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [14 May 2018] Printed deck purchase details updated&lt;br /&gt;
* [23 Aug 2016] Presentation at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [29 Jun 2016] v1.20 released&lt;br /&gt;
* [21 Jan 2016] [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]] published&lt;br /&gt;
* [30 Dec 2015] Darío De Filippis becomes project co-leader&lt;br /&gt;
* [24 Sep 2015] [http://appsecusa2015.sched.org/event/7f3dba889c0ec9e37900e289c9660503#.VZ6aoXhflNY Lightning training] at AppSec USA 2015&lt;br /&gt;
* [01 Jun 2015] [https://youtu.be/i5Y0akWj31k How to Play video] published&lt;br /&gt;
* [20 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - How to play video&lt;br /&gt;
* [31 Mar 2015] v1.10 released&lt;br /&gt;
* [02 Mar 2015] Decks available from [https://www.owasp.org/index.php/OWASP_Merchandise#Cornucopia_Cards OWASP merchandise store]&lt;br /&gt;
* [18 Feb 2015] Project awarded Labs status&lt;br /&gt;
&lt;br /&gt;
==PCIDSS==&lt;br /&gt;
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia Ecommerce Website Edition is referenced in the current [https://www.pcisecuritystandards.org Payment Card Industry Security Standards Council]  information supplement [https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf PCI DSS E-commerce Guidelines] v2, January 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Get the Cards =&lt;br /&gt;
&lt;br /&gt;
==Printed==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-square-logo-350.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Professionally printed decks are available by two methods:&lt;br /&gt;
* Single decks or in bulk from OWASP (v1.20)&lt;br /&gt;
** As promotion items '''by OWASP Leaders''' from their own chapter budgets [https://docs.google.com/a/owasp.org/forms/d/e/1FAIpQLSez9mV97HuqvYhCldE2hYhX3UjQM1oO5bLy44HkOZSpni0OzQ/viewform?formkey=dF85bGtvdWdrd2JjYldNZ1gxSkJxaEE6MQ Chapter and Project Merchandise Request form]&lt;br /&gt;
** For other individuals, organisations and companies, please email [mailto:dawn.aitken@owasp.org dawn.aitken@owasp.org] with purchase enquiries&lt;br /&gt;
* Request a free deck of cards gifted by [http://blackfootuk.com/ Blackfoot UK Limited] or download their donated print-ready artwork:&lt;br /&gt;
** Request a free [http://blackfootuk.com/cornucopia/receive-a-set-of-cards/ pack of cards (v1.10)] (gifted by Blackfoot UK)&lt;br /&gt;
&lt;br /&gt;
==Source files==&lt;br /&gt;
&lt;br /&gt;
Cornucopia - Ecommerce Website Edition:&lt;br /&gt;
* v1.20 (current version)&lt;br /&gt;
** [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN DOC] | [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR DOC]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN PDF]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.10 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki]]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjb283ZE5GNmFMM2FGWGl2WC14aDJDQ0ZsNk00 Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.04 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/cornucopia-ecom-1v04-blackfoot.zip Print-Ready design files]  (gifted by Blackfoot UK) 47Mb Zip&lt;br /&gt;
&lt;br /&gt;
The current version of Cornucopia Ecommerce Website Edition cards (v1.20 with updated mapping to ASVS v3.0.1 and CAPEC v2.8, and has some minor text changes on the cards) can be printed using the following methods:&lt;br /&gt;
# Download the free Adobe Illustrator files ([https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ EN]) and get them professionally printed&lt;br /&gt;
# Download and self-print the free document word-processing ([https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN], [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR]) or PDF ([https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN])&lt;br /&gt;
## Print the document onto business card blank cards; or&lt;br /&gt;
## Print the document onto normal card and cut the cards out individually using the guide; or&lt;br /&gt;
# Generate your own cards from the free [https://www.owasp.org/index.php/File:Cornucopia-deck-ecommercewebsite-XML.zip source XML data file]&lt;br /&gt;
&lt;br /&gt;
There are also other ways to obtain particular versions:&lt;br /&gt;
* Download the free [https://www.owasp.org/index.php/File:Owasp_cornucopia_printreadyimages.zip PDF (v1.03)] (gifted by Travelex) &lt;br /&gt;
** Have the cards commercially printed; or&lt;br /&gt;
** Import into your own files (such as [http://lists.owasp.org/pipermail/owasp_cornucopia/2014-January/000018.html this way] suggested by Cam Morris via the mailing list)&lt;br /&gt;
&lt;br /&gt;
OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
Collect/share/use the pseudo-random cards tweeted twice daily [https://twitter.com/OWASPCornucopia @OWASPCornucopia]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How to Play =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-cornucopia-K.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-session-9.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
It is possible to play Cornucopia in many different ways. Here is one way, and explained in a [https://youtu.be/i5Y0akWj31k YouTube video].&lt;br /&gt;
&lt;br /&gt;
== Primary method ==&lt;br /&gt;
&lt;br /&gt;
;A - Preparations&lt;br /&gt;
:A1.	Obtain a deck, or print your own Cornucopia deck and separate/cut out the cards&lt;br /&gt;
:A2.	Identify an application or application process to review; this might be a concept, design or an actual implementation&lt;br /&gt;
:A3.	Create a data flow diagram&lt;br /&gt;
:A4.	Identify and invite a group of 3-6 architects, developers, testers and other business stakeholders together and sit around a table (try to include someone fairly familiar with application security)&lt;br /&gt;
:A5.	Have some prizes to hand (gold stars, chocolate, pizza, beer or flowers depending upon your office culture)&lt;br /&gt;
;B - Play&lt;br /&gt;
:One suit - Cornucopia - acts as trumps. Aces are high (i.e. they beat Kings). It helps if there is someone dedicated to documenting the results who is not playing.&lt;br /&gt;
:B1.	Remove the Jokers and a few low-score (2, 3, 4) cards from Cornucopia suit to ensure each player will have the same number of cards&lt;br /&gt;
:B2.	Shuffle the pack and deal all the cards&lt;br /&gt;
:B3.	To begin, choose a player randomly who will play the first card - they can play any card from their hand except from the trump suit - Cornucopia&lt;br /&gt;
:B4.	To play a card, each player must read it out aloud, and explain how (or not) the threat could apply (the player gets a point for attacks that work, and the group thinks it is an actionable bug) - don’t try to think of mitigations at this stage, and don’t exclude a threat just because it is believed it is already mitigated - someone record the card on the score sheet&lt;br /&gt;
:B5.	Play clockwise, each person must play a card in the same way; if you have any card of the matching lead suit you must play one of those, otherwise they can play a card from any other suit. Only a higher card of the same suit, or the highest card in the trump suit Cornucopia, wins the hand.&lt;br /&gt;
:B6.	The person who wins the round, leads the next round (i.e. they play first), and thus defines the next lead suit&lt;br /&gt;
:B7.	Repeat until all the cards are played&lt;br /&gt;
;C - Scoring&lt;br /&gt;
:The objective is to identify applicable threats, and win hands (rounds):&lt;br /&gt;
:C1.	Score +1 for each card you can identify as a valid threat to the application under consideration&lt;br /&gt;
:C2.	Score +1 if you win a round&lt;br /&gt;
:C3.	Once all cards have been played, whoever has the most points wins&lt;br /&gt;
;D - Closure&lt;br /&gt;
:D1.	Review all the applicable threats and the matching security requirements&lt;br /&gt;
:D2.	Create user stories, specifications and test cases as required for your development methodology&lt;br /&gt;
&lt;br /&gt;
==Alternative game rules==&lt;br /&gt;
&lt;br /&gt;
* If you are new to the game, remove the two Joker cards to begin with. Add the Joker cards back in once people become more familiar with the process. Apart from the “trumps card game” rules described above which are very similar to the EoP, the deck can also be played as the “twenty-one card game” (also known as “pontoon” or “blackjack”) which normally reduces the number of cards played in each round.&lt;br /&gt;
* Practice on an imaginary application, or even a future planned application, rather than trying to find fault with existing applications until the participants are happy with the usefulness of the game.&lt;br /&gt;
* Consider just playing with one suit to make a shorter session – but try to cover all the suits for every project. Or even better just play one hand with some pre-selected cards, and score only on the ability to identify security requirements. Perhaps have one game of each suit each day for a week or so, if the participants cannot spare long enough for a full deck.&lt;br /&gt;
* Some teams have preferred to play a full hand of cards, and then discuss what is on the cards after each round (instead of after each person plays a card).&lt;br /&gt;
* Another suggestion is that if a player fails to identify the card is relevant, allow other players to suggest ideas, and potentially let them gain the point for the card. Consider allowing extra points for especially good contributions.&lt;br /&gt;
* You can even play by yourself. Just use the cards to act as thought-provokers. Involving more people will be beneficial though.&lt;br /&gt;
* In Microsoft's EoP guidance, they recommend cheating as a good game strategy&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authorization-8.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-cryptography-j.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
; Can I copy or edit the game?&lt;br /&gt;
:Yes of course. All OWASP materials are free to do with as you like provided you comply with the Creative Commons Attribution-ShareAlike 3.0 license. Perhaps if you create a new version, you might donate it to the OWASP Cornucopia Project?&lt;br /&gt;
&lt;br /&gt;
; How can I get involved?&lt;br /&gt;
: Please send ideas or offers of help to the project’s mailing list.&lt;br /&gt;
&lt;br /&gt;
; How were the attackers’ names chosen?&lt;br /&gt;
: EoP begins every description with words like &amp;quot;An attacker can...&amp;quot;. These have to be phrased as an attack but I was not keen on the anonymous terminology, wanting something more engaging, and therefore used personal names. These can be thought of as external or internal people or aliases for computer systems. But instead of just random names, I thought how they might reflect the OWASP community aspect. Therefore, apart from &amp;quot;Alice and Bob&amp;quot;, I use the given (first) names of current and recent OWASP employees and Board members (assigned in no order), and then randomly selected the remaining 50 or so names from the current list of paying individual OWASP members. No name was used more than once, and where people had provided two personal names, I dropped one part to try to ensure no-one can be easily identified. Names were not deliberately allocated to any particular attack, defence or requirement. The cultural and gender mix simply reflects theses sources of names, and is not meant to be world-representative.&lt;br /&gt;
&lt;br /&gt;
; Why aren’t there any images on the card faces?&lt;br /&gt;
: There is quite a lot of text on the cards, and the cross-referencing takes up space too. But it would be great to have additional design elements included. Any volunteers?&lt;br /&gt;
&lt;br /&gt;
; Are the attacks ranked by the number on the card?&lt;br /&gt;
: Only approximately. The risk will be application and organisation dependent, due to varying security and compliance requirements, so your own severity rating may place the cards in some other order than the numbers on the cards.&lt;br /&gt;
&lt;br /&gt;
; How long does it take to play a round of cards using the full deck?&lt;br /&gt;
: This depends upon the amount of discussion and how familiar the players are with application security concepts. But perhaps allow 1.5 to 2.0 hours for 4-6 people.&lt;br /&gt;
&lt;br /&gt;
; What sort of people should play the game?&lt;br /&gt;
:Always try to have a mix of roles who can contribute alternative perspectives. But include someone who has a reasonable knowledge of application vulnerability terminology. Otherwise try to include a mix of architects, developers, testers and a relevant project manager or business owner.&lt;br /&gt;
&lt;br /&gt;
; Who should take notes and record scores?&lt;br /&gt;
: It is better if that someone else, not playing the game, takes notes about the requirements identified and issues discussed. This could be used as training for a more junior developer, or performed by the project manager. Some organisations have made a recording to review afterwards when the requirements are written up more formally.&lt;br /&gt;
&lt;br /&gt;
; Should we always use the full deck of cards?&lt;br /&gt;
: No. A smaller deck is quicker to play. Start your first game with only enough cards for two or three rounds. Always consider removing cards that are not appropriate at all of the target application or function being reviewed. For the first few times people play the game it is also usually better to remove the Aces and the two Jokers. It is also usual to play the game without any trumps suit until people are more familiar with the idea.&lt;br /&gt;
&lt;br /&gt;
; What should players do when they have an Ace card that says “invented a new X attack”?&lt;br /&gt;
: The player can make up any attack they think is valid, but must match the suit of the card e.g. data validation and encoding). With players new to the game, it can be better to remove these to begin with.&lt;br /&gt;
&lt;br /&gt;
; I don’t understand what the attack means on each card - is there more detailed information?&lt;br /&gt;
: Yes, the Wiki Deck at was created to help players understand the attacks. See [https://www.owasp.org/index.php/Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck Wiki Deck].&lt;br /&gt;
&lt;br /&gt;
; My company wants to print its own version of OWASP Cornucopia - what license do we need to refer to?&lt;br /&gt;
: What is required/reasonable might depend upon how you propose to use the source Cornucopia material. See fuller answer immediately below.&lt;br /&gt;
&lt;br /&gt;
Some examples of re-using or reproducing Cornucopia are:&lt;br /&gt;
&lt;br /&gt;
# Print some decks and give them away to customers&lt;br /&gt;
# Reproduce the game exactly but with a corporate-branded package&lt;br /&gt;
# Use the idea and/or source files to produce a similar game but with different attacks/mappings&lt;br /&gt;
# Distribute modified design files&lt;br /&gt;
&lt;br /&gt;
If option 1 above, you can order these in bulk from OWASP and attach your own details below the &amp;quot;compliments of&amp;quot; section on the boxes. There are three aspects to consider for options 2, 3 or 4, or combinations of those - see below. The existing printed decks (and their boxes and leaflets include such text).&lt;br /&gt;
&lt;br /&gt;
''A - Cornucopia License''&lt;br /&gt;
&lt;br /&gt;
The precise wording will depend how the material is being used or reproduced. Under Creative Commons Attribution-ShareAlike 3.0 license it is necessary to attribute all previous contributions (in this case, Microsoft, Boeing, Mitre, etc). The easiest place to put the wording is on the leaflet (folded inside, or separate booklet). The current required long-form wording is:&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license http://creativecommons.org/licenses/by-sa/3.0/&lt;br /&gt;
&lt;br /&gt;
  The files used to create these materials were created from the OWASP project and are also open source, and are licensed under the same conditions. &lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia can be downloaded for free from the OWASP website and printed yourself. The OWASP Cornucopia project source in vendor neutral and unbranded.&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  © 2012-2016 OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
  This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license.&lt;br /&gt;
&lt;br /&gt;
  Acknowledgments:&lt;br /&gt;
&lt;br /&gt;
  Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
&lt;br /&gt;
  Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
&lt;br /&gt;
  Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
&lt;br /&gt;
  Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
&lt;br /&gt;
  Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
&lt;br /&gt;
  Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
&lt;br /&gt;
  Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
The box/container for the cards must have the wording:&lt;br /&gt;
&lt;br /&gt;
  Created by Colin Watson.&lt;br /&gt;
&lt;br /&gt;
  Contains: One pack of Cornucopia Ecommerce Website playing cards. OWASP Cornucopia is open source and can be downloaded free of charge from the OWASP website.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
The following short-form wording must also appear on any materials referencing the outputs (e.g. press releases, leaflets, reports, blog posts):&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license and is © 2012-2016 OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
If any files are distributed electronically, the long-form wording should also be aded in a license.txt file within the distribution.&lt;br /&gt;
&lt;br /&gt;
If the intention is to use the idea only (option 3 above), the long-form, box and short-form wording might be different, and probably simpler. And it might make more sense to start with the Microsoft-provided Elevation of Privilege files (and open source license).&lt;br /&gt;
&lt;br /&gt;
''B - Upcoming update to Cornucopia''&lt;br /&gt;
&lt;br /&gt;
Note that the current print design files are v1.04, and the current Word document is v1.10, but we are in the process of updating all of these to v1.20.&lt;br /&gt;
&lt;br /&gt;
Whatever is used as a starting point, please state the source version, for example: &lt;br /&gt;
&lt;br /&gt;
  Based on OWASP Cornucopia Ecommerce Website Edition v1.04&lt;br /&gt;
&lt;br /&gt;
''C - OWASP brand usage''&lt;br /&gt;
&lt;br /&gt;
Additionally individuals, companies and other organisations must not breach OWASP's brand usage guidelines. &lt;br /&gt;
&lt;br /&gt;
  https://www.owasp.org/index.php/Marketing/Resources#tab=BRAND_GUIDELINES&lt;br /&gt;
&lt;br /&gt;
In the case of Cornucopia, in 2014 Blackfoot Limited produced some printed decks of cards. Blackfoot's name and logo did not appear anywhere on the OWASP-branded cards, and the OWASP logo did not appear on the Blackfoot-branded box and leaflet. In fact there is no OWASP logo on any part of the Blackfoot branded decks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-data-A.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Cornucopia is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Oana Cornea&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Todd Dahl&lt;br /&gt;
* Luis Enriquez&lt;br /&gt;
* Ken Ferris&lt;br /&gt;
* Darío De Filippis&lt;br /&gt;
* Sebastien Gioria&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Timo Goosen&lt;br /&gt;
* Anthony Harrison&lt;br /&gt;
* John Herrlin&lt;br /&gt;
* Jerry Hoff&lt;br /&gt;
* Marios Kourtesis&lt;br /&gt;
* Antonis Manaras&lt;br /&gt;
* Jim Manico&lt;br /&gt;
* Mark Miller&lt;br /&gt;
* Cam Morris&lt;br /&gt;
* Susana Romaniz&lt;br /&gt;
* Ravishankar Sahadevan&lt;br /&gt;
* Tao Sauvage&lt;br /&gt;
* Stephen de Vries&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
Also:&lt;br /&gt;
&lt;br /&gt;
* Attendees at OWASP London, OWASP Manchester and OWASP Netherlands chapter meetings, the London Gamification meetup, and the training at AppSec USA 2015 in san Francisco who made helpful suggestions and asked challenging questions&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
* Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
* Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
* Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
* Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
* Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
* Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authentication-7.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-joker-a.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Version history (see [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx uploads]):&lt;br /&gt;
* Alpha version (0.40) was issued in August 2012&lt;br /&gt;
* Beta version (1.00) was released in February 2013&lt;br /&gt;
* Stable release (1.02) was released in August 2013, following feedback from mailing list and use with groups of developers&lt;br /&gt;
* Release v1.03 included minor changes&lt;br /&gt;
* Release v1.04 included a text correction on one card&lt;br /&gt;
* Release v1.05 included additional narrative and FAQs&lt;br /&gt;
* Current release v1.10 included cross-references updated for 2014 version of ASVS, contributors updated and minor text changes to cards to improve readability&lt;br /&gt;
* Current release v1.20 included cross-references updated for version 3.0.1 of ASVS and CAPEC v2.8, and many minor text changes including further contributors.&lt;br /&gt;
&lt;br /&gt;
As of May 2016, the priorities are:&lt;br /&gt;
* &amp;lt;strike&amp;gt;Develop Cornucopia Wiki Deck&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Update the document/deck to shorten some card text [completed ready for v1.10]&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVS 2014&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVSv3 2016&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check/update CAPEC mappings&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Translate into French (Started in June 2015 by [[User:SebastienGioria]] ) , Japanese, Spanish (almost complete May 2016) and other languages (help needed please) - German in progress (from June 2014)&lt;br /&gt;
* &amp;lt;strike&amp;gt;Make card decks available via OWASP Merchandise Store&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create a video &amp;quot;how to play&amp;quot;&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Update printed decks in OWASP Merchandise Store to v1.20 in both EN and ES languages&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Cornucopia is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Cornucopia into that language?&lt;br /&gt;
==Use and Promote the Cornucopia Card Decks==&lt;br /&gt;
Please help raise awareness of Cornucopia by printing cards:&lt;br /&gt;
* Use Cornucopia with specifiers, architects, designers, developers, testers and others, in part to train them, but also to solicit feedback on their usability, practicality and appropriateness for their work&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a mobile app to play the game&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What cards don't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other decks would you like to see?&lt;br /&gt;
==Keep the Cards Updated==&lt;br /&gt;
As the source referenced documents change, we have to update the decks. You may also find errors and omissions. In the first instance, please send a message to the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] if you have identified errors &amp;amp;amp; omissions, have some time to maintain the source documents, or can help in other ways.&lt;br /&gt;
==Create a New Deck==&lt;br /&gt;
The only version currently available is the Cornucopia Ecommerce Website Edition in English. We would like to create a new mobile app specific deck, probably using the wonderful [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] as inspiration for the card source materials. Do you have an idea for your own application security requirements card deck? Perhaps for {{#switchtablink:Mobile App Edition|mobile apps}} or something else?&lt;br /&gt;
&lt;br /&gt;
= About Ecommerce Website Edition =&lt;br /&gt;
{{:Projects/OWASP Cornucopia Ecommerce Website Edition | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]] &lt;br /&gt;
[[Category: Threat_Modeling]] &lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:SAMM-SR-1]] &lt;br /&gt;
[[Category:SAMM-SR-2]] &lt;br /&gt;
[[Category:SAMM-TA-1]] &lt;br /&gt;
[[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=241526</id>
		<title>OWASP Cornucopia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=241526"/>
				<updated>2018-06-26T15:29:28Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: FR v1.20 added&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cornucopia-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#Lab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Cornucopia==&lt;br /&gt;
OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology agnostic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
The idea behind Cornucopia is to help development teams, especially those using Agile methodologies, to identify application security requirements and develop security-based user stories. Although the idea had been waiting for enough time to progress it, the final motivation came when [http://www.safecode.org/ SAFECode] published its [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf Practical Security Stories and Security Tasks for Agile Development Environments] in July 2012.&lt;br /&gt;
&lt;br /&gt;
The Microsoft SDL team had already published its super [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] (EoP) but that did not seem to address the most appropriate kind of issues that web application development teams mostly have to address. EoP is a great concept and game strategy, and was [http://blogs.msdn.com/b/sdl/archive/2010/03/02/announcing-elevation-of-privilege-the-threat-modeling-game.aspx published under] a [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License].&lt;br /&gt;
Cornucopia {{#switchtablink:Ecommerce Website Edition|Ecommerce Website Edition}} is based the concepts and game ideas in EoP, but those have been modified to be more relevant to the types of issues ecommerce website developers encounter. It attempts to introduce threat-modelling ideas into development teams that use Agile methodologies, or are more focused on web application weaknesses than other types of software vulnerabilities or are not familiar with STRIDE and DREAD.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The Card Decks==&lt;br /&gt;
&lt;br /&gt;
''Ecommerce Website Edition''&lt;br /&gt;
&lt;br /&gt;
Instead of EoP’s STRIDE suits, Cornucopia suits were selected based on the structure of the [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide] (SCP), but with additional consideration of sections in the [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard], the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide] and David Rook’s [http://www.securityninja.co.uk/secure-development/the-principles-place/ Principles of Secure Development]. These provided five suits, and a sixth called “Cornucopia” was created for everything else: &lt;br /&gt;
&lt;br /&gt;
* Data validation and encoding&lt;br /&gt;
* Authentication&lt;br /&gt;
* Session management&lt;br /&gt;
* Authorization&lt;br /&gt;
* Cryptography&lt;br /&gt;
* Cornucopia&lt;br /&gt;
&lt;br /&gt;
Each suit contains 13 cards (Ace, 2-10, Jack, Queen and King) but, unlike EoP, there are also two Joker cards. The content was mainly drawn from the SCP. Full [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]].&lt;br /&gt;
&lt;br /&gt;
''Other Decks''&lt;br /&gt;
&lt;br /&gt;
Future editions such as for mobile app development will use different sources of information and suits.&lt;br /&gt;
&lt;br /&gt;
==Mappings==&lt;br /&gt;
The other driver for Cornucopia is to link the attacks with requirements and verification techniques. An initial aim had been to reference [http://cwe.mitre.org/ CWE] weakness IDs, but these proved too numerous, and instead it was decided to map each card to [http://capec.mitre.org/ CAPEC] software attack pattern IDs which themselves are mapped to CWEs, so the desired result is achieved.&lt;br /&gt;
&lt;br /&gt;
Each card is also mapped to the 36 primary security stories in the [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode document], as well as to the OWASP [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide SCP v2], [https://www.owasp.org/images/3/33/OWASP_Application_Security_Verification_Standard_3.0.1.pdf ASVS v3.0.1] and [https://www.owasp.org/index.php/OWASP_AppSensor_Project AppSensor] (application attack detection and response) to help teams create their own security-related stories for use in Agile processes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Cornucopia is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] mentioned above, [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), [https://www.owasp.org/index.php/OWASP_Snakes_and_Ladders OWASP Snakes and Ladders], and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Cornucopia? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia is a card game used to help derive application security requirements during the software development life cycle. To start using Cornucopia:&lt;br /&gt;
&lt;br /&gt;
* Download the document&lt;br /&gt;
* Print the cards onto plain paper or pre-scored card&lt;br /&gt;
* Cut/separate the individual cards&lt;br /&gt;
* Identify an application, module or component to assess&lt;br /&gt;
* Invite business owners, architects, developers, testers along for a card game&lt;br /&gt;
* Get those infosec folk to provide chocolate, pizza, beer, flowers or all four as prizes&lt;br /&gt;
* Select a portion of the deck to start with&lt;br /&gt;
* {{#switchtablink:How to Play|Play the game}} to discuss &amp;amp;amp; document security requirements (and to win rounds)&lt;br /&gt;
* Remember, points make prizes!&lt;br /&gt;
&lt;br /&gt;
Listen to the [http://trustedsoftwarealliance.com/2014/03/21/the-owasp-cornucopia-project-with-colin-watson/ OWASP 24/7 Podcast] about Cornucopia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-presentation-small.jpg|link=media:Owaspnl-colinwatson-cornucopia.odp]]&lt;br /&gt;
&lt;br /&gt;
The game rules are in the document download. But the OpenOffice [[media:Owasplondon-colinwatson-cornucopia.odp|project presentation]] includes an animated version of four demonstration rounds. The presentation is recorded [http://youtu.be/Q_LE-8xNXVk on video].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dariodf Darío De Filippis] [mailto:dariodefilippis@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://youtu.be/i5Y0akWj31k How to Play] video&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Cornucopia-scoresheet.pdf Scoresheet]&lt;br /&gt;
* {{#switchtablink:Get the Cards|All sources and downloads...}}&lt;br /&gt;
&lt;br /&gt;
== Reference Files ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:OWASP_SCP_Quick_Reference_Guide_v2.pdf OWASP SCP requirements]&lt;br /&gt;
* [https://www.owasp.org/images/5/58/OWASP_ASVS_Version_2.pdf OWASP ASVS verification IDs]&lt;br /&gt;
* [https://www.owasp.org/index.php/AppSensor_DetectionPoints OWASP AppSensor attack detection point IDs] &lt;br /&gt;
* [http://capec.mitre.org/data/archive/capec_v1.7.1.zip CAPEC IDs]&lt;br /&gt;
* [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode security-focused story IDs]&lt;br /&gt;
&lt;br /&gt;
The OWASP SCP does not include identity values for the requirements, so please use [https://www.owasp.org/index.php/File:Owasp-requirements-numbering.zip this list].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [14 May 2018] Printed deck purchase details updated&lt;br /&gt;
* [23 Aug 2016] Presentation at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [29 Jun 2016] v1.20 released&lt;br /&gt;
* [21 Jan 2016] [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]] published&lt;br /&gt;
* [30 Dec 2015] Darío De Filippis becomes project co-leader&lt;br /&gt;
* [24 Sep 2015] [http://appsecusa2015.sched.org/event/7f3dba889c0ec9e37900e289c9660503#.VZ6aoXhflNY Lightning training] at AppSec USA 2015&lt;br /&gt;
* [01 Jun 2015] [https://youtu.be/i5Y0akWj31k How to Play video] published&lt;br /&gt;
* [20 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - How to play video&lt;br /&gt;
* [31 Mar 2015] v1.10 released&lt;br /&gt;
* [02 Mar 2015] Decks available from [https://www.owasp.org/index.php/OWASP_Merchandise#Cornucopia_Cards OWASP merchandise store]&lt;br /&gt;
* [18 Feb 2015] Project awarded Labs status&lt;br /&gt;
&lt;br /&gt;
==PCIDSS==&lt;br /&gt;
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia Ecommerce Website Edition is referenced in the current [https://www.pcisecuritystandards.org Payment Card Industry Security Standards Council]  information supplement [https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf PCI DSS E-commerce Guidelines] v2, January 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Get the Cards =&lt;br /&gt;
&lt;br /&gt;
==Printed==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-square-logo-350.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Professionally printed decks are available by two methods:&lt;br /&gt;
* Single decks or in bulk from OWASP (v1.20)&lt;br /&gt;
** As promotion items '''by OWASP Leaders''' from their own chapter budgets [https://docs.google.com/a/owasp.org/forms/d/e/1FAIpQLSez9mV97HuqvYhCldE2hYhX3UjQM1oO5bLy44HkOZSpni0OzQ/viewform?formkey=dF85bGtvdWdrd2JjYldNZ1gxSkJxaEE6MQ Chapter and Project Merchandise Request form]&lt;br /&gt;
** For other individuals, organisations and companies, please email [mailto:dawn.aitken@owasp.org dawn.aitken@owasp.org] with purchase enquiries&lt;br /&gt;
* Request a free deck of cards gifted by [http://blackfootuk.com/ Blackfoot UK Limited] or download their donated print-ready artwork:&lt;br /&gt;
** Request a free [http://blackfootuk.com/cornucopia/receive-a-set-of-cards/ pack of cards (v1.10)] (gifted by Blackfoot UK)&lt;br /&gt;
&lt;br /&gt;
==Source files==&lt;br /&gt;
&lt;br /&gt;
Cornucopia - Ecommerce Website Edition:&lt;br /&gt;
* v1.20 (current version)&lt;br /&gt;
** [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx EN DOC] | [https://github.com/grandtom/OWASP-Cornucopia-Translate-Cards---FR FR DOC]&lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf EN PDF]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.10 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki]]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjb283ZE5GNmFMM2FGWGl2WC14aDJDQ0ZsNk00 Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.04 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/cornucopia-ecom-1v04-blackfoot.zip Print-Ready design files]  (gifted by Blackfoot UK) 47Mb Zip&lt;br /&gt;
&lt;br /&gt;
The current version of Cornucopia Ecommerce Website Edition cards (v1.20 with updated mapping to ASVS v3.0.1 and CAPEC v2.8, and has some minor text changes on the cards) can be self-printed using the following methods:&lt;br /&gt;
# Download and self-print the free [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx word-processing document] or [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf PDF]&lt;br /&gt;
## Print the document onto business card blank cards; or&lt;br /&gt;
## Print the document onto normal card and cut the cards out individually using the guide; or&lt;br /&gt;
# Generate your own cards from the free [https://www.owasp.org/index.php/File:Cornucopia-deck-ecommercewebsite-XML.zip source XML data file]&lt;br /&gt;
&lt;br /&gt;
There are also other ways to obtain particular versions:&lt;br /&gt;
* Download the free [https://www.owasp.org/index.php/File:Owasp_cornucopia_printreadyimages.zip PDF (v1.03)] (gifted by Travelex) &lt;br /&gt;
** Have the cards commercially printed; or&lt;br /&gt;
** Import into your own files (such as [http://lists.owasp.org/pipermail/owasp_cornucopia/2014-January/000018.html this way] suggested by Cam Morris via the mailing list)&lt;br /&gt;
&lt;br /&gt;
OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
Collect/share/use the pseudo-random cards tweeted twice daily [https://twitter.com/OWASPCornucopia @OWASPCornucopia]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How to Play =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-cornucopia-K.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-session-9.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
It is possible to play Cornucopia in many different ways. Here is one way, and explained in a [https://youtu.be/i5Y0akWj31k YouTube video].&lt;br /&gt;
&lt;br /&gt;
== Primary method ==&lt;br /&gt;
&lt;br /&gt;
;A - Preparations&lt;br /&gt;
:A1.	Obtain a deck, or print your own Cornucopia deck and separate/cut out the cards&lt;br /&gt;
:A2.	Identify an application or application process to review; this might be a concept, design or an actual implementation&lt;br /&gt;
:A3.	Create a data flow diagram&lt;br /&gt;
:A4.	Identify and invite a group of 3-6 architects, developers, testers and other business stakeholders together and sit around a table (try to include someone fairly familiar with application security)&lt;br /&gt;
:A5.	Have some prizes to hand (gold stars, chocolate, pizza, beer or flowers depending upon your office culture)&lt;br /&gt;
;B - Play&lt;br /&gt;
:One suit - Cornucopia - acts as trumps. Aces are high (i.e. they beat Kings). It helps if there is someone dedicated to documenting the results who is not playing.&lt;br /&gt;
:B1.	Remove the Jokers and a few low-score (2, 3, 4) cards from Cornucopia suit to ensure each player will have the same number of cards&lt;br /&gt;
:B2.	Shuffle the pack and deal all the cards&lt;br /&gt;
:B3.	To begin, choose a player randomly who will play the first card - they can play any card from their hand except from the trump suit - Cornucopia&lt;br /&gt;
:B4.	To play a card, each player must read it out aloud, and explain how (or not) the threat could apply (the player gets a point for attacks that work, and the group thinks it is an actionable bug) - don’t try to think of mitigations at this stage, and don’t exclude a threat just because it is believed it is already mitigated - someone record the card on the score sheet&lt;br /&gt;
:B5.	Play clockwise, each person must play a card in the same way; if you have any card of the matching lead suit you must play one of those, otherwise they can play a card from any other suit. Only a higher card of the same suit, or the highest card in the trump suit Cornucopia, wins the hand.&lt;br /&gt;
:B6.	The person who wins the round, leads the next round (i.e. they play first), and thus defines the next lead suit&lt;br /&gt;
:B7.	Repeat until all the cards are played&lt;br /&gt;
;C - Scoring&lt;br /&gt;
:The objective is to identify applicable threats, and win hands (rounds):&lt;br /&gt;
:C1.	Score +1 for each card you can identify as a valid threat to the application under consideration&lt;br /&gt;
:C2.	Score +1 if you win a round&lt;br /&gt;
:C3.	Once all cards have been played, whoever has the most points wins&lt;br /&gt;
;D - Closure&lt;br /&gt;
:D1.	Review all the applicable threats and the matching security requirements&lt;br /&gt;
:D2.	Create user stories, specifications and test cases as required for your development methodology&lt;br /&gt;
&lt;br /&gt;
==Alternative game rules==&lt;br /&gt;
&lt;br /&gt;
* If you are new to the game, remove the two Joker cards to begin with. Add the Joker cards back in once people become more familiar with the process. Apart from the “trumps card game” rules described above which are very similar to the EoP, the deck can also be played as the “twenty-one card game” (also known as “pontoon” or “blackjack”) which normally reduces the number of cards played in each round.&lt;br /&gt;
* Practice on an imaginary application, or even a future planned application, rather than trying to find fault with existing applications until the participants are happy with the usefulness of the game.&lt;br /&gt;
* Consider just playing with one suit to make a shorter session – but try to cover all the suits for every project. Or even better just play one hand with some pre-selected cards, and score only on the ability to identify security requirements. Perhaps have one game of each suit each day for a week or so, if the participants cannot spare long enough for a full deck.&lt;br /&gt;
* Some teams have preferred to play a full hand of cards, and then discuss what is on the cards after each round (instead of after each person plays a card).&lt;br /&gt;
* Another suggestion is that if a player fails to identify the card is relevant, allow other players to suggest ideas, and potentially let them gain the point for the card. Consider allowing extra points for especially good contributions.&lt;br /&gt;
* You can even play by yourself. Just use the cards to act as thought-provokers. Involving more people will be beneficial though.&lt;br /&gt;
* In Microsoft's EoP guidance, they recommend cheating as a good game strategy&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authorization-8.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-cryptography-j.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
; Can I copy or edit the game?&lt;br /&gt;
:Yes of course. All OWASP materials are free to do with as you like provided you comply with the Creative Commons Attribution-ShareAlike 3.0 license. Perhaps if you create a new version, you might donate it to the OWASP Cornucopia Project?&lt;br /&gt;
&lt;br /&gt;
; How can I get involved?&lt;br /&gt;
: Please send ideas or offers of help to the project’s mailing list.&lt;br /&gt;
&lt;br /&gt;
; How were the attackers’ names chosen?&lt;br /&gt;
: EoP begins every description with words like &amp;quot;An attacker can...&amp;quot;. These have to be phrased as an attack but I was not keen on the anonymous terminology, wanting something more engaging, and therefore used personal names. These can be thought of as external or internal people or aliases for computer systems. But instead of just random names, I thought how they might reflect the OWASP community aspect. Therefore, apart from &amp;quot;Alice and Bob&amp;quot;, I use the given (first) names of current and recent OWASP employees and Board members (assigned in no order), and then randomly selected the remaining 50 or so names from the current list of paying individual OWASP members. No name was used more than once, and where people had provided two personal names, I dropped one part to try to ensure no-one can be easily identified. Names were not deliberately allocated to any particular attack, defence or requirement. The cultural and gender mix simply reflects theses sources of names, and is not meant to be world-representative.&lt;br /&gt;
&lt;br /&gt;
; Why aren’t there any images on the card faces?&lt;br /&gt;
: There is quite a lot of text on the cards, and the cross-referencing takes up space too. But it would be great to have additional design elements included. Any volunteers?&lt;br /&gt;
&lt;br /&gt;
; Are the attacks ranked by the number on the card?&lt;br /&gt;
: Only approximately. The risk will be application and organisation dependent, due to varying security and compliance requirements, so your own severity rating may place the cards in some other order than the numbers on the cards.&lt;br /&gt;
&lt;br /&gt;
; How long does it take to play a round of cards using the full deck?&lt;br /&gt;
: This depends upon the amount of discussion and how familiar the players are with application security concepts. But perhaps allow 1.5 to 2.0 hours for 4-6 people.&lt;br /&gt;
&lt;br /&gt;
; What sort of people should play the game?&lt;br /&gt;
:Always try to have a mix of roles who can contribute alternative perspectives. But include someone who has a reasonable knowledge of application vulnerability terminology. Otherwise try to include a mix of architects, developers, testers and a relevant project manager or business owner.&lt;br /&gt;
&lt;br /&gt;
; Who should take notes and record scores?&lt;br /&gt;
: It is better if that someone else, not playing the game, takes notes about the requirements identified and issues discussed. This could be used as training for a more junior developer, or performed by the project manager. Some organisations have made a recording to review afterwards when the requirements are written up more formally.&lt;br /&gt;
&lt;br /&gt;
; Should we always use the full deck of cards?&lt;br /&gt;
: No. A smaller deck is quicker to play. Start your first game with only enough cards for two or three rounds. Always consider removing cards that are not appropriate at all of the target application or function being reviewed. For the first few times people play the game it is also usually better to remove the Aces and the two Jokers. It is also usual to play the game without any trumps suit until people are more familiar with the idea.&lt;br /&gt;
&lt;br /&gt;
; What should players do when they have an Ace card that says “invented a new X attack”?&lt;br /&gt;
: The player can make up any attack they think is valid, but must match the suit of the card e.g. data validation and encoding). With players new to the game, it can be better to remove these to begin with.&lt;br /&gt;
&lt;br /&gt;
; I don’t understand what the attack means on each card - is there more detailed information?&lt;br /&gt;
: Yes, the Wiki Deck at was created to help players understand the attacks. See [https://www.owasp.org/index.php/Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck Wiki Deck].&lt;br /&gt;
&lt;br /&gt;
; My company wants to print its own version of OWASP Cornucopia - what license do we need to refer to?&lt;br /&gt;
: What is required/reasonable might depend upon how you propose to use the source Cornucopia material. See fuller answer immediately below.&lt;br /&gt;
&lt;br /&gt;
Some examples of re-using or reproducing Cornucopia are:&lt;br /&gt;
&lt;br /&gt;
# Print some decks and give them away to customers&lt;br /&gt;
# Reproduce the game exactly but with a corporate-branded package&lt;br /&gt;
# Use the idea and/or source files to produce a similar game but with different attacks/mappings&lt;br /&gt;
# Distribute modified design files&lt;br /&gt;
&lt;br /&gt;
If option 1 above, you can order these in bulk from OWASP and attach your own details below the &amp;quot;compliments of&amp;quot; section on the boxes. There are three aspects to consider for options 2, 3 or 4, or combinations of those - see below. The existing printed decks (and their boxes and leaflets include such text).&lt;br /&gt;
&lt;br /&gt;
''A - Cornucopia License''&lt;br /&gt;
&lt;br /&gt;
The precise wording will depend how the material is being used or reproduced. Under Creative Commons Attribution-ShareAlike 3.0 license it is necessary to attribute all previous contributions (in this case, Microsoft, Boeing, Mitre, etc). The easiest place to put the wording is on the leaflet (folded inside, or separate booklet). The current required long-form wording is:&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license http://creativecommons.org/licenses/by-sa/3.0/&lt;br /&gt;
&lt;br /&gt;
  The files used to create these materials were created from the OWASP project and are also open source, and are licensed under the same conditions. &lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia can be downloaded for free from the OWASP website and printed yourself. The OWASP Cornucopia project source in vendor neutral and unbranded.&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  © 2012-2016 OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
  This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license.&lt;br /&gt;
&lt;br /&gt;
  Acknowledgments:&lt;br /&gt;
&lt;br /&gt;
  Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
&lt;br /&gt;
  Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
&lt;br /&gt;
  Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
&lt;br /&gt;
  Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
&lt;br /&gt;
  Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
&lt;br /&gt;
  Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
&lt;br /&gt;
  Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
The box/container for the cards must have the wording:&lt;br /&gt;
&lt;br /&gt;
  Created by Colin Watson.&lt;br /&gt;
&lt;br /&gt;
  Contains: One pack of Cornucopia Ecommerce Website playing cards. OWASP Cornucopia is open source and can be downloaded free of charge from the OWASP website.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
The following short-form wording must also appear on any materials referencing the outputs (e.g. press releases, leaflets, reports, blog posts):&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license and is © 2012-2016 OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
If any files are distributed electronically, the long-form wording should also be aded in a license.txt file within the distribution.&lt;br /&gt;
&lt;br /&gt;
If the intention is to use the idea only (option 3 above), the long-form, box and short-form wording might be different, and probably simpler. And it might make more sense to start with the Microsoft-provided Elevation of Privilege files (and open source license).&lt;br /&gt;
&lt;br /&gt;
''B - Upcoming update to Cornucopia''&lt;br /&gt;
&lt;br /&gt;
Note that the current print design files are v1.04, and the current Word document is v1.10, but we are in the process of updating all of these to v1.20.&lt;br /&gt;
&lt;br /&gt;
Whatever is used as a starting point, please state the source version, for example: &lt;br /&gt;
&lt;br /&gt;
  Based on OWASP Cornucopia Ecommerce Website Edition v1.04&lt;br /&gt;
&lt;br /&gt;
''C - OWASP brand usage''&lt;br /&gt;
&lt;br /&gt;
Additionally individuals, companies and other organisations must not breach OWASP's brand usage guidelines. &lt;br /&gt;
&lt;br /&gt;
  https://www.owasp.org/index.php/Marketing/Resources#tab=BRAND_GUIDELINES&lt;br /&gt;
&lt;br /&gt;
In the case of Cornucopia, in 2014 Blackfoot Limited produced some printed decks of cards. Blackfoot's name and logo did not appear anywhere on the OWASP-branded cards, and the OWASP logo did not appear on the Blackfoot-branded box and leaflet. In fact there is no OWASP logo on any part of the Blackfoot branded decks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-data-A.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Cornucopia is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Oana Cornea&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Todd Dahl&lt;br /&gt;
* Luis Enriquez&lt;br /&gt;
* Ken Ferris&lt;br /&gt;
* Darío De Filippis&lt;br /&gt;
* Sebastien Gioria&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Timo Goosen&lt;br /&gt;
* Anthony Harrison&lt;br /&gt;
* John Herrlin&lt;br /&gt;
* Jerry Hoff&lt;br /&gt;
* Marios Kourtesis&lt;br /&gt;
* Antonis Manaras&lt;br /&gt;
* Jim Manico&lt;br /&gt;
* Mark Miller&lt;br /&gt;
* Cam Morris&lt;br /&gt;
* Susana Romaniz&lt;br /&gt;
* Ravishankar Sahadevan&lt;br /&gt;
* Tao Sauvage&lt;br /&gt;
* Stephen de Vries&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
Also:&lt;br /&gt;
&lt;br /&gt;
* Attendees at OWASP London, OWASP Manchester and OWASP Netherlands chapter meetings, the London Gamification meetup, and the training at AppSec USA 2015 in san Francisco who made helpful suggestions and asked challenging questions&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
* Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
* Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
* Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
* Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
* Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
* Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authentication-7.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-joker-a.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Version history (see [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx uploads]):&lt;br /&gt;
* Alpha version (0.40) was issued in August 2012&lt;br /&gt;
* Beta version (1.00) was released in February 2013&lt;br /&gt;
* Stable release (1.02) was released in August 2013, following feedback from mailing list and use with groups of developers&lt;br /&gt;
* Release v1.03 included minor changes&lt;br /&gt;
* Release v1.04 included a text correction on one card&lt;br /&gt;
* Release v1.05 included additional narrative and FAQs&lt;br /&gt;
* Current release v1.10 included cross-references updated for 2014 version of ASVS, contributors updated and minor text changes to cards to improve readability&lt;br /&gt;
* Current release v1.20 included cross-references updated for version 3.0.1 of ASVS and CAPEC v2.8, and many minor text changes including further contributors.&lt;br /&gt;
&lt;br /&gt;
As of May 2016, the priorities are:&lt;br /&gt;
* &amp;lt;strike&amp;gt;Develop Cornucopia Wiki Deck&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Update the document/deck to shorten some card text [completed ready for v1.10]&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVS 2014&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVSv3 2016&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check/update CAPEC mappings&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Translate into French (Started in June 2015 by [[User:SebastienGioria]] ) , Japanese, Spanish (almost complete May 2016) and other languages (help needed please) - German in progress (from June 2014)&lt;br /&gt;
* &amp;lt;strike&amp;gt;Make card decks available via OWASP Merchandise Store&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create a video &amp;quot;how to play&amp;quot;&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Update printed decks in OWASP Merchandise Store to v1.20 in both EN and ES languages&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Cornucopia is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Cornucopia into that language?&lt;br /&gt;
==Use and Promote the Cornucopia Card Decks==&lt;br /&gt;
Please help raise awareness of Cornucopia by printing cards:&lt;br /&gt;
* Use Cornucopia with specifiers, architects, designers, developers, testers and others, in part to train them, but also to solicit feedback on their usability, practicality and appropriateness for their work&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a mobile app to play the game&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What cards don't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other decks would you like to see?&lt;br /&gt;
==Keep the Cards Updated==&lt;br /&gt;
As the source referenced documents change, we have to update the decks. You may also find errors and omissions. In the first instance, please send a message to the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] if you have identified errors &amp;amp;amp; omissions, have some time to maintain the source documents, or can help in other ways.&lt;br /&gt;
==Create a New Deck==&lt;br /&gt;
The only version currently available is the Cornucopia Ecommerce Website Edition in English. We would like to create a new mobile app specific deck, probably using the wonderful [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] as inspiration for the card source materials. Do you have an idea for your own application security requirements card deck? Perhaps for {{#switchtablink:Mobile App Edition|mobile apps}} or something else?&lt;br /&gt;
&lt;br /&gt;
= About Ecommerce Website Edition =&lt;br /&gt;
{{:Projects/OWASP Cornucopia Ecommerce Website Edition | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]] &lt;br /&gt;
[[Category: Threat_Modeling]] &lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:SAMM-SR-1]] &lt;br /&gt;
[[Category:SAMM-SR-2]] &lt;br /&gt;
[[Category:SAMM-TA-1]] &lt;br /&gt;
[[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=240700</id>
		<title>OWASP Cornucopia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=240700"/>
				<updated>2018-05-14T11:10:44Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Source files */ Removed wiki deck bullet from v1.20&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cornucopia-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#Lab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Cornucopia==&lt;br /&gt;
OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology agnostic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
The idea behind Cornucopia is to help development teams, especially those using Agile methodologies, to identify application security requirements and develop security-based user stories. Although the idea had been waiting for enough time to progress it, the final motivation came when [http://www.safecode.org/ SAFECode] published its [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf Practical Security Stories and Security Tasks for Agile Development Environments] in July 2012.&lt;br /&gt;
&lt;br /&gt;
The Microsoft SDL team had already published its super [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] (EoP) but that did not seem to address the most appropriate kind of issues that web application development teams mostly have to address. EoP is a great concept and game strategy, and was [http://blogs.msdn.com/b/sdl/archive/2010/03/02/announcing-elevation-of-privilege-the-threat-modeling-game.aspx published under] a [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License].&lt;br /&gt;
Cornucopia {{#switchtablink:Ecommerce Website Edition|Ecommerce Website Edition}} is based the concepts and game ideas in EoP, but those have been modified to be more relevant to the types of issues ecommerce website developers encounter. It attempts to introduce threat-modelling ideas into development teams that use Agile methodologies, or are more focused on web application weaknesses than other types of software vulnerabilities or are not familiar with STRIDE and DREAD.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The Card Decks==&lt;br /&gt;
&lt;br /&gt;
''Ecommerce Website Edition''&lt;br /&gt;
&lt;br /&gt;
Instead of EoP’s STRIDE suits, Cornucopia suits were selected based on the structure of the [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide] (SCP), but with additional consideration of sections in the [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard], the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide] and David Rook’s [http://www.securityninja.co.uk/secure-development/the-principles-place/ Principles of Secure Development]. These provided five suits, and a sixth called “Cornucopia” was created for everything else: &lt;br /&gt;
&lt;br /&gt;
* Data validation and encoding&lt;br /&gt;
* Authentication&lt;br /&gt;
* Session management&lt;br /&gt;
* Authorization&lt;br /&gt;
* Cryptography&lt;br /&gt;
* Cornucopia&lt;br /&gt;
&lt;br /&gt;
Each suit contains 13 cards (Ace, 2-10, Jack, Queen and King) but, unlike EoP, there are also two Joker cards. The content was mainly drawn from the SCP. Full [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]].&lt;br /&gt;
&lt;br /&gt;
''Other Decks''&lt;br /&gt;
&lt;br /&gt;
Future editions such as for mobile app development will use different sources of information and suits.&lt;br /&gt;
&lt;br /&gt;
==Mappings==&lt;br /&gt;
The other driver for Cornucopia is to link the attacks with requirements and verification techniques. An initial aim had been to reference [http://cwe.mitre.org/ CWE] weakness IDs, but these proved too numerous, and instead it was decided to map each card to [http://capec.mitre.org/ CAPEC] software attack pattern IDs which themselves are mapped to CWEs, so the desired result is achieved.&lt;br /&gt;
&lt;br /&gt;
Each card is also mapped to the 36 primary security stories in the [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode document], as well as to the OWASP [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide SCP v2], [https://www.owasp.org/images/3/33/OWASP_Application_Security_Verification_Standard_3.0.1.pdf ASVS v3.0.1] and [https://www.owasp.org/index.php/OWASP_AppSensor_Project AppSensor] (application attack detection and response) to help teams create their own security-related stories for use in Agile processes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Cornucopia is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] mentioned above, [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), [https://www.owasp.org/index.php/OWASP_Snakes_and_Ladders OWASP Snakes and Ladders], and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Cornucopia? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia is a card game used to help derive application security requirements during the software development life cycle. To start using Cornucopia:&lt;br /&gt;
&lt;br /&gt;
* Download the document&lt;br /&gt;
* Print the cards onto plain paper or pre-scored card&lt;br /&gt;
* Cut/separate the individual cards&lt;br /&gt;
* Identify an application, module or component to assess&lt;br /&gt;
* Invite business owners, architects, developers, testers along for a card game&lt;br /&gt;
* Get those infosec folk to provide chocolate, pizza, beer, flowers or all four as prizes&lt;br /&gt;
* Select a portion of the deck to start with&lt;br /&gt;
* {{#switchtablink:How to Play|Play the game}} to discuss &amp;amp;amp; document security requirements (and to win rounds)&lt;br /&gt;
* Remember, points make prizes!&lt;br /&gt;
&lt;br /&gt;
Listen to the [http://trustedsoftwarealliance.com/2014/03/21/the-owasp-cornucopia-project-with-colin-watson/ OWASP 24/7 Podcast] about Cornucopia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-presentation-small.jpg|link=media:Owaspnl-colinwatson-cornucopia.odp]]&lt;br /&gt;
&lt;br /&gt;
The game rules are in the document download. But the OpenOffice [[media:Owasplondon-colinwatson-cornucopia.odp|project presentation]] includes an animated version of four demonstration rounds. The presentation is recorded [http://youtu.be/Q_LE-8xNXVk on video].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dariodf Darío De Filippis] [mailto:dariodefilippis@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://youtu.be/i5Y0akWj31k How to Play] video&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Cornucopia-scoresheet.pdf Scoresheet]&lt;br /&gt;
* {{#switchtablink:Get the Cards|All sources and downloads...}}&lt;br /&gt;
&lt;br /&gt;
== Reference Files ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:OWASP_SCP_Quick_Reference_Guide_v2.pdf OWASP SCP requirements]&lt;br /&gt;
* [https://www.owasp.org/images/5/58/OWASP_ASVS_Version_2.pdf OWASP ASVS verification IDs]&lt;br /&gt;
* [https://www.owasp.org/index.php/AppSensor_DetectionPoints OWASP AppSensor attack detection point IDs] &lt;br /&gt;
* [http://capec.mitre.org/data/archive/capec_v1.7.1.zip CAPEC IDs]&lt;br /&gt;
* [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode security-focused story IDs]&lt;br /&gt;
&lt;br /&gt;
The OWASP SCP does not include identity values for the requirements, so please use [https://www.owasp.org/index.php/File:Owasp-requirements-numbering.zip this list].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [14 May 2018] Printed deck purchase details updated&lt;br /&gt;
* [23 Aug 2016] Presentation at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [29 Jun 2016] v1.20 released&lt;br /&gt;
* [21 Jan 2016] [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]] published&lt;br /&gt;
* [30 Dec 2015] Darío De Filippis becomes project co-leader&lt;br /&gt;
* [24 Sep 2015] [http://appsecusa2015.sched.org/event/7f3dba889c0ec9e37900e289c9660503#.VZ6aoXhflNY Lightning training] at AppSec USA 2015&lt;br /&gt;
* [01 Jun 2015] [https://youtu.be/i5Y0akWj31k How to Play video] published&lt;br /&gt;
* [20 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - How to play video&lt;br /&gt;
* [31 Mar 2015] v1.10 released&lt;br /&gt;
* [02 Mar 2015] Decks available from [https://www.owasp.org/index.php/OWASP_Merchandise#Cornucopia_Cards OWASP merchandise store]&lt;br /&gt;
* [18 Feb 2015] Project awarded Labs status&lt;br /&gt;
&lt;br /&gt;
==PCIDSS==&lt;br /&gt;
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia Ecommerce Website Edition is referenced in the current [https://www.pcisecuritystandards.org Payment Card Industry Security Standards Council]  information supplement [https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf PCI DSS E-commerce Guidelines] v2, January 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Get the Cards =&lt;br /&gt;
&lt;br /&gt;
==Printed==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-square-logo-350.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Professionally printed decks are available by two methods:&lt;br /&gt;
* Single decks or in bulk from OWASP (v1.20)&lt;br /&gt;
** As promotion items '''by OWASP Leaders''' from their own chapter budgets [https://docs.google.com/a/owasp.org/forms/d/e/1FAIpQLSez9mV97HuqvYhCldE2hYhX3UjQM1oO5bLy44HkOZSpni0OzQ/viewform?formkey=dF85bGtvdWdrd2JjYldNZ1gxSkJxaEE6MQ Chapter and Project Merchandise Request form]&lt;br /&gt;
** For other individuals, organisations and companies, please email [mailto:dawn.aitken@owasp.org dawn.aitken@owasp.org] with purchase enquiries&lt;br /&gt;
* Request a free deck of cards gifted by [http://blackfootuk.com/ Blackfoot UK Limited] or download their donated print-ready artwork:&lt;br /&gt;
** Request a free [http://blackfootuk.com/cornucopia/receive-a-set-of-cards/ pack of cards (v1.10)] (gifted by Blackfoot UK)&lt;br /&gt;
&lt;br /&gt;
==Source files==&lt;br /&gt;
&lt;br /&gt;
Cornucopia - Ecommerce Website Edition:&lt;br /&gt;
* v1.20 EN (current version)&lt;br /&gt;
** [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx DOC] &lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf PDF]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.10 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki]]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjb283ZE5GNmFMM2FGWGl2WC14aDJDQ0ZsNk00 Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.04 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/cornucopia-ecom-1v04-blackfoot.zip Print-Ready design files]  (gifted by Blackfoot UK) 47Mb Zip&lt;br /&gt;
&lt;br /&gt;
The current version of Cornucopia Ecommerce Website Edition cards (v1.20 with updated mapping to ASVS v3.0.1 and CAPEC v2.8, and has some minor text changes on the cards) can be self-printed using the following methods:&lt;br /&gt;
# Download and self-print the free [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx word-processing document] or [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf PDF]&lt;br /&gt;
## Print the document onto business card blank cards; or&lt;br /&gt;
## Print the document onto normal card and cut the cards out individually using the guide; or&lt;br /&gt;
# Generate your own cards from the free [https://www.owasp.org/index.php/File:Cornucopia-deck-ecommercewebsite-XML.zip source XML data file]&lt;br /&gt;
&lt;br /&gt;
There are also other ways to obtain particular versions:&lt;br /&gt;
* Download the free [https://www.owasp.org/index.php/File:Owasp_cornucopia_printreadyimages.zip PDF (v1.03)] (gifted by Travelex) &lt;br /&gt;
** Have the cards commercially printed; or&lt;br /&gt;
** Import into your own files (such as [http://lists.owasp.org/pipermail/owasp_cornucopia/2014-January/000018.html this way] suggested by Cam Morris via the mailing list)&lt;br /&gt;
&lt;br /&gt;
OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
Collect/share/use the pseudo-random cards tweeted twice daily [https://twitter.com/OWASPCornucopia @OWASPCornucopia]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How to Play =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-cornucopia-K.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-session-9.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
It is possible to play Cornucopia in many different ways. Here is one way, and explained in a [https://youtu.be/i5Y0akWj31k YouTube video].&lt;br /&gt;
&lt;br /&gt;
== Primary method ==&lt;br /&gt;
&lt;br /&gt;
;A - Preparations&lt;br /&gt;
:A1.	Obtain a deck, or print your own Cornucopia deck and separate/cut out the cards&lt;br /&gt;
:A2.	Identify an application or application process to review; this might be a concept, design or an actual implementation&lt;br /&gt;
:A3.	Create a data flow diagram&lt;br /&gt;
:A4.	Identify and invite a group of 3-6 architects, developers, testers and other business stakeholders together and sit around a table (try to include someone fairly familiar with application security)&lt;br /&gt;
:A5.	Have some prizes to hand (gold stars, chocolate, pizza, beer or flowers depending upon your office culture)&lt;br /&gt;
;B - Play&lt;br /&gt;
:One suit - Cornucopia - acts as trumps. Aces are high (i.e. they beat Kings). It helps if there is someone dedicated to documenting the results who is not playing.&lt;br /&gt;
:B1.	Remove the Jokers and a few low-score (2, 3, 4) cards from Cornucopia suit to ensure each player will have the same number of cards&lt;br /&gt;
:B2.	Shuffle the pack and deal all the cards&lt;br /&gt;
:B3.	To begin, choose a player randomly who will play the first card - they can play any card from their hand except from the trump suit - Cornucopia&lt;br /&gt;
:B4.	To play a card, each player must read it out aloud, and explain how (or not) the threat could apply (the player gets a point for attacks that work, and the group thinks it is an actionable bug) - don’t try to think of mitigations at this stage, and don’t exclude a threat just because it is believed it is already mitigated - someone record the card on the score sheet&lt;br /&gt;
:B5.	Play clockwise, each person must play a card in the same way; if you have any card of the matching lead suit you must play one of those, otherwise they can play a card from any other suit. Only a higher card of the same suit, or the highest card in the trump suit Cornucopia, wins the hand.&lt;br /&gt;
:B6.	The person who wins the round, leads the next round (i.e. they play first), and thus defines the next lead suit&lt;br /&gt;
:B7.	Repeat until all the cards are played&lt;br /&gt;
;C - Scoring&lt;br /&gt;
:The objective is to identify applicable threats, and win hands (rounds):&lt;br /&gt;
:C1.	Score +1 for each card you can identify as a valid threat to the application under consideration&lt;br /&gt;
:C2.	Score +1 if you win a round&lt;br /&gt;
:C3.	Once all cards have been played, whoever has the most points wins&lt;br /&gt;
;D - Closure&lt;br /&gt;
:D1.	Review all the applicable threats and the matching security requirements&lt;br /&gt;
:D2.	Create user stories, specifications and test cases as required for your development methodology&lt;br /&gt;
&lt;br /&gt;
==Alternative game rules==&lt;br /&gt;
&lt;br /&gt;
* If you are new to the game, remove the two Joker cards to begin with. Add the Joker cards back in once people become more familiar with the process. Apart from the “trumps card game” rules described above which are very similar to the EoP, the deck can also be played as the “twenty-one card game” (also known as “pontoon” or “blackjack”) which normally reduces the number of cards played in each round.&lt;br /&gt;
* Practice on an imaginary application, or even a future planned application, rather than trying to find fault with existing applications until the participants are happy with the usefulness of the game.&lt;br /&gt;
* Consider just playing with one suit to make a shorter session – but try to cover all the suits for every project. Or even better just play one hand with some pre-selected cards, and score only on the ability to identify security requirements. Perhaps have one game of each suit each day for a week or so, if the participants cannot spare long enough for a full deck.&lt;br /&gt;
* Some teams have preferred to play a full hand of cards, and then discuss what is on the cards after each round (instead of after each person plays a card).&lt;br /&gt;
* Another suggestion is that if a player fails to identify the card is relevant, allow other players to suggest ideas, and potentially let them gain the point for the card. Consider allowing extra points for especially good contributions.&lt;br /&gt;
* You can even play by yourself. Just use the cards to act as thought-provokers. Involving more people will be beneficial though.&lt;br /&gt;
* In Microsoft's EoP guidance, they recommend cheating as a good game strategy&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authorization-8.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-cryptography-j.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
; Can I copy or edit the game?&lt;br /&gt;
:Yes of course. All OWASP materials are free to do with as you like provided you comply with the Creative Commons Attribution-ShareAlike 3.0 license. Perhaps if you create a new version, you might donate it to the OWASP Cornucopia Project?&lt;br /&gt;
&lt;br /&gt;
; How can I get involved?&lt;br /&gt;
: Please send ideas or offers of help to the project’s mailing list.&lt;br /&gt;
&lt;br /&gt;
; How were the attackers’ names chosen?&lt;br /&gt;
: EoP begins every description with words like &amp;quot;An attacker can...&amp;quot;. These have to be phrased as an attack but I was not keen on the anonymous terminology, wanting something more engaging, and therefore used personal names. These can be thought of as external or internal people or aliases for computer systems. But instead of just random names, I thought how they might reflect the OWASP community aspect. Therefore, apart from &amp;quot;Alice and Bob&amp;quot;, I use the given (first) names of current and recent OWASP employees and Board members (assigned in no order), and then randomly selected the remaining 50 or so names from the current list of paying individual OWASP members. No name was used more than once, and where people had provided two personal names, I dropped one part to try to ensure no-one can be easily identified. Names were not deliberately allocated to any particular attack, defence or requirement. The cultural and gender mix simply reflects theses sources of names, and is not meant to be world-representative.&lt;br /&gt;
&lt;br /&gt;
; Why aren’t there any images on the card faces?&lt;br /&gt;
: There is quite a lot of text on the cards, and the cross-referencing takes up space too. But it would be great to have additional design elements included. Any volunteers?&lt;br /&gt;
&lt;br /&gt;
; Are the attacks ranked by the number on the card?&lt;br /&gt;
: Only approximately. The risk will be application and organisation dependent, due to varying security and compliance requirements, so your own severity rating may place the cards in some other order than the numbers on the cards.&lt;br /&gt;
&lt;br /&gt;
; How long does it take to play a round of cards using the full deck?&lt;br /&gt;
: This depends upon the amount of discussion and how familiar the players are with application security concepts. But perhaps allow 1.5 to 2.0 hours for 4-6 people.&lt;br /&gt;
&lt;br /&gt;
; What sort of people should play the game?&lt;br /&gt;
:Always try to have a mix of roles who can contribute alternative perspectives. But include someone who has a reasonable knowledge of application vulnerability terminology. Otherwise try to include a mix of architects, developers, testers and a relevant project manager or business owner.&lt;br /&gt;
&lt;br /&gt;
; Who should take notes and record scores?&lt;br /&gt;
: It is better if that someone else, not playing the game, takes notes about the requirements identified and issues discussed. This could be used as training for a more junior developer, or performed by the project manager. Some organisations have made a recording to review afterwards when the requirements are written up more formally.&lt;br /&gt;
&lt;br /&gt;
; Should we always use the full deck of cards?&lt;br /&gt;
: No. A smaller deck is quicker to play. Start your first game with only enough cards for two or three rounds. Always consider removing cards that are not appropriate at all of the target application or function being reviewed. For the first few times people play the game it is also usually better to remove the Aces and the two Jokers. It is also usual to play the game without any trumps suit until people are more familiar with the idea.&lt;br /&gt;
&lt;br /&gt;
; What should players do when they have an Ace card that says “invented a new X attack”?&lt;br /&gt;
: The player can make up any attack they think is valid, but must match the suit of the card e.g. data validation and encoding). With players new to the game, it can be better to remove these to begin with.&lt;br /&gt;
&lt;br /&gt;
; I don’t understand what the attack means on each card - is there more detailed information?&lt;br /&gt;
: Yes, the Wiki Deck at was created to help players understand the attacks. See [https://www.owasp.org/index.php/Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck Wiki Deck].&lt;br /&gt;
&lt;br /&gt;
; My company wants to print its own version of OWASP Cornucopia - what license do we need to refer to?&lt;br /&gt;
: What is required/reasonable might depend upon how you propose to use the source Cornucopia material. See fuller answer immediately below.&lt;br /&gt;
&lt;br /&gt;
Some examples of re-using or reproducing Cornucopia are:&lt;br /&gt;
&lt;br /&gt;
# Print some decks and give them away to customers&lt;br /&gt;
# Reproduce the game exactly but with a corporate-branded package&lt;br /&gt;
# Use the idea and/or source files to produce a similar game but with different attacks/mappings&lt;br /&gt;
# Distribute modified design files&lt;br /&gt;
&lt;br /&gt;
If option 1 above, you can order these in bulk from OWASP and attach your own details below the &amp;quot;compliments of&amp;quot; section on the boxes. There are three aspects to consider for options 2, 3 or 4, or combinations of those - see below. The existing printed decks (and their boxes and leaflets include such text).&lt;br /&gt;
&lt;br /&gt;
''A - Cornucopia License''&lt;br /&gt;
&lt;br /&gt;
The precise wording will depend how the material is being used or reproduced. Under Creative Commons Attribution-ShareAlike 3.0 license it is necessary to attribute all previous contributions (in this case, Microsoft, Boeing, Mitre, etc). The easiest place to put the wording is on the leaflet (folded inside, or separate booklet). The current required long-form wording is:&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license http://creativecommons.org/licenses/by-sa/3.0/&lt;br /&gt;
&lt;br /&gt;
  The files used to create these materials were created from the OWASP project and are also open source, and are licensed under the same conditions. &lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia can be downloaded for free from the OWASP website and printed yourself. The OWASP Cornucopia project source in vendor neutral and unbranded.&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  © 2012-2016 OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
  This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license.&lt;br /&gt;
&lt;br /&gt;
  Acknowledgments:&lt;br /&gt;
&lt;br /&gt;
  Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
&lt;br /&gt;
  Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
&lt;br /&gt;
  Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
&lt;br /&gt;
  Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
&lt;br /&gt;
  Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
&lt;br /&gt;
  Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
&lt;br /&gt;
  Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
The box/container for the cards must have the wording:&lt;br /&gt;
&lt;br /&gt;
  Created by Colin Watson.&lt;br /&gt;
&lt;br /&gt;
  Contains: One pack of Cornucopia Ecommerce Website playing cards. OWASP Cornucopia is open source and can be downloaded free of charge from the OWASP website.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
The following short-form wording must also appear on any materials referencing the outputs (e.g. press releases, leaflets, reports, blog posts):&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license and is © 2012-2016 OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
If any files are distributed electronically, the long-form wording should also be aded in a license.txt file within the distribution.&lt;br /&gt;
&lt;br /&gt;
If the intention is to use the idea only (option 3 above), the long-form, box and short-form wording might be different, and probably simpler. And it might make more sense to start with the Microsoft-provided Elevation of Privilege files (and open source license).&lt;br /&gt;
&lt;br /&gt;
''B - Upcoming update to Cornucopia''&lt;br /&gt;
&lt;br /&gt;
Note that the current print design files are v1.04, and the current Word document is v1.10, but we are in the process of updating all of these to v1.20.&lt;br /&gt;
&lt;br /&gt;
Whatever is used as a starting point, please state the source version, for example: &lt;br /&gt;
&lt;br /&gt;
  Based on OWASP Cornucopia Ecommerce Website Edition v1.04&lt;br /&gt;
&lt;br /&gt;
''C - OWASP brand usage''&lt;br /&gt;
&lt;br /&gt;
Additionally individuals, companies and other organisations must not breach OWASP's brand usage guidelines. &lt;br /&gt;
&lt;br /&gt;
  https://www.owasp.org/index.php/Marketing/Resources#tab=BRAND_GUIDELINES&lt;br /&gt;
&lt;br /&gt;
In the case of Cornucopia, in 2014 Blackfoot Limited produced some printed decks of cards. Blackfoot's name and logo did not appear anywhere on the OWASP-branded cards, and the OWASP logo did not appear on the Blackfoot-branded box and leaflet. In fact there is no OWASP logo on any part of the Blackfoot branded decks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-data-A.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Cornucopia is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Oana Cornea&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Todd Dahl&lt;br /&gt;
* Luis Enriquez&lt;br /&gt;
* Ken Ferris&lt;br /&gt;
* Darío De Filippis&lt;br /&gt;
* Sebastien Gioria&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Timo Goosen&lt;br /&gt;
* Anthony Harrison&lt;br /&gt;
* John Herrlin&lt;br /&gt;
* Jerry Hoff&lt;br /&gt;
* Marios Kourtesis&lt;br /&gt;
* Antonis Manaras&lt;br /&gt;
* Jim Manico&lt;br /&gt;
* Mark Miller&lt;br /&gt;
* Cam Morris&lt;br /&gt;
* Susana Romaniz&lt;br /&gt;
* Ravishankar Sahadevan&lt;br /&gt;
* Tao Sauvage&lt;br /&gt;
* Stephen de Vries&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
Also:&lt;br /&gt;
&lt;br /&gt;
* Attendees at OWASP London, OWASP Manchester and OWASP Netherlands chapter meetings, the London Gamification meetup, and the training at AppSec USA 2015 in san Francisco who made helpful suggestions and asked challenging questions&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
* Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
* Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
* Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
* Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
* Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
* Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authentication-7.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-joker-a.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Version history (see [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx uploads]):&lt;br /&gt;
* Alpha version (0.40) was issued in August 2012&lt;br /&gt;
* Beta version (1.00) was released in February 2013&lt;br /&gt;
* Stable release (1.02) was released in August 2013, following feedback from mailing list and use with groups of developers&lt;br /&gt;
* Release v1.03 included minor changes&lt;br /&gt;
* Release v1.04 included a text correction on one card&lt;br /&gt;
* Release v1.05 included additional narrative and FAQs&lt;br /&gt;
* Current release v1.10 included cross-references updated for 2014 version of ASVS, contributors updated and minor text changes to cards to improve readability&lt;br /&gt;
* Current release v1.20 included cross-references updated for version 3.0.1 of ASVS and CAPEC v2.8, and many minor text changes including further contributors.&lt;br /&gt;
&lt;br /&gt;
As of May 2016, the priorities are:&lt;br /&gt;
* &amp;lt;strike&amp;gt;Develop Cornucopia Wiki Deck&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Update the document/deck to shorten some card text [completed ready for v1.10]&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVS 2014&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVSv3 2016&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check/update CAPEC mappings&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Translate into French (Started in June 2015 by [[User:SebastienGioria]] ) , Japanese, Spanish (almost complete May 2016) and other languages (help needed please) - German in progress (from June 2014)&lt;br /&gt;
* &amp;lt;strike&amp;gt;Make card decks available via OWASP Merchandise Store&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create a video &amp;quot;how to play&amp;quot;&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Update printed decks in OWASP Merchandise Store to v1.20 in both EN and ES languages&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Cornucopia is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Cornucopia into that language?&lt;br /&gt;
==Use and Promote the Cornucopia Card Decks==&lt;br /&gt;
Please help raise awareness of Cornucopia by printing cards:&lt;br /&gt;
* Use Cornucopia with specifiers, architects, designers, developers, testers and others, in part to train them, but also to solicit feedback on their usability, practicality and appropriateness for their work&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a mobile app to play the game&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What cards don't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other decks would you like to see?&lt;br /&gt;
==Keep the Cards Updated==&lt;br /&gt;
As the source referenced documents change, we have to update the decks. You may also find errors and omissions. In the first instance, please send a message to the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] if you have identified errors &amp;amp;amp; omissions, have some time to maintain the source documents, or can help in other ways.&lt;br /&gt;
==Create a New Deck==&lt;br /&gt;
The only version currently available is the Cornucopia Ecommerce Website Edition in English. We would like to create a new mobile app specific deck, probably using the wonderful [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] as inspiration for the card source materials. Do you have an idea for your own application security requirements card deck? Perhaps for {{#switchtablink:Mobile App Edition|mobile apps}} or something else?&lt;br /&gt;
&lt;br /&gt;
= About Ecommerce Website Edition =&lt;br /&gt;
{{:Projects/OWASP Cornucopia Ecommerce Website Edition | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]] &lt;br /&gt;
[[Category: Threat_Modeling]] &lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:SAMM-SR-1]] &lt;br /&gt;
[[Category:SAMM-SR-2]] &lt;br /&gt;
[[Category:SAMM-TA-1]] &lt;br /&gt;
[[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=240699</id>
		<title>OWASP Cornucopia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=240699"/>
				<updated>2018-05-14T11:09:49Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* The Card Decks */ Link to wiki deck&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cornucopia-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#Lab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Cornucopia==&lt;br /&gt;
OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology agnostic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
The idea behind Cornucopia is to help development teams, especially those using Agile methodologies, to identify application security requirements and develop security-based user stories. Although the idea had been waiting for enough time to progress it, the final motivation came when [http://www.safecode.org/ SAFECode] published its [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf Practical Security Stories and Security Tasks for Agile Development Environments] in July 2012.&lt;br /&gt;
&lt;br /&gt;
The Microsoft SDL team had already published its super [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] (EoP) but that did not seem to address the most appropriate kind of issues that web application development teams mostly have to address. EoP is a great concept and game strategy, and was [http://blogs.msdn.com/b/sdl/archive/2010/03/02/announcing-elevation-of-privilege-the-threat-modeling-game.aspx published under] a [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License].&lt;br /&gt;
Cornucopia {{#switchtablink:Ecommerce Website Edition|Ecommerce Website Edition}} is based the concepts and game ideas in EoP, but those have been modified to be more relevant to the types of issues ecommerce website developers encounter. It attempts to introduce threat-modelling ideas into development teams that use Agile methodologies, or are more focused on web application weaknesses than other types of software vulnerabilities or are not familiar with STRIDE and DREAD.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The Card Decks==&lt;br /&gt;
&lt;br /&gt;
''Ecommerce Website Edition''&lt;br /&gt;
&lt;br /&gt;
Instead of EoP’s STRIDE suits, Cornucopia suits were selected based on the structure of the [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide] (SCP), but with additional consideration of sections in the [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard], the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide] and David Rook’s [http://www.securityninja.co.uk/secure-development/the-principles-place/ Principles of Secure Development]. These provided five suits, and a sixth called “Cornucopia” was created for everything else: &lt;br /&gt;
&lt;br /&gt;
* Data validation and encoding&lt;br /&gt;
* Authentication&lt;br /&gt;
* Session management&lt;br /&gt;
* Authorization&lt;br /&gt;
* Cryptography&lt;br /&gt;
* Cornucopia&lt;br /&gt;
&lt;br /&gt;
Each suit contains 13 cards (Ace, 2-10, Jack, Queen and King) but, unlike EoP, there are also two Joker cards. The content was mainly drawn from the SCP. Full [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]].&lt;br /&gt;
&lt;br /&gt;
''Other Decks''&lt;br /&gt;
&lt;br /&gt;
Future editions such as for mobile app development will use different sources of information and suits.&lt;br /&gt;
&lt;br /&gt;
==Mappings==&lt;br /&gt;
The other driver for Cornucopia is to link the attacks with requirements and verification techniques. An initial aim had been to reference [http://cwe.mitre.org/ CWE] weakness IDs, but these proved too numerous, and instead it was decided to map each card to [http://capec.mitre.org/ CAPEC] software attack pattern IDs which themselves are mapped to CWEs, so the desired result is achieved.&lt;br /&gt;
&lt;br /&gt;
Each card is also mapped to the 36 primary security stories in the [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode document], as well as to the OWASP [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide SCP v2], [https://www.owasp.org/images/3/33/OWASP_Application_Security_Verification_Standard_3.0.1.pdf ASVS v3.0.1] and [https://www.owasp.org/index.php/OWASP_AppSensor_Project AppSensor] (application attack detection and response) to help teams create their own security-related stories for use in Agile processes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Cornucopia is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] mentioned above, [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), [https://www.owasp.org/index.php/OWASP_Snakes_and_Ladders OWASP Snakes and Ladders], and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Cornucopia? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia is a card game used to help derive application security requirements during the software development life cycle. To start using Cornucopia:&lt;br /&gt;
&lt;br /&gt;
* Download the document&lt;br /&gt;
* Print the cards onto plain paper or pre-scored card&lt;br /&gt;
* Cut/separate the individual cards&lt;br /&gt;
* Identify an application, module or component to assess&lt;br /&gt;
* Invite business owners, architects, developers, testers along for a card game&lt;br /&gt;
* Get those infosec folk to provide chocolate, pizza, beer, flowers or all four as prizes&lt;br /&gt;
* Select a portion of the deck to start with&lt;br /&gt;
* {{#switchtablink:How to Play|Play the game}} to discuss &amp;amp;amp; document security requirements (and to win rounds)&lt;br /&gt;
* Remember, points make prizes!&lt;br /&gt;
&lt;br /&gt;
Listen to the [http://trustedsoftwarealliance.com/2014/03/21/the-owasp-cornucopia-project-with-colin-watson/ OWASP 24/7 Podcast] about Cornucopia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-presentation-small.jpg|link=media:Owaspnl-colinwatson-cornucopia.odp]]&lt;br /&gt;
&lt;br /&gt;
The game rules are in the document download. But the OpenOffice [[media:Owasplondon-colinwatson-cornucopia.odp|project presentation]] includes an animated version of four demonstration rounds. The presentation is recorded [http://youtu.be/Q_LE-8xNXVk on video].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dariodf Darío De Filippis] [mailto:dariodefilippis@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://youtu.be/i5Y0akWj31k How to Play] video&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Cornucopia-scoresheet.pdf Scoresheet]&lt;br /&gt;
* {{#switchtablink:Get the Cards|All sources and downloads...}}&lt;br /&gt;
&lt;br /&gt;
== Reference Files ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:OWASP_SCP_Quick_Reference_Guide_v2.pdf OWASP SCP requirements]&lt;br /&gt;
* [https://www.owasp.org/images/5/58/OWASP_ASVS_Version_2.pdf OWASP ASVS verification IDs]&lt;br /&gt;
* [https://www.owasp.org/index.php/AppSensor_DetectionPoints OWASP AppSensor attack detection point IDs] &lt;br /&gt;
* [http://capec.mitre.org/data/archive/capec_v1.7.1.zip CAPEC IDs]&lt;br /&gt;
* [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode security-focused story IDs]&lt;br /&gt;
&lt;br /&gt;
The OWASP SCP does not include identity values for the requirements, so please use [https://www.owasp.org/index.php/File:Owasp-requirements-numbering.zip this list].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [14 May 2018] Printed deck purchase details updated&lt;br /&gt;
* [23 Aug 2016] Presentation at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [29 Jun 2016] v1.20 released&lt;br /&gt;
* [21 Jan 2016] [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]] published&lt;br /&gt;
* [30 Dec 2015] Darío De Filippis becomes project co-leader&lt;br /&gt;
* [24 Sep 2015] [http://appsecusa2015.sched.org/event/7f3dba889c0ec9e37900e289c9660503#.VZ6aoXhflNY Lightning training] at AppSec USA 2015&lt;br /&gt;
* [01 Jun 2015] [https://youtu.be/i5Y0akWj31k How to Play video] published&lt;br /&gt;
* [20 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - How to play video&lt;br /&gt;
* [31 Mar 2015] v1.10 released&lt;br /&gt;
* [02 Mar 2015] Decks available from [https://www.owasp.org/index.php/OWASP_Merchandise#Cornucopia_Cards OWASP merchandise store]&lt;br /&gt;
* [18 Feb 2015] Project awarded Labs status&lt;br /&gt;
&lt;br /&gt;
==PCIDSS==&lt;br /&gt;
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia Ecommerce Website Edition is referenced in the current [https://www.pcisecuritystandards.org Payment Card Industry Security Standards Council]  information supplement [https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf PCI DSS E-commerce Guidelines] v2, January 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Get the Cards =&lt;br /&gt;
&lt;br /&gt;
==Printed==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-square-logo-350.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Professionally printed decks are available by two methods:&lt;br /&gt;
* Single decks or in bulk from OWASP (v1.20)&lt;br /&gt;
** As promotion items '''by OWASP Leaders''' from their own chapter budgets [https://docs.google.com/a/owasp.org/forms/d/e/1FAIpQLSez9mV97HuqvYhCldE2hYhX3UjQM1oO5bLy44HkOZSpni0OzQ/viewform?formkey=dF85bGtvdWdrd2JjYldNZ1gxSkJxaEE6MQ Chapter and Project Merchandise Request form]&lt;br /&gt;
** For other individuals, organisations and companies, please email [mailto:dawn.aitken@owasp.org dawn.aitken@owasp.org] with purchase enquiries&lt;br /&gt;
* Request a free deck of cards gifted by [http://blackfootuk.com/ Blackfoot UK Limited] or download their donated print-ready artwork:&lt;br /&gt;
** Request a free [http://blackfootuk.com/cornucopia/receive-a-set-of-cards/ pack of cards (v1.10)] (gifted by Blackfoot UK)&lt;br /&gt;
&lt;br /&gt;
==Source files==&lt;br /&gt;
&lt;br /&gt;
Cornucopia - Ecommerce Website Edition:&lt;br /&gt;
* v1.20 EN (current version)&lt;br /&gt;
** [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx DOC] &lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf PDF]&lt;br /&gt;
** Wiki Deck - coming soon&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.10 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki]]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjb283ZE5GNmFMM2FGWGl2WC14aDJDQ0ZsNk00 Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.04 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/cornucopia-ecom-1v04-blackfoot.zip Print-Ready design files]  (gifted by Blackfoot UK) 47Mb Zip&lt;br /&gt;
&lt;br /&gt;
The current version of Cornucopia Ecommerce Website Edition cards (v1.20 with updated mapping to ASVS v3.0.1 and CAPEC v2.8, and has some minor text changes on the cards) can be self-printed using the following methods:&lt;br /&gt;
# Download and self-print the free [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx word-processing document] or [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf PDF]&lt;br /&gt;
## Print the document onto business card blank cards; or&lt;br /&gt;
## Print the document onto normal card and cut the cards out individually using the guide; or&lt;br /&gt;
# Generate your own cards from the free [https://www.owasp.org/index.php/File:Cornucopia-deck-ecommercewebsite-XML.zip source XML data file]&lt;br /&gt;
&lt;br /&gt;
There are also other ways to obtain particular versions:&lt;br /&gt;
* Download the free [https://www.owasp.org/index.php/File:Owasp_cornucopia_printreadyimages.zip PDF (v1.03)] (gifted by Travelex) &lt;br /&gt;
** Have the cards commercially printed; or&lt;br /&gt;
** Import into your own files (such as [http://lists.owasp.org/pipermail/owasp_cornucopia/2014-January/000018.html this way] suggested by Cam Morris via the mailing list)&lt;br /&gt;
&lt;br /&gt;
OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
Collect/share/use the pseudo-random cards tweeted twice daily [https://twitter.com/OWASPCornucopia @OWASPCornucopia]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How to Play =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-cornucopia-K.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-session-9.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
It is possible to play Cornucopia in many different ways. Here is one way, and explained in a [https://youtu.be/i5Y0akWj31k YouTube video].&lt;br /&gt;
&lt;br /&gt;
== Primary method ==&lt;br /&gt;
&lt;br /&gt;
;A - Preparations&lt;br /&gt;
:A1.	Obtain a deck, or print your own Cornucopia deck and separate/cut out the cards&lt;br /&gt;
:A2.	Identify an application or application process to review; this might be a concept, design or an actual implementation&lt;br /&gt;
:A3.	Create a data flow diagram&lt;br /&gt;
:A4.	Identify and invite a group of 3-6 architects, developers, testers and other business stakeholders together and sit around a table (try to include someone fairly familiar with application security)&lt;br /&gt;
:A5.	Have some prizes to hand (gold stars, chocolate, pizza, beer or flowers depending upon your office culture)&lt;br /&gt;
;B - Play&lt;br /&gt;
:One suit - Cornucopia - acts as trumps. Aces are high (i.e. they beat Kings). It helps if there is someone dedicated to documenting the results who is not playing.&lt;br /&gt;
:B1.	Remove the Jokers and a few low-score (2, 3, 4) cards from Cornucopia suit to ensure each player will have the same number of cards&lt;br /&gt;
:B2.	Shuffle the pack and deal all the cards&lt;br /&gt;
:B3.	To begin, choose a player randomly who will play the first card - they can play any card from their hand except from the trump suit - Cornucopia&lt;br /&gt;
:B4.	To play a card, each player must read it out aloud, and explain how (or not) the threat could apply (the player gets a point for attacks that work, and the group thinks it is an actionable bug) - don’t try to think of mitigations at this stage, and don’t exclude a threat just because it is believed it is already mitigated - someone record the card on the score sheet&lt;br /&gt;
:B5.	Play clockwise, each person must play a card in the same way; if you have any card of the matching lead suit you must play one of those, otherwise they can play a card from any other suit. Only a higher card of the same suit, or the highest card in the trump suit Cornucopia, wins the hand.&lt;br /&gt;
:B6.	The person who wins the round, leads the next round (i.e. they play first), and thus defines the next lead suit&lt;br /&gt;
:B7.	Repeat until all the cards are played&lt;br /&gt;
;C - Scoring&lt;br /&gt;
:The objective is to identify applicable threats, and win hands (rounds):&lt;br /&gt;
:C1.	Score +1 for each card you can identify as a valid threat to the application under consideration&lt;br /&gt;
:C2.	Score +1 if you win a round&lt;br /&gt;
:C3.	Once all cards have been played, whoever has the most points wins&lt;br /&gt;
;D - Closure&lt;br /&gt;
:D1.	Review all the applicable threats and the matching security requirements&lt;br /&gt;
:D2.	Create user stories, specifications and test cases as required for your development methodology&lt;br /&gt;
&lt;br /&gt;
==Alternative game rules==&lt;br /&gt;
&lt;br /&gt;
* If you are new to the game, remove the two Joker cards to begin with. Add the Joker cards back in once people become more familiar with the process. Apart from the “trumps card game” rules described above which are very similar to the EoP, the deck can also be played as the “twenty-one card game” (also known as “pontoon” or “blackjack”) which normally reduces the number of cards played in each round.&lt;br /&gt;
* Practice on an imaginary application, or even a future planned application, rather than trying to find fault with existing applications until the participants are happy with the usefulness of the game.&lt;br /&gt;
* Consider just playing with one suit to make a shorter session – but try to cover all the suits for every project. Or even better just play one hand with some pre-selected cards, and score only on the ability to identify security requirements. Perhaps have one game of each suit each day for a week or so, if the participants cannot spare long enough for a full deck.&lt;br /&gt;
* Some teams have preferred to play a full hand of cards, and then discuss what is on the cards after each round (instead of after each person plays a card).&lt;br /&gt;
* Another suggestion is that if a player fails to identify the card is relevant, allow other players to suggest ideas, and potentially let them gain the point for the card. Consider allowing extra points for especially good contributions.&lt;br /&gt;
* You can even play by yourself. Just use the cards to act as thought-provokers. Involving more people will be beneficial though.&lt;br /&gt;
* In Microsoft's EoP guidance, they recommend cheating as a good game strategy&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authorization-8.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-cryptography-j.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
; Can I copy or edit the game?&lt;br /&gt;
:Yes of course. All OWASP materials are free to do with as you like provided you comply with the Creative Commons Attribution-ShareAlike 3.0 license. Perhaps if you create a new version, you might donate it to the OWASP Cornucopia Project?&lt;br /&gt;
&lt;br /&gt;
; How can I get involved?&lt;br /&gt;
: Please send ideas or offers of help to the project’s mailing list.&lt;br /&gt;
&lt;br /&gt;
; How were the attackers’ names chosen?&lt;br /&gt;
: EoP begins every description with words like &amp;quot;An attacker can...&amp;quot;. These have to be phrased as an attack but I was not keen on the anonymous terminology, wanting something more engaging, and therefore used personal names. These can be thought of as external or internal people or aliases for computer systems. But instead of just random names, I thought how they might reflect the OWASP community aspect. Therefore, apart from &amp;quot;Alice and Bob&amp;quot;, I use the given (first) names of current and recent OWASP employees and Board members (assigned in no order), and then randomly selected the remaining 50 or so names from the current list of paying individual OWASP members. No name was used more than once, and where people had provided two personal names, I dropped one part to try to ensure no-one can be easily identified. Names were not deliberately allocated to any particular attack, defence or requirement. The cultural and gender mix simply reflects theses sources of names, and is not meant to be world-representative.&lt;br /&gt;
&lt;br /&gt;
; Why aren’t there any images on the card faces?&lt;br /&gt;
: There is quite a lot of text on the cards, and the cross-referencing takes up space too. But it would be great to have additional design elements included. Any volunteers?&lt;br /&gt;
&lt;br /&gt;
; Are the attacks ranked by the number on the card?&lt;br /&gt;
: Only approximately. The risk will be application and organisation dependent, due to varying security and compliance requirements, so your own severity rating may place the cards in some other order than the numbers on the cards.&lt;br /&gt;
&lt;br /&gt;
; How long does it take to play a round of cards using the full deck?&lt;br /&gt;
: This depends upon the amount of discussion and how familiar the players are with application security concepts. But perhaps allow 1.5 to 2.0 hours for 4-6 people.&lt;br /&gt;
&lt;br /&gt;
; What sort of people should play the game?&lt;br /&gt;
:Always try to have a mix of roles who can contribute alternative perspectives. But include someone who has a reasonable knowledge of application vulnerability terminology. Otherwise try to include a mix of architects, developers, testers and a relevant project manager or business owner.&lt;br /&gt;
&lt;br /&gt;
; Who should take notes and record scores?&lt;br /&gt;
: It is better if that someone else, not playing the game, takes notes about the requirements identified and issues discussed. This could be used as training for a more junior developer, or performed by the project manager. Some organisations have made a recording to review afterwards when the requirements are written up more formally.&lt;br /&gt;
&lt;br /&gt;
; Should we always use the full deck of cards?&lt;br /&gt;
: No. A smaller deck is quicker to play. Start your first game with only enough cards for two or three rounds. Always consider removing cards that are not appropriate at all of the target application or function being reviewed. For the first few times people play the game it is also usually better to remove the Aces and the two Jokers. It is also usual to play the game without any trumps suit until people are more familiar with the idea.&lt;br /&gt;
&lt;br /&gt;
; What should players do when they have an Ace card that says “invented a new X attack”?&lt;br /&gt;
: The player can make up any attack they think is valid, but must match the suit of the card e.g. data validation and encoding). With players new to the game, it can be better to remove these to begin with.&lt;br /&gt;
&lt;br /&gt;
; I don’t understand what the attack means on each card - is there more detailed information?&lt;br /&gt;
: Yes, the Wiki Deck at was created to help players understand the attacks. See [https://www.owasp.org/index.php/Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck Wiki Deck].&lt;br /&gt;
&lt;br /&gt;
; My company wants to print its own version of OWASP Cornucopia - what license do we need to refer to?&lt;br /&gt;
: What is required/reasonable might depend upon how you propose to use the source Cornucopia material. See fuller answer immediately below.&lt;br /&gt;
&lt;br /&gt;
Some examples of re-using or reproducing Cornucopia are:&lt;br /&gt;
&lt;br /&gt;
# Print some decks and give them away to customers&lt;br /&gt;
# Reproduce the game exactly but with a corporate-branded package&lt;br /&gt;
# Use the idea and/or source files to produce a similar game but with different attacks/mappings&lt;br /&gt;
# Distribute modified design files&lt;br /&gt;
&lt;br /&gt;
If option 1 above, you can order these in bulk from OWASP and attach your own details below the &amp;quot;compliments of&amp;quot; section on the boxes. There are three aspects to consider for options 2, 3 or 4, or combinations of those - see below. The existing printed decks (and their boxes and leaflets include such text).&lt;br /&gt;
&lt;br /&gt;
''A - Cornucopia License''&lt;br /&gt;
&lt;br /&gt;
The precise wording will depend how the material is being used or reproduced. Under Creative Commons Attribution-ShareAlike 3.0 license it is necessary to attribute all previous contributions (in this case, Microsoft, Boeing, Mitre, etc). The easiest place to put the wording is on the leaflet (folded inside, or separate booklet). The current required long-form wording is:&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license http://creativecommons.org/licenses/by-sa/3.0/&lt;br /&gt;
&lt;br /&gt;
  The files used to create these materials were created from the OWASP project and are also open source, and are licensed under the same conditions. &lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia can be downloaded for free from the OWASP website and printed yourself. The OWASP Cornucopia project source in vendor neutral and unbranded.&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  © 2012-2016 OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
  This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license.&lt;br /&gt;
&lt;br /&gt;
  Acknowledgments:&lt;br /&gt;
&lt;br /&gt;
  Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
&lt;br /&gt;
  Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
&lt;br /&gt;
  Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
&lt;br /&gt;
  Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
&lt;br /&gt;
  Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
&lt;br /&gt;
  Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
&lt;br /&gt;
  Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
The box/container for the cards must have the wording:&lt;br /&gt;
&lt;br /&gt;
  Created by Colin Watson.&lt;br /&gt;
&lt;br /&gt;
  Contains: One pack of Cornucopia Ecommerce Website playing cards. OWASP Cornucopia is open source and can be downloaded free of charge from the OWASP website.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
The following short-form wording must also appear on any materials referencing the outputs (e.g. press releases, leaflets, reports, blog posts):&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license and is © 2012-2016 OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
If any files are distributed electronically, the long-form wording should also be aded in a license.txt file within the distribution.&lt;br /&gt;
&lt;br /&gt;
If the intention is to use the idea only (option 3 above), the long-form, box and short-form wording might be different, and probably simpler. And it might make more sense to start with the Microsoft-provided Elevation of Privilege files (and open source license).&lt;br /&gt;
&lt;br /&gt;
''B - Upcoming update to Cornucopia''&lt;br /&gt;
&lt;br /&gt;
Note that the current print design files are v1.04, and the current Word document is v1.10, but we are in the process of updating all of these to v1.20.&lt;br /&gt;
&lt;br /&gt;
Whatever is used as a starting point, please state the source version, for example: &lt;br /&gt;
&lt;br /&gt;
  Based on OWASP Cornucopia Ecommerce Website Edition v1.04&lt;br /&gt;
&lt;br /&gt;
''C - OWASP brand usage''&lt;br /&gt;
&lt;br /&gt;
Additionally individuals, companies and other organisations must not breach OWASP's brand usage guidelines. &lt;br /&gt;
&lt;br /&gt;
  https://www.owasp.org/index.php/Marketing/Resources#tab=BRAND_GUIDELINES&lt;br /&gt;
&lt;br /&gt;
In the case of Cornucopia, in 2014 Blackfoot Limited produced some printed decks of cards. Blackfoot's name and logo did not appear anywhere on the OWASP-branded cards, and the OWASP logo did not appear on the Blackfoot-branded box and leaflet. In fact there is no OWASP logo on any part of the Blackfoot branded decks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-data-A.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Cornucopia is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Oana Cornea&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Todd Dahl&lt;br /&gt;
* Luis Enriquez&lt;br /&gt;
* Ken Ferris&lt;br /&gt;
* Darío De Filippis&lt;br /&gt;
* Sebastien Gioria&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Timo Goosen&lt;br /&gt;
* Anthony Harrison&lt;br /&gt;
* John Herrlin&lt;br /&gt;
* Jerry Hoff&lt;br /&gt;
* Marios Kourtesis&lt;br /&gt;
* Antonis Manaras&lt;br /&gt;
* Jim Manico&lt;br /&gt;
* Mark Miller&lt;br /&gt;
* Cam Morris&lt;br /&gt;
* Susana Romaniz&lt;br /&gt;
* Ravishankar Sahadevan&lt;br /&gt;
* Tao Sauvage&lt;br /&gt;
* Stephen de Vries&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
Also:&lt;br /&gt;
&lt;br /&gt;
* Attendees at OWASP London, OWASP Manchester and OWASP Netherlands chapter meetings, the London Gamification meetup, and the training at AppSec USA 2015 in san Francisco who made helpful suggestions and asked challenging questions&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
* Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
* Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
* Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
* Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
* Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
* Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authentication-7.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-joker-a.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Version history (see [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx uploads]):&lt;br /&gt;
* Alpha version (0.40) was issued in August 2012&lt;br /&gt;
* Beta version (1.00) was released in February 2013&lt;br /&gt;
* Stable release (1.02) was released in August 2013, following feedback from mailing list and use with groups of developers&lt;br /&gt;
* Release v1.03 included minor changes&lt;br /&gt;
* Release v1.04 included a text correction on one card&lt;br /&gt;
* Release v1.05 included additional narrative and FAQs&lt;br /&gt;
* Current release v1.10 included cross-references updated for 2014 version of ASVS, contributors updated and minor text changes to cards to improve readability&lt;br /&gt;
* Current release v1.20 included cross-references updated for version 3.0.1 of ASVS and CAPEC v2.8, and many minor text changes including further contributors.&lt;br /&gt;
&lt;br /&gt;
As of May 2016, the priorities are:&lt;br /&gt;
* &amp;lt;strike&amp;gt;Develop Cornucopia Wiki Deck&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Update the document/deck to shorten some card text [completed ready for v1.10]&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVS 2014&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVSv3 2016&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check/update CAPEC mappings&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Translate into French (Started in June 2015 by [[User:SebastienGioria]] ) , Japanese, Spanish (almost complete May 2016) and other languages (help needed please) - German in progress (from June 2014)&lt;br /&gt;
* &amp;lt;strike&amp;gt;Make card decks available via OWASP Merchandise Store&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create a video &amp;quot;how to play&amp;quot;&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Update printed decks in OWASP Merchandise Store to v1.20 in both EN and ES languages&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Cornucopia is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Cornucopia into that language?&lt;br /&gt;
==Use and Promote the Cornucopia Card Decks==&lt;br /&gt;
Please help raise awareness of Cornucopia by printing cards:&lt;br /&gt;
* Use Cornucopia with specifiers, architects, designers, developers, testers and others, in part to train them, but also to solicit feedback on their usability, practicality and appropriateness for their work&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a mobile app to play the game&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What cards don't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other decks would you like to see?&lt;br /&gt;
==Keep the Cards Updated==&lt;br /&gt;
As the source referenced documents change, we have to update the decks. You may also find errors and omissions. In the first instance, please send a message to the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] if you have identified errors &amp;amp;amp; omissions, have some time to maintain the source documents, or can help in other ways.&lt;br /&gt;
==Create a New Deck==&lt;br /&gt;
The only version currently available is the Cornucopia Ecommerce Website Edition in English. We would like to create a new mobile app specific deck, probably using the wonderful [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] as inspiration for the card source materials. Do you have an idea for your own application security requirements card deck? Perhaps for {{#switchtablink:Mobile App Edition|mobile apps}} or something else?&lt;br /&gt;
&lt;br /&gt;
= About Ecommerce Website Edition =&lt;br /&gt;
{{:Projects/OWASP Cornucopia Ecommerce Website Edition | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]] &lt;br /&gt;
[[Category: Threat_Modeling]] &lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:SAMM-SR-1]] &lt;br /&gt;
[[Category:SAMM-SR-2]] &lt;br /&gt;
[[Category:SAMM-TA-1]] &lt;br /&gt;
[[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=240698</id>
		<title>OWASP Cornucopia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=240698"/>
				<updated>2018-05-14T11:08:09Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* News and Events */ Printed decks&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cornucopia-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#Lab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Cornucopia==&lt;br /&gt;
OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology agnostic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
The idea behind Cornucopia is to help development teams, especially those using Agile methodologies, to identify application security requirements and develop security-based user stories. Although the idea had been waiting for enough time to progress it, the final motivation came when [http://www.safecode.org/ SAFECode] published its [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf Practical Security Stories and Security Tasks for Agile Development Environments] in July 2012.&lt;br /&gt;
&lt;br /&gt;
The Microsoft SDL team had already published its super [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] (EoP) but that did not seem to address the most appropriate kind of issues that web application development teams mostly have to address. EoP is a great concept and game strategy, and was [http://blogs.msdn.com/b/sdl/archive/2010/03/02/announcing-elevation-of-privilege-the-threat-modeling-game.aspx published under] a [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License].&lt;br /&gt;
Cornucopia {{#switchtablink:Ecommerce Website Edition|Ecommerce Website Edition}} is based the concepts and game ideas in EoP, but those have been modified to be more relevant to the types of issues ecommerce website developers encounter. It attempts to introduce threat-modelling ideas into development teams that use Agile methodologies, or are more focused on web application weaknesses than other types of software vulnerabilities or are not familiar with STRIDE and DREAD.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The Card Decks==&lt;br /&gt;
&lt;br /&gt;
''Ecommerce Website Edition''&lt;br /&gt;
&lt;br /&gt;
Instead of EoP’s STRIDE suits, Cornucopia suits were selected based on the structure of the [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide] (SCP), but with additional consideration of sections in the [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard], the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide] and David Rook’s [http://www.securityninja.co.uk/secure-development/the-principles-place/ Principles of Secure Development]. These provided five suits, and a sixth called “Cornucopia” was created for everything else: &lt;br /&gt;
&lt;br /&gt;
* Data validation and encoding&lt;br /&gt;
* Authentication&lt;br /&gt;
* Session management&lt;br /&gt;
* Authorization&lt;br /&gt;
* Cryptography&lt;br /&gt;
* Cornucopia&lt;br /&gt;
&lt;br /&gt;
Each suit contains 13 cards (Ace, 2-10, Jack, Queen and King) but, unlike EoP, there are also two Joker cards. The content was mainly drawn from the SCP.&lt;br /&gt;
&lt;br /&gt;
''Other Decks''&lt;br /&gt;
&lt;br /&gt;
Future editions such as for mobile app development will use different sources of information and suits.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mappings==&lt;br /&gt;
The other driver for Cornucopia is to link the attacks with requirements and verification techniques. An initial aim had been to reference [http://cwe.mitre.org/ CWE] weakness IDs, but these proved too numerous, and instead it was decided to map each card to [http://capec.mitre.org/ CAPEC] software attack pattern IDs which themselves are mapped to CWEs, so the desired result is achieved.&lt;br /&gt;
&lt;br /&gt;
Each card is also mapped to the 36 primary security stories in the [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode document], as well as to the OWASP [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide SCP v2], [https://www.owasp.org/images/3/33/OWASP_Application_Security_Verification_Standard_3.0.1.pdf ASVS v3.0.1] and [https://www.owasp.org/index.php/OWASP_AppSensor_Project AppSensor] (application attack detection and response) to help teams create their own security-related stories for use in Agile processes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Cornucopia is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] mentioned above, [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), [https://www.owasp.org/index.php/OWASP_Snakes_and_Ladders OWASP Snakes and Ladders], and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Cornucopia? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia is a card game used to help derive application security requirements during the software development life cycle. To start using Cornucopia:&lt;br /&gt;
&lt;br /&gt;
* Download the document&lt;br /&gt;
* Print the cards onto plain paper or pre-scored card&lt;br /&gt;
* Cut/separate the individual cards&lt;br /&gt;
* Identify an application, module or component to assess&lt;br /&gt;
* Invite business owners, architects, developers, testers along for a card game&lt;br /&gt;
* Get those infosec folk to provide chocolate, pizza, beer, flowers or all four as prizes&lt;br /&gt;
* Select a portion of the deck to start with&lt;br /&gt;
* {{#switchtablink:How to Play|Play the game}} to discuss &amp;amp;amp; document security requirements (and to win rounds)&lt;br /&gt;
* Remember, points make prizes!&lt;br /&gt;
&lt;br /&gt;
Listen to the [http://trustedsoftwarealliance.com/2014/03/21/the-owasp-cornucopia-project-with-colin-watson/ OWASP 24/7 Podcast] about Cornucopia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-presentation-small.jpg|link=media:Owaspnl-colinwatson-cornucopia.odp]]&lt;br /&gt;
&lt;br /&gt;
The game rules are in the document download. But the OpenOffice [[media:Owasplondon-colinwatson-cornucopia.odp|project presentation]] includes an animated version of four demonstration rounds. The presentation is recorded [http://youtu.be/Q_LE-8xNXVk on video].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dariodf Darío De Filippis] [mailto:dariodefilippis@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://youtu.be/i5Y0akWj31k How to Play] video&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Cornucopia-scoresheet.pdf Scoresheet]&lt;br /&gt;
* {{#switchtablink:Get the Cards|All sources and downloads...}}&lt;br /&gt;
&lt;br /&gt;
== Reference Files ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:OWASP_SCP_Quick_Reference_Guide_v2.pdf OWASP SCP requirements]&lt;br /&gt;
* [https://www.owasp.org/images/5/58/OWASP_ASVS_Version_2.pdf OWASP ASVS verification IDs]&lt;br /&gt;
* [https://www.owasp.org/index.php/AppSensor_DetectionPoints OWASP AppSensor attack detection point IDs] &lt;br /&gt;
* [http://capec.mitre.org/data/archive/capec_v1.7.1.zip CAPEC IDs]&lt;br /&gt;
* [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode security-focused story IDs]&lt;br /&gt;
&lt;br /&gt;
The OWASP SCP does not include identity values for the requirements, so please use [https://www.owasp.org/index.php/File:Owasp-requirements-numbering.zip this list].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [14 May 2018] Printed deck purchase details updated&lt;br /&gt;
* [23 Aug 2016] Presentation at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [29 Jun 2016] v1.20 released&lt;br /&gt;
* [21 Jan 2016] [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]] published&lt;br /&gt;
* [30 Dec 2015] Darío De Filippis becomes project co-leader&lt;br /&gt;
* [24 Sep 2015] [http://appsecusa2015.sched.org/event/7f3dba889c0ec9e37900e289c9660503#.VZ6aoXhflNY Lightning training] at AppSec USA 2015&lt;br /&gt;
* [01 Jun 2015] [https://youtu.be/i5Y0akWj31k How to Play video] published&lt;br /&gt;
* [20 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - How to play video&lt;br /&gt;
* [31 Mar 2015] v1.10 released&lt;br /&gt;
* [02 Mar 2015] Decks available from [https://www.owasp.org/index.php/OWASP_Merchandise#Cornucopia_Cards OWASP merchandise store]&lt;br /&gt;
* [18 Feb 2015] Project awarded Labs status&lt;br /&gt;
&lt;br /&gt;
==PCIDSS==&lt;br /&gt;
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia Ecommerce Website Edition is referenced in the current [https://www.pcisecuritystandards.org Payment Card Industry Security Standards Council]  information supplement [https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf PCI DSS E-commerce Guidelines] v2, January 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Get the Cards =&lt;br /&gt;
&lt;br /&gt;
==Printed==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-square-logo-350.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Professionally printed decks are available by two methods:&lt;br /&gt;
* Single decks or in bulk from OWASP (v1.20)&lt;br /&gt;
** As promotion items '''by OWASP Leaders''' from their own chapter budgets [https://docs.google.com/a/owasp.org/forms/d/e/1FAIpQLSez9mV97HuqvYhCldE2hYhX3UjQM1oO5bLy44HkOZSpni0OzQ/viewform?formkey=dF85bGtvdWdrd2JjYldNZ1gxSkJxaEE6MQ Chapter and Project Merchandise Request form]&lt;br /&gt;
** For other individuals, organisations and companies, please email [mailto:dawn.aitken@owasp.org dawn.aitken@owasp.org] with purchase enquiries&lt;br /&gt;
* Request a free deck of cards gifted by [http://blackfootuk.com/ Blackfoot UK Limited] or download their donated print-ready artwork:&lt;br /&gt;
** Request a free [http://blackfootuk.com/cornucopia/receive-a-set-of-cards/ pack of cards (v1.10)] (gifted by Blackfoot UK)&lt;br /&gt;
&lt;br /&gt;
==Source files==&lt;br /&gt;
&lt;br /&gt;
Cornucopia - Ecommerce Website Edition:&lt;br /&gt;
* v1.20 EN (current version)&lt;br /&gt;
** [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx DOC] &lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf PDF]&lt;br /&gt;
** Wiki Deck - coming soon&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.10 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki]]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjb283ZE5GNmFMM2FGWGl2WC14aDJDQ0ZsNk00 Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.04 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/cornucopia-ecom-1v04-blackfoot.zip Print-Ready design files]  (gifted by Blackfoot UK) 47Mb Zip&lt;br /&gt;
&lt;br /&gt;
The current version of Cornucopia Ecommerce Website Edition cards (v1.20 with updated mapping to ASVS v3.0.1 and CAPEC v2.8, and has some minor text changes on the cards) can be self-printed using the following methods:&lt;br /&gt;
# Download and self-print the free [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx word-processing document] or [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf PDF]&lt;br /&gt;
## Print the document onto business card blank cards; or&lt;br /&gt;
## Print the document onto normal card and cut the cards out individually using the guide; or&lt;br /&gt;
# Generate your own cards from the free [https://www.owasp.org/index.php/File:Cornucopia-deck-ecommercewebsite-XML.zip source XML data file]&lt;br /&gt;
&lt;br /&gt;
There are also other ways to obtain particular versions:&lt;br /&gt;
* Download the free [https://www.owasp.org/index.php/File:Owasp_cornucopia_printreadyimages.zip PDF (v1.03)] (gifted by Travelex) &lt;br /&gt;
** Have the cards commercially printed; or&lt;br /&gt;
** Import into your own files (such as [http://lists.owasp.org/pipermail/owasp_cornucopia/2014-January/000018.html this way] suggested by Cam Morris via the mailing list)&lt;br /&gt;
&lt;br /&gt;
OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
Collect/share/use the pseudo-random cards tweeted twice daily [https://twitter.com/OWASPCornucopia @OWASPCornucopia]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How to Play =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-cornucopia-K.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-session-9.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
It is possible to play Cornucopia in many different ways. Here is one way, and explained in a [https://youtu.be/i5Y0akWj31k YouTube video].&lt;br /&gt;
&lt;br /&gt;
== Primary method ==&lt;br /&gt;
&lt;br /&gt;
;A - Preparations&lt;br /&gt;
:A1.	Obtain a deck, or print your own Cornucopia deck and separate/cut out the cards&lt;br /&gt;
:A2.	Identify an application or application process to review; this might be a concept, design or an actual implementation&lt;br /&gt;
:A3.	Create a data flow diagram&lt;br /&gt;
:A4.	Identify and invite a group of 3-6 architects, developers, testers and other business stakeholders together and sit around a table (try to include someone fairly familiar with application security)&lt;br /&gt;
:A5.	Have some prizes to hand (gold stars, chocolate, pizza, beer or flowers depending upon your office culture)&lt;br /&gt;
;B - Play&lt;br /&gt;
:One suit - Cornucopia - acts as trumps. Aces are high (i.e. they beat Kings). It helps if there is someone dedicated to documenting the results who is not playing.&lt;br /&gt;
:B1.	Remove the Jokers and a few low-score (2, 3, 4) cards from Cornucopia suit to ensure each player will have the same number of cards&lt;br /&gt;
:B2.	Shuffle the pack and deal all the cards&lt;br /&gt;
:B3.	To begin, choose a player randomly who will play the first card - they can play any card from their hand except from the trump suit - Cornucopia&lt;br /&gt;
:B4.	To play a card, each player must read it out aloud, and explain how (or not) the threat could apply (the player gets a point for attacks that work, and the group thinks it is an actionable bug) - don’t try to think of mitigations at this stage, and don’t exclude a threat just because it is believed it is already mitigated - someone record the card on the score sheet&lt;br /&gt;
:B5.	Play clockwise, each person must play a card in the same way; if you have any card of the matching lead suit you must play one of those, otherwise they can play a card from any other suit. Only a higher card of the same suit, or the highest card in the trump suit Cornucopia, wins the hand.&lt;br /&gt;
:B6.	The person who wins the round, leads the next round (i.e. they play first), and thus defines the next lead suit&lt;br /&gt;
:B7.	Repeat until all the cards are played&lt;br /&gt;
;C - Scoring&lt;br /&gt;
:The objective is to identify applicable threats, and win hands (rounds):&lt;br /&gt;
:C1.	Score +1 for each card you can identify as a valid threat to the application under consideration&lt;br /&gt;
:C2.	Score +1 if you win a round&lt;br /&gt;
:C3.	Once all cards have been played, whoever has the most points wins&lt;br /&gt;
;D - Closure&lt;br /&gt;
:D1.	Review all the applicable threats and the matching security requirements&lt;br /&gt;
:D2.	Create user stories, specifications and test cases as required for your development methodology&lt;br /&gt;
&lt;br /&gt;
==Alternative game rules==&lt;br /&gt;
&lt;br /&gt;
* If you are new to the game, remove the two Joker cards to begin with. Add the Joker cards back in once people become more familiar with the process. Apart from the “trumps card game” rules described above which are very similar to the EoP, the deck can also be played as the “twenty-one card game” (also known as “pontoon” or “blackjack”) which normally reduces the number of cards played in each round.&lt;br /&gt;
* Practice on an imaginary application, or even a future planned application, rather than trying to find fault with existing applications until the participants are happy with the usefulness of the game.&lt;br /&gt;
* Consider just playing with one suit to make a shorter session – but try to cover all the suits for every project. Or even better just play one hand with some pre-selected cards, and score only on the ability to identify security requirements. Perhaps have one game of each suit each day for a week or so, if the participants cannot spare long enough for a full deck.&lt;br /&gt;
* Some teams have preferred to play a full hand of cards, and then discuss what is on the cards after each round (instead of after each person plays a card).&lt;br /&gt;
* Another suggestion is that if a player fails to identify the card is relevant, allow other players to suggest ideas, and potentially let them gain the point for the card. Consider allowing extra points for especially good contributions.&lt;br /&gt;
* You can even play by yourself. Just use the cards to act as thought-provokers. Involving more people will be beneficial though.&lt;br /&gt;
* In Microsoft's EoP guidance, they recommend cheating as a good game strategy&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authorization-8.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-cryptography-j.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
; Can I copy or edit the game?&lt;br /&gt;
:Yes of course. All OWASP materials are free to do with as you like provided you comply with the Creative Commons Attribution-ShareAlike 3.0 license. Perhaps if you create a new version, you might donate it to the OWASP Cornucopia Project?&lt;br /&gt;
&lt;br /&gt;
; How can I get involved?&lt;br /&gt;
: Please send ideas or offers of help to the project’s mailing list.&lt;br /&gt;
&lt;br /&gt;
; How were the attackers’ names chosen?&lt;br /&gt;
: EoP begins every description with words like &amp;quot;An attacker can...&amp;quot;. These have to be phrased as an attack but I was not keen on the anonymous terminology, wanting something more engaging, and therefore used personal names. These can be thought of as external or internal people or aliases for computer systems. But instead of just random names, I thought how they might reflect the OWASP community aspect. Therefore, apart from &amp;quot;Alice and Bob&amp;quot;, I use the given (first) names of current and recent OWASP employees and Board members (assigned in no order), and then randomly selected the remaining 50 or so names from the current list of paying individual OWASP members. No name was used more than once, and where people had provided two personal names, I dropped one part to try to ensure no-one can be easily identified. Names were not deliberately allocated to any particular attack, defence or requirement. The cultural and gender mix simply reflects theses sources of names, and is not meant to be world-representative.&lt;br /&gt;
&lt;br /&gt;
; Why aren’t there any images on the card faces?&lt;br /&gt;
: There is quite a lot of text on the cards, and the cross-referencing takes up space too. But it would be great to have additional design elements included. Any volunteers?&lt;br /&gt;
&lt;br /&gt;
; Are the attacks ranked by the number on the card?&lt;br /&gt;
: Only approximately. The risk will be application and organisation dependent, due to varying security and compliance requirements, so your own severity rating may place the cards in some other order than the numbers on the cards.&lt;br /&gt;
&lt;br /&gt;
; How long does it take to play a round of cards using the full deck?&lt;br /&gt;
: This depends upon the amount of discussion and how familiar the players are with application security concepts. But perhaps allow 1.5 to 2.0 hours for 4-6 people.&lt;br /&gt;
&lt;br /&gt;
; What sort of people should play the game?&lt;br /&gt;
:Always try to have a mix of roles who can contribute alternative perspectives. But include someone who has a reasonable knowledge of application vulnerability terminology. Otherwise try to include a mix of architects, developers, testers and a relevant project manager or business owner.&lt;br /&gt;
&lt;br /&gt;
; Who should take notes and record scores?&lt;br /&gt;
: It is better if that someone else, not playing the game, takes notes about the requirements identified and issues discussed. This could be used as training for a more junior developer, or performed by the project manager. Some organisations have made a recording to review afterwards when the requirements are written up more formally.&lt;br /&gt;
&lt;br /&gt;
; Should we always use the full deck of cards?&lt;br /&gt;
: No. A smaller deck is quicker to play. Start your first game with only enough cards for two or three rounds. Always consider removing cards that are not appropriate at all of the target application or function being reviewed. For the first few times people play the game it is also usually better to remove the Aces and the two Jokers. It is also usual to play the game without any trumps suit until people are more familiar with the idea.&lt;br /&gt;
&lt;br /&gt;
; What should players do when they have an Ace card that says “invented a new X attack”?&lt;br /&gt;
: The player can make up any attack they think is valid, but must match the suit of the card e.g. data validation and encoding). With players new to the game, it can be better to remove these to begin with.&lt;br /&gt;
&lt;br /&gt;
; I don’t understand what the attack means on each card - is there more detailed information?&lt;br /&gt;
: Yes, the Wiki Deck at was created to help players understand the attacks. See [https://www.owasp.org/index.php/Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck Wiki Deck].&lt;br /&gt;
&lt;br /&gt;
; My company wants to print its own version of OWASP Cornucopia - what license do we need to refer to?&lt;br /&gt;
: What is required/reasonable might depend upon how you propose to use the source Cornucopia material. See fuller answer immediately below.&lt;br /&gt;
&lt;br /&gt;
Some examples of re-using or reproducing Cornucopia are:&lt;br /&gt;
&lt;br /&gt;
# Print some decks and give them away to customers&lt;br /&gt;
# Reproduce the game exactly but with a corporate-branded package&lt;br /&gt;
# Use the idea and/or source files to produce a similar game but with different attacks/mappings&lt;br /&gt;
# Distribute modified design files&lt;br /&gt;
&lt;br /&gt;
If option 1 above, you can order these in bulk from OWASP and attach your own details below the &amp;quot;compliments of&amp;quot; section on the boxes. There are three aspects to consider for options 2, 3 or 4, or combinations of those - see below. The existing printed decks (and their boxes and leaflets include such text).&lt;br /&gt;
&lt;br /&gt;
''A - Cornucopia License''&lt;br /&gt;
&lt;br /&gt;
The precise wording will depend how the material is being used or reproduced. Under Creative Commons Attribution-ShareAlike 3.0 license it is necessary to attribute all previous contributions (in this case, Microsoft, Boeing, Mitre, etc). The easiest place to put the wording is on the leaflet (folded inside, or separate booklet). The current required long-form wording is:&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license http://creativecommons.org/licenses/by-sa/3.0/&lt;br /&gt;
&lt;br /&gt;
  The files used to create these materials were created from the OWASP project and are also open source, and are licensed under the same conditions. &lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia can be downloaded for free from the OWASP website and printed yourself. The OWASP Cornucopia project source in vendor neutral and unbranded.&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  © 2012-2016 OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
  This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license.&lt;br /&gt;
&lt;br /&gt;
  Acknowledgments:&lt;br /&gt;
&lt;br /&gt;
  Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
&lt;br /&gt;
  Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
&lt;br /&gt;
  Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
&lt;br /&gt;
  Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
&lt;br /&gt;
  Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
&lt;br /&gt;
  Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
&lt;br /&gt;
  Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
The box/container for the cards must have the wording:&lt;br /&gt;
&lt;br /&gt;
  Created by Colin Watson.&lt;br /&gt;
&lt;br /&gt;
  Contains: One pack of Cornucopia Ecommerce Website playing cards. OWASP Cornucopia is open source and can be downloaded free of charge from the OWASP website.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
The following short-form wording must also appear on any materials referencing the outputs (e.g. press releases, leaflets, reports, blog posts):&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license and is © 2012-2016 OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
If any files are distributed electronically, the long-form wording should also be aded in a license.txt file within the distribution.&lt;br /&gt;
&lt;br /&gt;
If the intention is to use the idea only (option 3 above), the long-form, box and short-form wording might be different, and probably simpler. And it might make more sense to start with the Microsoft-provided Elevation of Privilege files (and open source license).&lt;br /&gt;
&lt;br /&gt;
''B - Upcoming update to Cornucopia''&lt;br /&gt;
&lt;br /&gt;
Note that the current print design files are v1.04, and the current Word document is v1.10, but we are in the process of updating all of these to v1.20.&lt;br /&gt;
&lt;br /&gt;
Whatever is used as a starting point, please state the source version, for example: &lt;br /&gt;
&lt;br /&gt;
  Based on OWASP Cornucopia Ecommerce Website Edition v1.04&lt;br /&gt;
&lt;br /&gt;
''C - OWASP brand usage''&lt;br /&gt;
&lt;br /&gt;
Additionally individuals, companies and other organisations must not breach OWASP's brand usage guidelines. &lt;br /&gt;
&lt;br /&gt;
  https://www.owasp.org/index.php/Marketing/Resources#tab=BRAND_GUIDELINES&lt;br /&gt;
&lt;br /&gt;
In the case of Cornucopia, in 2014 Blackfoot Limited produced some printed decks of cards. Blackfoot's name and logo did not appear anywhere on the OWASP-branded cards, and the OWASP logo did not appear on the Blackfoot-branded box and leaflet. In fact there is no OWASP logo on any part of the Blackfoot branded decks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-data-A.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Cornucopia is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Oana Cornea&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Todd Dahl&lt;br /&gt;
* Luis Enriquez&lt;br /&gt;
* Ken Ferris&lt;br /&gt;
* Darío De Filippis&lt;br /&gt;
* Sebastien Gioria&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Timo Goosen&lt;br /&gt;
* Anthony Harrison&lt;br /&gt;
* John Herrlin&lt;br /&gt;
* Jerry Hoff&lt;br /&gt;
* Marios Kourtesis&lt;br /&gt;
* Antonis Manaras&lt;br /&gt;
* Jim Manico&lt;br /&gt;
* Mark Miller&lt;br /&gt;
* Cam Morris&lt;br /&gt;
* Susana Romaniz&lt;br /&gt;
* Ravishankar Sahadevan&lt;br /&gt;
* Tao Sauvage&lt;br /&gt;
* Stephen de Vries&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
Also:&lt;br /&gt;
&lt;br /&gt;
* Attendees at OWASP London, OWASP Manchester and OWASP Netherlands chapter meetings, the London Gamification meetup, and the training at AppSec USA 2015 in san Francisco who made helpful suggestions and asked challenging questions&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
* Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
* Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
* Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
* Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
* Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
* Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authentication-7.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-joker-a.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Version history (see [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx uploads]):&lt;br /&gt;
* Alpha version (0.40) was issued in August 2012&lt;br /&gt;
* Beta version (1.00) was released in February 2013&lt;br /&gt;
* Stable release (1.02) was released in August 2013, following feedback from mailing list and use with groups of developers&lt;br /&gt;
* Release v1.03 included minor changes&lt;br /&gt;
* Release v1.04 included a text correction on one card&lt;br /&gt;
* Release v1.05 included additional narrative and FAQs&lt;br /&gt;
* Current release v1.10 included cross-references updated for 2014 version of ASVS, contributors updated and minor text changes to cards to improve readability&lt;br /&gt;
* Current release v1.20 included cross-references updated for version 3.0.1 of ASVS and CAPEC v2.8, and many minor text changes including further contributors.&lt;br /&gt;
&lt;br /&gt;
As of May 2016, the priorities are:&lt;br /&gt;
* &amp;lt;strike&amp;gt;Develop Cornucopia Wiki Deck&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Update the document/deck to shorten some card text [completed ready for v1.10]&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVS 2014&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVSv3 2016&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check/update CAPEC mappings&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Translate into French (Started in June 2015 by [[User:SebastienGioria]] ) , Japanese, Spanish (almost complete May 2016) and other languages (help needed please) - German in progress (from June 2014)&lt;br /&gt;
* &amp;lt;strike&amp;gt;Make card decks available via OWASP Merchandise Store&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create a video &amp;quot;how to play&amp;quot;&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Update printed decks in OWASP Merchandise Store to v1.20 in both EN and ES languages&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Cornucopia is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Cornucopia into that language?&lt;br /&gt;
==Use and Promote the Cornucopia Card Decks==&lt;br /&gt;
Please help raise awareness of Cornucopia by printing cards:&lt;br /&gt;
* Use Cornucopia with specifiers, architects, designers, developers, testers and others, in part to train them, but also to solicit feedback on their usability, practicality and appropriateness for their work&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a mobile app to play the game&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What cards don't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other decks would you like to see?&lt;br /&gt;
==Keep the Cards Updated==&lt;br /&gt;
As the source referenced documents change, we have to update the decks. You may also find errors and omissions. In the first instance, please send a message to the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] if you have identified errors &amp;amp;amp; omissions, have some time to maintain the source documents, or can help in other ways.&lt;br /&gt;
==Create a New Deck==&lt;br /&gt;
The only version currently available is the Cornucopia Ecommerce Website Edition in English. We would like to create a new mobile app specific deck, probably using the wonderful [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] as inspiration for the card source materials. Do you have an idea for your own application security requirements card deck? Perhaps for {{#switchtablink:Mobile App Edition|mobile apps}} or something else?&lt;br /&gt;
&lt;br /&gt;
= About Ecommerce Website Edition =&lt;br /&gt;
{{:Projects/OWASP Cornucopia Ecommerce Website Edition | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]] &lt;br /&gt;
[[Category: Threat_Modeling]] &lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:SAMM-SR-1]] &lt;br /&gt;
[[Category:SAMM-SR-2]] &lt;br /&gt;
[[Category:SAMM-TA-1]] &lt;br /&gt;
[[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=240697</id>
		<title>OWASP Cornucopia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cornucopia&amp;diff=240697"/>
				<updated>2018-05-14T11:06:56Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cornucopia-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#Lab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Cornucopia==&lt;br /&gt;
OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology agnostic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
The idea behind Cornucopia is to help development teams, especially those using Agile methodologies, to identify application security requirements and develop security-based user stories. Although the idea had been waiting for enough time to progress it, the final motivation came when [http://www.safecode.org/ SAFECode] published its [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf Practical Security Stories and Security Tasks for Agile Development Environments] in July 2012.&lt;br /&gt;
&lt;br /&gt;
The Microsoft SDL team had already published its super [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] (EoP) but that did not seem to address the most appropriate kind of issues that web application development teams mostly have to address. EoP is a great concept and game strategy, and was [http://blogs.msdn.com/b/sdl/archive/2010/03/02/announcing-elevation-of-privilege-the-threat-modeling-game.aspx published under] a [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License].&lt;br /&gt;
Cornucopia {{#switchtablink:Ecommerce Website Edition|Ecommerce Website Edition}} is based the concepts and game ideas in EoP, but those have been modified to be more relevant to the types of issues ecommerce website developers encounter. It attempts to introduce threat-modelling ideas into development teams that use Agile methodologies, or are more focused on web application weaknesses than other types of software vulnerabilities or are not familiar with STRIDE and DREAD.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The Card Decks==&lt;br /&gt;
&lt;br /&gt;
''Ecommerce Website Edition''&lt;br /&gt;
&lt;br /&gt;
Instead of EoP’s STRIDE suits, Cornucopia suits were selected based on the structure of the [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide OWASP Secure Coding Practices - Quick Reference Guide] (SCP), but with additional consideration of sections in the [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard], the [https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Guide] and David Rook’s [http://www.securityninja.co.uk/secure-development/the-principles-place/ Principles of Secure Development]. These provided five suits, and a sixth called “Cornucopia” was created for everything else: &lt;br /&gt;
&lt;br /&gt;
* Data validation and encoding&lt;br /&gt;
* Authentication&lt;br /&gt;
* Session management&lt;br /&gt;
* Authorization&lt;br /&gt;
* Cryptography&lt;br /&gt;
* Cornucopia&lt;br /&gt;
&lt;br /&gt;
Each suit contains 13 cards (Ace, 2-10, Jack, Queen and King) but, unlike EoP, there are also two Joker cards. The content was mainly drawn from the SCP.&lt;br /&gt;
&lt;br /&gt;
''Other Decks''&lt;br /&gt;
&lt;br /&gt;
Future editions such as for mobile app development will use different sources of information and suits.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mappings==&lt;br /&gt;
The other driver for Cornucopia is to link the attacks with requirements and verification techniques. An initial aim had been to reference [http://cwe.mitre.org/ CWE] weakness IDs, but these proved too numerous, and instead it was decided to map each card to [http://capec.mitre.org/ CAPEC] software attack pattern IDs which themselves are mapped to CWEs, so the desired result is achieved.&lt;br /&gt;
&lt;br /&gt;
Each card is also mapped to the 36 primary security stories in the [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode document], as well as to the OWASP [https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide SCP v2], [https://www.owasp.org/images/3/33/OWASP_Application_Security_Verification_Standard_3.0.1.pdf ASVS v3.0.1] and [https://www.owasp.org/index.php/OWASP_AppSensor_Project AppSensor] (application attack detection and response) to help teams create their own security-related stories for use in Agile processes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Cornucopia is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game] mentioned above, [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), [https://www.owasp.org/index.php/OWASP_Snakes_and_Ladders OWASP Snakes and Ladders], and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is Cornucopia? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia is a card game used to help derive application security requirements during the software development life cycle. To start using Cornucopia:&lt;br /&gt;
&lt;br /&gt;
* Download the document&lt;br /&gt;
* Print the cards onto plain paper or pre-scored card&lt;br /&gt;
* Cut/separate the individual cards&lt;br /&gt;
* Identify an application, module or component to assess&lt;br /&gt;
* Invite business owners, architects, developers, testers along for a card game&lt;br /&gt;
* Get those infosec folk to provide chocolate, pizza, beer, flowers or all four as prizes&lt;br /&gt;
* Select a portion of the deck to start with&lt;br /&gt;
* {{#switchtablink:How to Play|Play the game}} to discuss &amp;amp;amp; document security requirements (and to win rounds)&lt;br /&gt;
* Remember, points make prizes!&lt;br /&gt;
&lt;br /&gt;
Listen to the [http://trustedsoftwarealliance.com/2014/03/21/the-owasp-cornucopia-project-with-colin-watson/ OWASP 24/7 Podcast] about Cornucopia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-presentation-small.jpg|link=media:Owaspnl-colinwatson-cornucopia.odp]]&lt;br /&gt;
&lt;br /&gt;
The game rules are in the document download. But the OpenOffice [[media:Owasplondon-colinwatson-cornucopia.odp|project presentation]] includes an animated version of four demonstration rounds. The presentation is recorded [http://youtu.be/Q_LE-8xNXVk on video].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Dariodf Darío De Filippis] [mailto:dariodefilippis@gmail.com @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Secure Coding Practices - Quick Reference Guide]]&lt;br /&gt;
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://youtu.be/i5Y0akWj31k How to Play] video&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Cornucopia-scoresheet.pdf Scoresheet]&lt;br /&gt;
* {{#switchtablink:Get the Cards|All sources and downloads...}}&lt;br /&gt;
&lt;br /&gt;
== Reference Files ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:OWASP_SCP_Quick_Reference_Guide_v2.pdf OWASP SCP requirements]&lt;br /&gt;
* [https://www.owasp.org/images/5/58/OWASP_ASVS_Version_2.pdf OWASP ASVS verification IDs]&lt;br /&gt;
* [https://www.owasp.org/index.php/AppSensor_DetectionPoints OWASP AppSensor attack detection point IDs] &lt;br /&gt;
* [http://capec.mitre.org/data/archive/capec_v1.7.1.zip CAPEC IDs]&lt;br /&gt;
* [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode security-focused story IDs]&lt;br /&gt;
&lt;br /&gt;
The OWASP SCP does not include identity values for the requirements, so please use [https://www.owasp.org/index.php/File:Owasp-requirements-numbering.zip this list].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [23 Aug 2016] Presentation at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [29 Jun 2016] v1.20 released&lt;br /&gt;
* [21 Jan 2016] [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki Deck]] published&lt;br /&gt;
* [30 Dec 2015] Darío De Filippis becomes project co-leader&lt;br /&gt;
* [24 Sep 2015] [http://appsecusa2015.sched.org/event/7f3dba889c0ec9e37900e289c9660503#.VZ6aoXhflNY Lightning training] at AppSec USA 2015&lt;br /&gt;
* [01 Jun 2015] [https://youtu.be/i5Y0akWj31k How to Play video] published&lt;br /&gt;
* [20 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - How to play video&lt;br /&gt;
* [31 Mar 2015] v1.10 released&lt;br /&gt;
* [02 Mar 2015] Decks available from [https://www.owasp.org/index.php/OWASP_Merchandise#Cornucopia_Cards OWASP merchandise store]&lt;br /&gt;
* [18 Feb 2015] Project awarded Labs status&lt;br /&gt;
&lt;br /&gt;
==PCIDSS==&lt;br /&gt;
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]&lt;br /&gt;
&lt;br /&gt;
OWASP Cornucopia Ecommerce Website Edition is referenced in the current [https://www.pcisecuritystandards.org Payment Card Industry Security Standards Council]  information supplement [https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf PCI DSS E-commerce Guidelines] v2, January 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Get the Cards =&lt;br /&gt;
&lt;br /&gt;
==Printed==&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-square-logo-350.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Professionally printed decks are available by two methods:&lt;br /&gt;
* Single decks or in bulk from OWASP (v1.20)&lt;br /&gt;
** As promotion items '''by OWASP Leaders''' from their own chapter budgets [https://docs.google.com/a/owasp.org/forms/d/e/1FAIpQLSez9mV97HuqvYhCldE2hYhX3UjQM1oO5bLy44HkOZSpni0OzQ/viewform?formkey=dF85bGtvdWdrd2JjYldNZ1gxSkJxaEE6MQ Chapter and Project Merchandise Request form]&lt;br /&gt;
** For other individuals, organisations and companies, please email [mailto:dawn.aitken@owasp.org dawn.aitken@owasp.org] with purchase enquiries&lt;br /&gt;
* Request a free deck of cards gifted by [http://blackfootuk.com/ Blackfoot UK Limited] or download their donated print-ready artwork:&lt;br /&gt;
** Request a free [http://blackfootuk.com/cornucopia/receive-a-set-of-cards/ pack of cards (v1.10)] (gifted by Blackfoot UK)&lt;br /&gt;
&lt;br /&gt;
==Source files==&lt;br /&gt;
&lt;br /&gt;
Cornucopia - Ecommerce Website Edition:&lt;br /&gt;
* v1.20 EN (current version)&lt;br /&gt;
** [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx DOC] &lt;br /&gt;
** [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf PDF]&lt;br /&gt;
** Wiki Deck - coming soon&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjNXpQMUNBYnJsT2QyQ0lkb3VNX1BCM3JLNlBZ Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.10 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [[Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck|Wiki]]&lt;br /&gt;
** [https://drive.google.com/open?id=0ByNJ8mfWALwjb283ZE5GNmFMM2FGWGl2WC14aDJDQ0ZsNk00 Print-Ready design files] 24Mb zip&lt;br /&gt;
* v1.04 EN&lt;br /&gt;
** DOC - see current version link above for previous versions of DOC including with track changes&lt;br /&gt;
** PDF - see current version link above for previous versions of PDF&lt;br /&gt;
** [https://4ed64fe7f7e3f627b8d0-bc104063a9fe564c2d8a75b1e218477a.ssl.cf2.rackcdn.com/cornucopia-ecom-1v04-blackfoot.zip Print-Ready design files]  (gifted by Blackfoot UK) 47Mb Zip&lt;br /&gt;
&lt;br /&gt;
The current version of Cornucopia Ecommerce Website Edition cards (v1.20 with updated mapping to ASVS v3.0.1 and CAPEC v2.8, and has some minor text changes on the cards) can be self-printed using the following methods:&lt;br /&gt;
# Download and self-print the free [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx word-processing document] or [https://www.owasp.org/index.php/File:Owasp-cornucopia-ecommerce_website.pdf PDF]&lt;br /&gt;
## Print the document onto business card blank cards; or&lt;br /&gt;
## Print the document onto normal card and cut the cards out individually using the guide; or&lt;br /&gt;
# Generate your own cards from the free [https://www.owasp.org/index.php/File:Cornucopia-deck-ecommercewebsite-XML.zip source XML data file]&lt;br /&gt;
&lt;br /&gt;
There are also other ways to obtain particular versions:&lt;br /&gt;
* Download the free [https://www.owasp.org/index.php/File:Owasp_cornucopia_printreadyimages.zip PDF (v1.03)] (gifted by Travelex) &lt;br /&gt;
** Have the cards commercially printed; or&lt;br /&gt;
** Import into your own files (such as [http://lists.owasp.org/pipermail/owasp_cornucopia/2014-January/000018.html this way] suggested by Cam Morris via the mailing list)&lt;br /&gt;
&lt;br /&gt;
OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
==Twitter==&lt;br /&gt;
&lt;br /&gt;
Collect/share/use the pseudo-random cards tweeted twice daily [https://twitter.com/OWASPCornucopia @OWASPCornucopia]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How to Play =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-cornucopia-K.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-session-9.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
It is possible to play Cornucopia in many different ways. Here is one way, and explained in a [https://youtu.be/i5Y0akWj31k YouTube video].&lt;br /&gt;
&lt;br /&gt;
== Primary method ==&lt;br /&gt;
&lt;br /&gt;
;A - Preparations&lt;br /&gt;
:A1.	Obtain a deck, or print your own Cornucopia deck and separate/cut out the cards&lt;br /&gt;
:A2.	Identify an application or application process to review; this might be a concept, design or an actual implementation&lt;br /&gt;
:A3.	Create a data flow diagram&lt;br /&gt;
:A4.	Identify and invite a group of 3-6 architects, developers, testers and other business stakeholders together and sit around a table (try to include someone fairly familiar with application security)&lt;br /&gt;
:A5.	Have some prizes to hand (gold stars, chocolate, pizza, beer or flowers depending upon your office culture)&lt;br /&gt;
;B - Play&lt;br /&gt;
:One suit - Cornucopia - acts as trumps. Aces are high (i.e. they beat Kings). It helps if there is someone dedicated to documenting the results who is not playing.&lt;br /&gt;
:B1.	Remove the Jokers and a few low-score (2, 3, 4) cards from Cornucopia suit to ensure each player will have the same number of cards&lt;br /&gt;
:B2.	Shuffle the pack and deal all the cards&lt;br /&gt;
:B3.	To begin, choose a player randomly who will play the first card - they can play any card from their hand except from the trump suit - Cornucopia&lt;br /&gt;
:B4.	To play a card, each player must read it out aloud, and explain how (or not) the threat could apply (the player gets a point for attacks that work, and the group thinks it is an actionable bug) - don’t try to think of mitigations at this stage, and don’t exclude a threat just because it is believed it is already mitigated - someone record the card on the score sheet&lt;br /&gt;
:B5.	Play clockwise, each person must play a card in the same way; if you have any card of the matching lead suit you must play one of those, otherwise they can play a card from any other suit. Only a higher card of the same suit, or the highest card in the trump suit Cornucopia, wins the hand.&lt;br /&gt;
:B6.	The person who wins the round, leads the next round (i.e. they play first), and thus defines the next lead suit&lt;br /&gt;
:B7.	Repeat until all the cards are played&lt;br /&gt;
;C - Scoring&lt;br /&gt;
:The objective is to identify applicable threats, and win hands (rounds):&lt;br /&gt;
:C1.	Score +1 for each card you can identify as a valid threat to the application under consideration&lt;br /&gt;
:C2.	Score +1 if you win a round&lt;br /&gt;
:C3.	Once all cards have been played, whoever has the most points wins&lt;br /&gt;
;D - Closure&lt;br /&gt;
:D1.	Review all the applicable threats and the matching security requirements&lt;br /&gt;
:D2.	Create user stories, specifications and test cases as required for your development methodology&lt;br /&gt;
&lt;br /&gt;
==Alternative game rules==&lt;br /&gt;
&lt;br /&gt;
* If you are new to the game, remove the two Joker cards to begin with. Add the Joker cards back in once people become more familiar with the process. Apart from the “trumps card game” rules described above which are very similar to the EoP, the deck can also be played as the “twenty-one card game” (also known as “pontoon” or “blackjack”) which normally reduces the number of cards played in each round.&lt;br /&gt;
* Practice on an imaginary application, or even a future planned application, rather than trying to find fault with existing applications until the participants are happy with the usefulness of the game.&lt;br /&gt;
* Consider just playing with one suit to make a shorter session – but try to cover all the suits for every project. Or even better just play one hand with some pre-selected cards, and score only on the ability to identify security requirements. Perhaps have one game of each suit each day for a week or so, if the participants cannot spare long enough for a full deck.&lt;br /&gt;
* Some teams have preferred to play a full hand of cards, and then discuss what is on the cards after each round (instead of after each person plays a card).&lt;br /&gt;
* Another suggestion is that if a player fails to identify the card is relevant, allow other players to suggest ideas, and potentially let them gain the point for the card. Consider allowing extra points for especially good contributions.&lt;br /&gt;
* You can even play by yourself. Just use the cards to act as thought-provokers. Involving more people will be beneficial though.&lt;br /&gt;
* In Microsoft's EoP guidance, they recommend cheating as a good game strategy&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authorization-8.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-cryptography-j.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
; Can I copy or edit the game?&lt;br /&gt;
:Yes of course. All OWASP materials are free to do with as you like provided you comply with the Creative Commons Attribution-ShareAlike 3.0 license. Perhaps if you create a new version, you might donate it to the OWASP Cornucopia Project?&lt;br /&gt;
&lt;br /&gt;
; How can I get involved?&lt;br /&gt;
: Please send ideas or offers of help to the project’s mailing list.&lt;br /&gt;
&lt;br /&gt;
; How were the attackers’ names chosen?&lt;br /&gt;
: EoP begins every description with words like &amp;quot;An attacker can...&amp;quot;. These have to be phrased as an attack but I was not keen on the anonymous terminology, wanting something more engaging, and therefore used personal names. These can be thought of as external or internal people or aliases for computer systems. But instead of just random names, I thought how they might reflect the OWASP community aspect. Therefore, apart from &amp;quot;Alice and Bob&amp;quot;, I use the given (first) names of current and recent OWASP employees and Board members (assigned in no order), and then randomly selected the remaining 50 or so names from the current list of paying individual OWASP members. No name was used more than once, and where people had provided two personal names, I dropped one part to try to ensure no-one can be easily identified. Names were not deliberately allocated to any particular attack, defence or requirement. The cultural and gender mix simply reflects theses sources of names, and is not meant to be world-representative.&lt;br /&gt;
&lt;br /&gt;
; Why aren’t there any images on the card faces?&lt;br /&gt;
: There is quite a lot of text on the cards, and the cross-referencing takes up space too. But it would be great to have additional design elements included. Any volunteers?&lt;br /&gt;
&lt;br /&gt;
; Are the attacks ranked by the number on the card?&lt;br /&gt;
: Only approximately. The risk will be application and organisation dependent, due to varying security and compliance requirements, so your own severity rating may place the cards in some other order than the numbers on the cards.&lt;br /&gt;
&lt;br /&gt;
; How long does it take to play a round of cards using the full deck?&lt;br /&gt;
: This depends upon the amount of discussion and how familiar the players are with application security concepts. But perhaps allow 1.5 to 2.0 hours for 4-6 people.&lt;br /&gt;
&lt;br /&gt;
; What sort of people should play the game?&lt;br /&gt;
:Always try to have a mix of roles who can contribute alternative perspectives. But include someone who has a reasonable knowledge of application vulnerability terminology. Otherwise try to include a mix of architects, developers, testers and a relevant project manager or business owner.&lt;br /&gt;
&lt;br /&gt;
; Who should take notes and record scores?&lt;br /&gt;
: It is better if that someone else, not playing the game, takes notes about the requirements identified and issues discussed. This could be used as training for a more junior developer, or performed by the project manager. Some organisations have made a recording to review afterwards when the requirements are written up more formally.&lt;br /&gt;
&lt;br /&gt;
; Should we always use the full deck of cards?&lt;br /&gt;
: No. A smaller deck is quicker to play. Start your first game with only enough cards for two or three rounds. Always consider removing cards that are not appropriate at all of the target application or function being reviewed. For the first few times people play the game it is also usually better to remove the Aces and the two Jokers. It is also usual to play the game without any trumps suit until people are more familiar with the idea.&lt;br /&gt;
&lt;br /&gt;
; What should players do when they have an Ace card that says “invented a new X attack”?&lt;br /&gt;
: The player can make up any attack they think is valid, but must match the suit of the card e.g. data validation and encoding). With players new to the game, it can be better to remove these to begin with.&lt;br /&gt;
&lt;br /&gt;
; I don’t understand what the attack means on each card - is there more detailed information?&lt;br /&gt;
: Yes, the Wiki Deck at was created to help players understand the attacks. See [https://www.owasp.org/index.php/Cornucopia_-_Ecommerce_Website_Edition_-_Wiki_Deck Wiki Deck].&lt;br /&gt;
&lt;br /&gt;
; My company wants to print its own version of OWASP Cornucopia - what license do we need to refer to?&lt;br /&gt;
: What is required/reasonable might depend upon how you propose to use the source Cornucopia material. See fuller answer immediately below.&lt;br /&gt;
&lt;br /&gt;
Some examples of re-using or reproducing Cornucopia are:&lt;br /&gt;
&lt;br /&gt;
# Print some decks and give them away to customers&lt;br /&gt;
# Reproduce the game exactly but with a corporate-branded package&lt;br /&gt;
# Use the idea and/or source files to produce a similar game but with different attacks/mappings&lt;br /&gt;
# Distribute modified design files&lt;br /&gt;
&lt;br /&gt;
If option 1 above, you can order these in bulk from OWASP and attach your own details below the &amp;quot;compliments of&amp;quot; section on the boxes. There are three aspects to consider for options 2, 3 or 4, or combinations of those - see below. The existing printed decks (and their boxes and leaflets include such text).&lt;br /&gt;
&lt;br /&gt;
''A - Cornucopia License''&lt;br /&gt;
&lt;br /&gt;
The precise wording will depend how the material is being used or reproduced. Under Creative Commons Attribution-ShareAlike 3.0 license it is necessary to attribute all previous contributions (in this case, Microsoft, Boeing, Mitre, etc). The easiest place to put the wording is on the leaflet (folded inside, or separate booklet). The current required long-form wording is:&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license http://creativecommons.org/licenses/by-sa/3.0/&lt;br /&gt;
&lt;br /&gt;
  The files used to create these materials were created from the OWASP project and are also open source, and are licensed under the same conditions. &lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia can be downloaded for free from the OWASP website and printed yourself. The OWASP Cornucopia project source in vendor neutral and unbranded.&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  © 2012-2016 OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
  This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license.&lt;br /&gt;
&lt;br /&gt;
  Acknowledgments:&lt;br /&gt;
&lt;br /&gt;
  Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
&lt;br /&gt;
  Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
&lt;br /&gt;
  Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
&lt;br /&gt;
  Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
&lt;br /&gt;
  Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
&lt;br /&gt;
  Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
&lt;br /&gt;
  Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
The box/container for the cards must have the wording:&lt;br /&gt;
&lt;br /&gt;
  Created by Colin Watson.&lt;br /&gt;
&lt;br /&gt;
  Contains: One pack of Cornucopia Ecommerce Website playing cards. OWASP Cornucopia is open source and can be downloaded free of charge from the OWASP website.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
The following short-form wording must also appear on any materials referencing the outputs (e.g. press releases, leaflets, reports, blog posts):&lt;br /&gt;
&lt;br /&gt;
  OWASP does not endorse or recommend commercial products or services.&lt;br /&gt;
&lt;br /&gt;
  OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license and is © 2012-2016 OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
If any files are distributed electronically, the long-form wording should also be aded in a license.txt file within the distribution.&lt;br /&gt;
&lt;br /&gt;
If the intention is to use the idea only (option 3 above), the long-form, box and short-form wording might be different, and probably simpler. And it might make more sense to start with the Microsoft-provided Elevation of Privilege files (and open source license).&lt;br /&gt;
&lt;br /&gt;
''B - Upcoming update to Cornucopia''&lt;br /&gt;
&lt;br /&gt;
Note that the current print design files are v1.04, and the current Word document is v1.10, but we are in the process of updating all of these to v1.20.&lt;br /&gt;
&lt;br /&gt;
Whatever is used as a starting point, please state the source version, for example: &lt;br /&gt;
&lt;br /&gt;
  Based on OWASP Cornucopia Ecommerce Website Edition v1.04&lt;br /&gt;
&lt;br /&gt;
''C - OWASP brand usage''&lt;br /&gt;
&lt;br /&gt;
Additionally individuals, companies and other organisations must not breach OWASP's brand usage guidelines. &lt;br /&gt;
&lt;br /&gt;
  https://www.owasp.org/index.php/Marketing/Resources#tab=BRAND_GUIDELINES&lt;br /&gt;
&lt;br /&gt;
In the case of Cornucopia, in 2014 Blackfoot Limited produced some printed decks of cards. Blackfoot's name and logo did not appear anywhere on the OWASP-branded cards, and the OWASP logo did not appear on the Blackfoot-branded box and leaflet. In fact there is no OWASP logo on any part of the Blackfoot branded decks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-data-A.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Cornucopia is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Oana Cornea&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Todd Dahl&lt;br /&gt;
* Luis Enriquez&lt;br /&gt;
* Ken Ferris&lt;br /&gt;
* Darío De Filippis&lt;br /&gt;
* Sebastien Gioria&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Timo Goosen&lt;br /&gt;
* Anthony Harrison&lt;br /&gt;
* John Herrlin&lt;br /&gt;
* Jerry Hoff&lt;br /&gt;
* Marios Kourtesis&lt;br /&gt;
* Antonis Manaras&lt;br /&gt;
* Jim Manico&lt;br /&gt;
* Mark Miller&lt;br /&gt;
* Cam Morris&lt;br /&gt;
* Susana Romaniz&lt;br /&gt;
* Ravishankar Sahadevan&lt;br /&gt;
* Tao Sauvage&lt;br /&gt;
* Stephen de Vries&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
Also:&lt;br /&gt;
&lt;br /&gt;
* Attendees at OWASP London, OWASP Manchester and OWASP Netherlands chapter meetings, the London Gamification meetup, and the training at AppSec USA 2015 in san Francisco who made helpful suggestions and asked challenging questions&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* Microsoft SDL Team for the Elevation of Privilege Threat Modelling Game, published under a Creative Commons Attribution license, as the inspiration for Cornucopia and from which many ideas, especially the game theory, were copied.&lt;br /&gt;
* Keith Turpin and contributors to the “OWASP Secure Coding Practices - Quick Reference Guide”, originally donated to OWASP by Boeing, which is used as the primary source of security requirements information to formulate the content of the cards.&lt;br /&gt;
* Contributors, supporters, sponsors and volunteers to the OWASP ASVS, AppSensor and Web Framework Security Matrix projects, Mitre’s Common Attack Pattern Enumeration and Classification (CAPEC), and SAFECode’s “Practical Security Stories and Security Tasks for Agile Development Environments” which are all used in the cross-references provided.&lt;br /&gt;
* Playgen for providing an illuminating afternoon seminar on task gamification, and tartanmaker.com for the online tool to help create the card back pattern.&lt;br /&gt;
* Blackfoot UK Limited for creating and donating print-ready design files, Tom Brennan and the OWASP Foundation for instigating the creation of an OWASP-branded box and leaflet, and OWASP employees, especially Kate Hartmann, for managing the ordering, stocking and despatch of printed card decks.&lt;br /&gt;
* Oana Cornea and other participants at the AppSec EU 2015 project summit for their help in creating the demonstration video.&lt;br /&gt;
* Colin Watson as author and co-project leader with Darío De Filippis, along with other OWASP volunteers who have helped in many ways.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
[[File:Cornucopia-card-authentication-7.png|right|link=]]&lt;br /&gt;
[[File:Cornucopia-card-joker-a.png|right|link=]]&lt;br /&gt;
&lt;br /&gt;
Version history (see [https://www.owasp.org/index.php/File:OWASP-Cornucopia-Ecommerce_Website.docx uploads]):&lt;br /&gt;
* Alpha version (0.40) was issued in August 2012&lt;br /&gt;
* Beta version (1.00) was released in February 2013&lt;br /&gt;
* Stable release (1.02) was released in August 2013, following feedback from mailing list and use with groups of developers&lt;br /&gt;
* Release v1.03 included minor changes&lt;br /&gt;
* Release v1.04 included a text correction on one card&lt;br /&gt;
* Release v1.05 included additional narrative and FAQs&lt;br /&gt;
* Current release v1.10 included cross-references updated for 2014 version of ASVS, contributors updated and minor text changes to cards to improve readability&lt;br /&gt;
* Current release v1.20 included cross-references updated for version 3.0.1 of ASVS and CAPEC v2.8, and many minor text changes including further contributors.&lt;br /&gt;
&lt;br /&gt;
As of May 2016, the priorities are:&lt;br /&gt;
* &amp;lt;strike&amp;gt;Develop Cornucopia Wiki Deck&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Update the document/deck to shorten some card text [completed ready for v1.10]&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVS 2014&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Map to ASVSv3 2016&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check/update CAPEC mappings&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Translate into French (Started in June 2015 by [[User:SebastienGioria]] ) , Japanese, Spanish (almost complete May 2016) and other languages (help needed please) - German in progress (from June 2014)&lt;br /&gt;
* &amp;lt;strike&amp;gt;Make card decks available via OWASP Merchandise Store&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create a video &amp;quot;how to play&amp;quot;&amp;lt;/strike&amp;gt; done&lt;br /&gt;
* Update printed decks in OWASP Merchandise Store to v1.20 in both EN and ES languages&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Cornucopia is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Cornucopia into that language?&lt;br /&gt;
==Use and Promote the Cornucopia Card Decks==&lt;br /&gt;
Please help raise awareness of Cornucopia by printing cards:&lt;br /&gt;
* Use Cornucopia with specifiers, architects, designers, developers, testers and others, in part to train them, but also to solicit feedback on their usability, practicality and appropriateness for their work&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a mobile app to play the game&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What cards don't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other decks would you like to see?&lt;br /&gt;
==Keep the Cards Updated==&lt;br /&gt;
As the source referenced documents change, we have to update the decks. You may also find errors and omissions. In the first instance, please send a message to the [https://lists.owasp.org/mailman/listinfo/owasp_cornucopia friendly project mailing list] if you have identified errors &amp;amp;amp; omissions, have some time to maintain the source documents, or can help in other ways.&lt;br /&gt;
==Create a New Deck==&lt;br /&gt;
The only version currently available is the Cornucopia Ecommerce Website Edition in English. We would like to create a new mobile app specific deck, probably using the wonderful [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Security Project] as inspiration for the card source materials. Do you have an idea for your own application security requirements card deck? Perhaps for {{#switchtablink:Mobile App Edition|mobile apps}} or something else?&lt;br /&gt;
&lt;br /&gt;
= About Ecommerce Website Edition =&lt;br /&gt;
{{:Projects/OWASP Cornucopia Ecommerce Website Edition | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category: Attack]] &lt;br /&gt;
[[Category: Threat_Modeling]] &lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]] &lt;br /&gt;
[[Category:OWASP_Document]] &lt;br /&gt;
[[Category:OWASP_Download]] &lt;br /&gt;
[[Category:SAMM-SR-1]] &lt;br /&gt;
[[Category:SAMM-SR-2]] &lt;br /&gt;
[[Category:SAMM-TA-1]] &lt;br /&gt;
[[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Snakes_and_Ladders&amp;diff=240556</id>
		<title>OWASP Snakes and Ladders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Snakes_and_Ladders&amp;diff=240556"/>
				<updated>2018-05-09T18:00:30Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Editions */ Dates&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders-header.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Snakes and Ladders==&lt;br /&gt;
&lt;br /&gt;
Snakes and Ladders is an educational project. It uses gamification to promote awareness of application security controls and risks, and in particular knowledge of other OWASP documents and tools.&lt;br /&gt;
&lt;br /&gt;
== Editions==&lt;br /&gt;
&lt;br /&gt;
''Web Applications''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;div style=&amp;quot;height:75px;max-width:375px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_webapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;--&amp;gt;In the board game for {{#switchtablink:Web Applications Edition|web applications}}, the virtuous behaviours (ladders) are secure coding practices (from [[OWASP Proactive Controls|OWASP Proactive Controls project]] 2014-2018) and the vices (snakes) are application security risks (from [[:Category:OWASP Top Ten Project|OWASP Top Ten Project]] 2013-2017). See also a [https://www.owasp.org/index.php/OWASP_Proactive_Controls#tab=Top_Ten_Mapping mapping between these two lists].&lt;br /&gt;
&lt;br /&gt;
''Mobile Apps''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;div style=&amp;quot;height:75px;max-width:375px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_mobapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;--&amp;gt;The identical board game for {{#switchtablink:Mobile Apps Edition|mobile apps}} uses mobile controls (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Controls Mobile Security Project Top Ten Controls] 2013) as the virtuous behaviours and mobile risks (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks Top Ten Mobile Risks] 2014 from the same project) as the vices.&lt;br /&gt;
&lt;br /&gt;
== Background ==&lt;br /&gt;
&lt;br /&gt;
This board game was created to use as an ice-breaker in application security training, but it potentially has wider appeal simply as a promotional hand-out, and maybe also more usefully as learning materials for younger coders. To cover all of that, we use the phrase &amp;quot;OWASP Snakes and Ladders is meant to be used by software programmers, big and small&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The game is quite lightweight, and does not have the same rigour or depth as the card game Cornucopia, but it is meant to be just some fun with some learning attached.&lt;br /&gt;
&lt;br /&gt;
Print-ready PDFs have been published - these are poster sized A2 (international ISO 216 [https://en.wikipedia.org/wiki/Paper_size paper size] 420×594mm, approximately 16.5×23.4in, with 3mm bleed and printers' marks). But the original files are in Adobe Illustrator, so these are also available for anyone to use and improve upon. We recommend playing using a real die and counters (markers), but you can cut out and make these from the paper sheet itself if you have scissor and glue skills.&lt;br /&gt;
&lt;br /&gt;
We hope it may be of use in any upcoming office party, celebration, festival, seasonal event, application security awareness or training exercise. Or just to help spread the word about controls and risks at work, at college or at school. If you are training anyone about the OWASP Top Ten, OWASP Proactive Controls or the OWASP Mobile projects, please consider giving each attendee a printed copy of the game as a take away.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP Snakes and Ladders is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [https://www.owasp.org/index.php/OWASP_Cornucopia OWASP Cornucopia], [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game], [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is This? ==&lt;br /&gt;
&lt;br /&gt;
Snakes and Ladders is a popular board game, with [http://en.wikipedia.org/wiki/Snakes_and_Ladders ancient provenance] imported into [http://sandradodd.com/game/snakesandladders Great Britain from Asia] in the 19th century. The original game showed the effects of good and evil, or virtues and vices. This OWASP game is a poster-sized ''print-your-own'' paper sheet with the game board on it. Just get some players together with a die and counters. The virtues are application security controls, and the vices are risks.&lt;br /&gt;
&lt;br /&gt;
==How to Play==&lt;br /&gt;
&lt;br /&gt;
* The game is for 2-6 players. &lt;br /&gt;
* Firstly print the sheet out.&lt;br /&gt;
* Give each player a coloured counter (marker). To begin, each player should throw the die to determine who plays first; the highest can lead.&lt;br /&gt;
* Put all the players' counters onto the first square labelled “Start 1”.&lt;br /&gt;
* In turn, each player rolls the die and moves their counter by the number of squares indicated on the die. At the end of the move, if a player’s counter is at the bottom end of a ladder, the counter must be moved up the ladder to the square at its higher end. Conversely, if the player’s counter is located at the mouth of a snake, the counter must be moved down to the end of the snake’s tail.&lt;br /&gt;
* ''As a better alternative to enhance learning, either require the participants to discuss the risk/control when a player reaches each square, or only allow players to climb up a ladder after a quest about the control (e.g. simply describing the control, explain the risk (one example) the named control addresses and how the control (one example) could help prevent the named it''&lt;br /&gt;
*The first player to reach “100” at the top left wins. Give a prize.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Katyanton Katy Anton] [mailto:katy.anton@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Proactive Controls]]&lt;br /&gt;
* [[:Category:OWASP Top Ten Project|OWASP Top Ten]]&lt;br /&gt;
* [[OWASP Mobile Security Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*  Web Applications v1.0/v1.1&lt;br /&gt;
** [[media:OWASP-SnakesAndLadders-WebApplications-BR.pdf|BR]], [[media:OWASP-SnakesAndLadders-WebApplications-DE.pdf|DE]], [[media:OWASP-SnakesAndLadders-WebApplications-EN.pdf|EN]], [[media:OWASP-SnakesAndLadders-WebApplications-ES.pdf|ES]], [[media:OWASP-SnakesAndLadders-WebApplications-FR.pdf|FR]], [[media:OWASP-SnakesAndLadders-WebApplications-JA.pdf|JA]],  [[media:OWASP-SnakesAndLadders-WebApplications-TR.pdf|TR]], [[media:OWASP-SnakesAndLadders-WebApplications-ZH.pdf|ZH]]&lt;br /&gt;
** {{#switchtablink:Web Applications Edition|More options...}}&lt;br /&gt;
&lt;br /&gt;
*  Mobile Apps v1.0&lt;br /&gt;
** [[media:OWASP-SnakesAndLadders-MobileApps-EN.pdf|EN]], [[media:OWASP-SnakesAndLadders-MobileApps-JA.pdf|JA]]&lt;br /&gt;
** {{#switchtablink:Mobile Apps Edition|More options...}}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [09 May 2018] Web Applications v1.20 released in EN&lt;br /&gt;
* [12 May 2017] Web Applications TR&lt;br /&gt;
* [30 Jun 2016] Free copies at OWASP AppSec EU Rome 2017&lt;br /&gt;
* [05 Jun 2016] Web Applications v1.10 released in EN&lt;br /&gt;
* [30 Dec 2015] Katy Anton becomes project co-leader&lt;br /&gt;
* [01 Dec 2015] Free copies at PHP North West user group&lt;br /&gt;
* [24 Nov 2015] Free copies at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [12 Oct 2015] Free copies at PHP Hampshire user group&lt;br /&gt;
* [29 Sep 2015] Web Application v1.0 released in PT-BR&lt;br /&gt;
* [19 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - Dutch translation&lt;br /&gt;
* [11 May 2015] Lightning talk at the [http://tickets.digitalshoreditch.com/make/#session-53 Digital Shoreditch Festival]&lt;br /&gt;
* [04 Dec 2014] Free copies at [https://www.owasp.org/index.php/London OWASP London]&lt;br /&gt;
* [02 Dec 2014] Free copies at [https://www.owasp.org/index.php/Cambridge OWASP Cambridge]&lt;br /&gt;
* [02 Dec 2014] Mobile Apps JA&lt;br /&gt;
* [25 Nov 2014] Web Applications FR, JA and ZH&lt;br /&gt;
* [31 Oct 2014] Web Applications v1.0 released in DE, EN and ES&lt;br /&gt;
* [31 Oct 2014] Mobile Apps v1.0 released in EN&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
&lt;br /&gt;
[[File:OWASPSnakesWeb-profile-small.jpg|link=]]&lt;br /&gt;
Follow two mock games running on Twitter:&lt;br /&gt;
* [https://twitter.com/OWASPSnakesWeb @OWASPSnakesWeb]&lt;br /&gt;
* [https://twitter.com/OWASPSnakesMob @OWASPSnakesMob]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Web Applications Edition =&lt;br /&gt;
&lt;br /&gt;
== OWASP Snakes and Ladders - Web Applications ==&lt;br /&gt;
&lt;br /&gt;
This was the first edition created. The objective is to raise awareness of the security controls that every web application should have, but link that with the much more widely known Top Ten Risks. The virtuous behaviours (ladders) are secure coding practices (from [[OWASP Proactive Controls|OWASP Proactive Controls project]] 2014-2018) and the vices (snakes) are application security risks (from [[:Category:OWASP Top Ten Project|OWASP Top Ten Project]] 2013-2017).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:539px;max-width:750px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Osn-poster-web-de.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Current Release ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| &lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-BR.pdf BR: Português Brasileiro]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-DE.pdf DE: Deutsch]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-EN.pdf EN: English]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-BR.png|link=File:OWASP-SnakesAndLadders-WebApplications-BR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-DE.png|link=File:OWASP-SnakesAndLadders-WebApplications-DE.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; |[[Image:Osn-webapp-EN.png|link=File:OWASP-SnakesAndLadders-WebApplications-EN.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpentes e Escadas&amp;lt;br&amp;gt;Aplicativos da Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Schlangen und Leitern&amp;lt;br&amp;gt;Web Anwendungen&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Snakes and Ladders&amp;lt;br&amp;gt;Web Applications&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-ES.pdf ES: Español]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-FR.pdf FR: Français]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-JA.pdf JA: 日本語]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-ES.png|link=File:OWASP-SnakesAndLadders-WebApplications-ES.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-FR.png|link=File:OWASP-SnakesAndLadders-WebApplications-FR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-JA.png|link=File:OWASP-SnakesAndLadders-WebApplications-JA.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpientes y Escaleras&amp;lt;br&amp;gt;Aplicaciones Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpents et Échelles&amp;lt;br&amp;gt;Application Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇とはしご&amp;lt;br&amp;gt;ウェブアプリケーション&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-TR.pdf TR: Türkçe]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-ZH.pdf ZH: 中文]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-TR.png|link=File:OWASP-SnakesAndLadders-WebApplications-TR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-ZH.png|link=File:OWASP-SnakesAndLadders-WebApplications-ZH.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Yılanlar ve Merdivenler&amp;lt;br&amp;gt;Web Uygulamaları&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇梯棋&amp;lt;br&amp;gt;WEB应用程序&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Note that some languages choose not to change the EN text for risk and control names.&lt;br /&gt;
&lt;br /&gt;
([https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-Illustrator.zip Source Adobe Illustrator file])&lt;br /&gt;
&lt;br /&gt;
== Release History ==&lt;br /&gt;
&lt;br /&gt;
* [09 May 2018] 1.2 - EN version updated&lt;br /&gt;
* [12 May 2017] 1.11 - TR version release&lt;br /&gt;
* [15 Jun 2016] 1.1 - EN version updated&lt;br /&gt;
* [29 Sep 2015] 1.0.2 - BR version release&lt;br /&gt;
* [25 Nov 2014] 1.0.2 - Additional contributors added, FR, JA and ZH versions released&lt;br /&gt;
* [05 Nov 2014] 1.0.1 - Correction to paths in source Illustrator file; PDFs regenerated&lt;br /&gt;
* [31 Oct 2014] 1.0 - First release&lt;br /&gt;
&lt;br /&gt;
== Colour Scheme 'Classic' ==&lt;br /&gt;
&lt;br /&gt;
This edition uses simple primary colours, like [https://search.disconnect.me/searchTerms/serp?search=c45431fe-9ce8-415a-ac25-1e511f45ef51 many versions] that can be seen in pictures of Snakes and Ladders games. The colours used in 'Classic' are:&lt;br /&gt;
&lt;br /&gt;
* Green&lt;br /&gt;
* Yellow&lt;br /&gt;
* White&lt;br /&gt;
* Red&lt;br /&gt;
* Blue&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:75px;max-width:100%;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_webapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The start square (1) is yellow and the final square (100) is red.&lt;br /&gt;
&lt;br /&gt;
= Mobile Apps Edition =&lt;br /&gt;
&lt;br /&gt;
== OWASP Snakes and Ladders - Mobile Apps ==&lt;br /&gt;
&lt;br /&gt;
The edition for Mobile Apps was created after working out the idea and design for the web application version of the board game. It seemed easy to replicate the idea since the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Project] lists both security controls and risks. The virtuous behaviours (ladders) are mobile controls (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Controls Mobile Security Project Top Ten Controls] 2013) and the vices (snakes) are mobile risks (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks Top Ten Mobile Risks] 2014).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:539px;max-width:750px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Osn-poster-mob-ja.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Current Release ==&lt;br /&gt;
&lt;br /&gt;
{| &lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-MobileApps-EN.pdf EN: English]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-JA.pdf JA: 日本語]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-mobapp-EN.png|link=File:OWASP-SnakesAndLadders-MobileApps-EN.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-mobapp-JA.png|link=File:OWASP-SnakesAndLadders-MobileApps-JA.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Snakes and Ladders&amp;lt;br&amp;gt;Mobile Apps&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇とはしご&amp;lt;br&amp;gt; モバイルアプリ版&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
([https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-MobileApps-Illustrator.zip Source Adobe Illustrator file])&lt;br /&gt;
&lt;br /&gt;
== Release History ==&lt;br /&gt;
&lt;br /&gt;
* [02 Dec 2014] 1.0.2 - Additional contributor added, JA version released&lt;br /&gt;
* [05 Nov 2014] 1.0.1 - Correction to paths in source Illustrator file; EN PDF regenerated&lt;br /&gt;
* [31 Oct 2014] 1.0 - First release&lt;br /&gt;
&lt;br /&gt;
== Colour Scheme 'Farringdon' ==&lt;br /&gt;
&lt;br /&gt;
Other people's versions of Snakes and Ladders [https://search.disconnect.me/searchTerms/serp?search=c45431fe-9ce8-415a-ac25-1e511f45ef51 use a wide variety of designs and colour schemes]. Thus to make a complete contrast to the edition for web applications, the colours used are the designatory colours of the underground and mainline train services that run through Colin Watson's local station at Farringdon in Clerkenwell, London EC1. The colours in 'Farringdon' are:&lt;br /&gt;
&lt;br /&gt;
* Purple (future &amp;lt;strike&amp;gt;Crossrail&amp;lt;/strike&amp;gt; Elizabeth)&lt;br /&gt;
* Yellow (Circle)&lt;br /&gt;
* White (Thameslink)&lt;br /&gt;
* Maroon (Metropolitan)&lt;br /&gt;
* Pink (Hammersmith &amp;amp; City)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:75px;max-width:100%;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_mobapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can see these colours on [https://www.tfl.gov.uk/assets/downloads/standard-tube-map.pdf tube maps] and station signage. The start square (1) is yellow and the final square (100) is maroon.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Snakesandladders-mockup.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Why Snakes &amp;amp; Ladders? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well known document, but OWASP has many other resources which provide better approaches for secure application development. In particular, there are some &amp;quot;top 10 controls&amp;quot; lists, and I wanted to highlight those. Creating a board game that features both risks and controls is a simple way to compare and contrast these aspects.&lt;br /&gt;
&lt;br /&gt;
Players do not need to know either the risks or controls on the lists, since they are just the decoration to what is otherwise standard Snakes &amp;amp; Ladders. But as players land on assigned squares, this can be used to discuss the risks and controls they are labelled with.&lt;br /&gt;
&lt;br /&gt;
Also, after undertaking some due diligence, it was noted that since Snakes &amp;amp; Ladders is such an ancient game it is not anyone's intellectual property and many others have already created thousands of different designs and versions. Other games would not meet this requirement.&lt;br /&gt;
&lt;br /&gt;
==How was the game created?==&lt;br /&gt;
By hard work! Each list of risks and controls contains ten items, so the rough layout of snakes and ladder starting and end points was sketched out on paper, as shown for web applications on the right. Instructional text was written.&lt;br /&gt;
&lt;br /&gt;
The concept was then converted into a layered Adobe Illustrator file, and the text and graphics added. This design went through a number of iterations to ensure it was legible and appealing. The PDF was exported and both the PDF and AI files added to the project page. When translations were provided, these were added as separate text layers in the source Illustrator file, and then new files uploaded again to the project.&lt;br /&gt;
&lt;br /&gt;
Once Web Applications Snakes &amp;amp; Ladders was complete, the file was duplicated and edited for Mobile Apps. This has different risks, controls and arrangement of snakes and ladders. It also has its own colour scheme.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader aware of your available time to contribute to the project. It is also important to let the Leader know how you would like to contribute and pitch in to help the project meet its goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. Please see the {{#switchtablink:Road Map_and Getting Involved|road map and getting involved section}}&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for users, translators and people to promote the project. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Snakes and Ladders is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Ziyahan Albeniz&lt;br /&gt;
* Kembolle Amilkar&lt;br /&gt;
* Katy Anton&lt;br /&gt;
* Manuel Lopez Arredondo&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Álan Carlos B. Eufrázio&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Martin Haslinger&lt;br /&gt;
* Yongliang He&lt;br /&gt;
* Manfred Hofmeier&lt;br /&gt;
* Cédric Messeguer&lt;br /&gt;
* Takanori Nakanowatari&lt;br /&gt;
* Marcos Vinícius Nunes de Arruda&lt;br /&gt;
* Riotaro Okada&lt;br /&gt;
* Gabriel Pedro S. Peres&lt;br /&gt;
* Alison S. Ribeiro&lt;br /&gt;
* Ivy Zhang&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* The project leaders and contributors to the referenced controls and risks:&lt;br /&gt;
** [[OWASP Proactive Controls]]&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Top Ten]]&lt;br /&gt;
** [[OWASP Mobile Security Project|OWASP Mobile Security]]&lt;br /&gt;
* OWASP staff for helping to set up the project and support its ongoing activities.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Recently completed:&lt;br /&gt;
* Update web applications edition to Proactive Controls 2018 [EN recently completed]&lt;br /&gt;
* Translate into other languages [TR recently completed]&lt;br /&gt;
* Handouts at events&lt;br /&gt;
&lt;br /&gt;
As of May 2018, the priorities are:&lt;br /&gt;
* Update as other referenced projects updated (e.g. Top Ten)&lt;br /&gt;
&lt;br /&gt;
Other ideas are:&lt;br /&gt;
&lt;br /&gt;
* Promote use of Snakes and Ladders &lt;br /&gt;
* Develop other boards&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Snakes and Ladders is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help are listed below.&lt;br /&gt;
&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Snakes and Ladders into that language?&lt;br /&gt;
&lt;br /&gt;
The project is on [https://crowdin.com/project/owasp-snakes-and-ladders Crowdin]&lt;br /&gt;
&lt;br /&gt;
==Use and Promote the Board Game==&lt;br /&gt;
Please help raise awareness of Snakes and Ladders:&lt;br /&gt;
* Use the game with your colleagues, friends, families, students and children&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a multi-user mobile app or web application to play the game&lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_snakes_and_ladders project mailing list] for feedback:&lt;br /&gt;
* How did you use it?&lt;br /&gt;
* What is people's reaction?&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What doesn't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other boards would you like to see?&lt;br /&gt;
&lt;br /&gt;
==Create a Board==&lt;br /&gt;
Do you have an idea for your own application security Snakes and Ladders board? Please contribute your ideas via the [https://lists.owasp.org/mailman/listinfo/owasp_snakes_and_ladders mailing list].&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Snakes_and_Ladders&amp;diff=240555</id>
		<title>OWASP Snakes and Ladders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Snakes_and_Ladders&amp;diff=240555"/>
				<updated>2018-05-09T18:00:06Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* OWASP Snakes and Ladders - Web Applications */ Dates&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders-header.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Snakes and Ladders==&lt;br /&gt;
&lt;br /&gt;
Snakes and Ladders is an educational project. It uses gamification to promote awareness of application security controls and risks, and in particular knowledge of other OWASP documents and tools.&lt;br /&gt;
&lt;br /&gt;
== Editions==&lt;br /&gt;
&lt;br /&gt;
''Web Applications''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;div style=&amp;quot;height:75px;max-width:375px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_webapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;--&amp;gt;In the board game for {{#switchtablink:Web Applications Edition|web applications}}, the virtuous behaviours (ladders) are secure coding practices (from [[OWASP Proactive Controls|OWASP Proactive Controls project]] 2014-2018) and the vices (snakes) are application security risks (from [[:Category:OWASP Top Ten Project|OWASP Top Ten Project]] 2013). See also a [https://www.owasp.org/index.php/OWASP_Proactive_Controls#tab=Top_Ten_Mapping mapping between these two lists].&lt;br /&gt;
&lt;br /&gt;
''Mobile Apps''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;div style=&amp;quot;height:75px;max-width:375px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_mobapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;--&amp;gt;The identical board game for {{#switchtablink:Mobile Apps Edition|mobile apps}} uses mobile controls (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Controls Mobile Security Project Top Ten Controls] 2013) as the virtuous behaviours and mobile risks (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks Top Ten Mobile Risks] 2014 from the same project) as the vices.&lt;br /&gt;
&lt;br /&gt;
== Background ==&lt;br /&gt;
&lt;br /&gt;
This board game was created to use as an ice-breaker in application security training, but it potentially has wider appeal simply as a promotional hand-out, and maybe also more usefully as learning materials for younger coders. To cover all of that, we use the phrase &amp;quot;OWASP Snakes and Ladders is meant to be used by software programmers, big and small&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The game is quite lightweight, and does not have the same rigour or depth as the card game Cornucopia, but it is meant to be just some fun with some learning attached.&lt;br /&gt;
&lt;br /&gt;
Print-ready PDFs have been published - these are poster sized A2 (international ISO 216 [https://en.wikipedia.org/wiki/Paper_size paper size] 420×594mm, approximately 16.5×23.4in, with 3mm bleed and printers' marks). But the original files are in Adobe Illustrator, so these are also available for anyone to use and improve upon. We recommend playing using a real die and counters (markers), but you can cut out and make these from the paper sheet itself if you have scissor and glue skills.&lt;br /&gt;
&lt;br /&gt;
We hope it may be of use in any upcoming office party, celebration, festival, seasonal event, application security awareness or training exercise. Or just to help spread the word about controls and risks at work, at college or at school. If you are training anyone about the OWASP Top Ten, OWASP Proactive Controls or the OWASP Mobile projects, please consider giving each attendee a printed copy of the game as a take away.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP Snakes and Ladders is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [https://www.owasp.org/index.php/OWASP_Cornucopia OWASP Cornucopia], [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game], [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is This? ==&lt;br /&gt;
&lt;br /&gt;
Snakes and Ladders is a popular board game, with [http://en.wikipedia.org/wiki/Snakes_and_Ladders ancient provenance] imported into [http://sandradodd.com/game/snakesandladders Great Britain from Asia] in the 19th century. The original game showed the effects of good and evil, or virtues and vices. This OWASP game is a poster-sized ''print-your-own'' paper sheet with the game board on it. Just get some players together with a die and counters. The virtues are application security controls, and the vices are risks.&lt;br /&gt;
&lt;br /&gt;
==How to Play==&lt;br /&gt;
&lt;br /&gt;
* The game is for 2-6 players. &lt;br /&gt;
* Firstly print the sheet out.&lt;br /&gt;
* Give each player a coloured counter (marker). To begin, each player should throw the die to determine who plays first; the highest can lead.&lt;br /&gt;
* Put all the players' counters onto the first square labelled “Start 1”.&lt;br /&gt;
* In turn, each player rolls the die and moves their counter by the number of squares indicated on the die. At the end of the move, if a player’s counter is at the bottom end of a ladder, the counter must be moved up the ladder to the square at its higher end. Conversely, if the player’s counter is located at the mouth of a snake, the counter must be moved down to the end of the snake’s tail.&lt;br /&gt;
* ''As a better alternative to enhance learning, either require the participants to discuss the risk/control when a player reaches each square, or only allow players to climb up a ladder after a quest about the control (e.g. simply describing the control, explain the risk (one example) the named control addresses and how the control (one example) could help prevent the named it''&lt;br /&gt;
*The first player to reach “100” at the top left wins. Give a prize.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Katyanton Katy Anton] [mailto:katy.anton@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Proactive Controls]]&lt;br /&gt;
* [[:Category:OWASP Top Ten Project|OWASP Top Ten]]&lt;br /&gt;
* [[OWASP Mobile Security Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*  Web Applications v1.0/v1.1&lt;br /&gt;
** [[media:OWASP-SnakesAndLadders-WebApplications-BR.pdf|BR]], [[media:OWASP-SnakesAndLadders-WebApplications-DE.pdf|DE]], [[media:OWASP-SnakesAndLadders-WebApplications-EN.pdf|EN]], [[media:OWASP-SnakesAndLadders-WebApplications-ES.pdf|ES]], [[media:OWASP-SnakesAndLadders-WebApplications-FR.pdf|FR]], [[media:OWASP-SnakesAndLadders-WebApplications-JA.pdf|JA]],  [[media:OWASP-SnakesAndLadders-WebApplications-TR.pdf|TR]], [[media:OWASP-SnakesAndLadders-WebApplications-ZH.pdf|ZH]]&lt;br /&gt;
** {{#switchtablink:Web Applications Edition|More options...}}&lt;br /&gt;
&lt;br /&gt;
*  Mobile Apps v1.0&lt;br /&gt;
** [[media:OWASP-SnakesAndLadders-MobileApps-EN.pdf|EN]], [[media:OWASP-SnakesAndLadders-MobileApps-JA.pdf|JA]]&lt;br /&gt;
** {{#switchtablink:Mobile Apps Edition|More options...}}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [09 May 2018] Web Applications v1.20 released in EN&lt;br /&gt;
* [12 May 2017] Web Applications TR&lt;br /&gt;
* [30 Jun 2016] Free copies at OWASP AppSec EU Rome 2017&lt;br /&gt;
* [05 Jun 2016] Web Applications v1.10 released in EN&lt;br /&gt;
* [30 Dec 2015] Katy Anton becomes project co-leader&lt;br /&gt;
* [01 Dec 2015] Free copies at PHP North West user group&lt;br /&gt;
* [24 Nov 2015] Free copies at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [12 Oct 2015] Free copies at PHP Hampshire user group&lt;br /&gt;
* [29 Sep 2015] Web Application v1.0 released in PT-BR&lt;br /&gt;
* [19 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - Dutch translation&lt;br /&gt;
* [11 May 2015] Lightning talk at the [http://tickets.digitalshoreditch.com/make/#session-53 Digital Shoreditch Festival]&lt;br /&gt;
* [04 Dec 2014] Free copies at [https://www.owasp.org/index.php/London OWASP London]&lt;br /&gt;
* [02 Dec 2014] Free copies at [https://www.owasp.org/index.php/Cambridge OWASP Cambridge]&lt;br /&gt;
* [02 Dec 2014] Mobile Apps JA&lt;br /&gt;
* [25 Nov 2014] Web Applications FR, JA and ZH&lt;br /&gt;
* [31 Oct 2014] Web Applications v1.0 released in DE, EN and ES&lt;br /&gt;
* [31 Oct 2014] Mobile Apps v1.0 released in EN&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
&lt;br /&gt;
[[File:OWASPSnakesWeb-profile-small.jpg|link=]]&lt;br /&gt;
Follow two mock games running on Twitter:&lt;br /&gt;
* [https://twitter.com/OWASPSnakesWeb @OWASPSnakesWeb]&lt;br /&gt;
* [https://twitter.com/OWASPSnakesMob @OWASPSnakesMob]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Web Applications Edition =&lt;br /&gt;
&lt;br /&gt;
== OWASP Snakes and Ladders - Web Applications ==&lt;br /&gt;
&lt;br /&gt;
This was the first edition created. The objective is to raise awareness of the security controls that every web application should have, but link that with the much more widely known Top Ten Risks. The virtuous behaviours (ladders) are secure coding practices (from [[OWASP Proactive Controls|OWASP Proactive Controls project]] 2014-2018) and the vices (snakes) are application security risks (from [[:Category:OWASP Top Ten Project|OWASP Top Ten Project]] 2013-2017).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:539px;max-width:750px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Osn-poster-web-de.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Current Release ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| &lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-BR.pdf BR: Português Brasileiro]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-DE.pdf DE: Deutsch]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-EN.pdf EN: English]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-BR.png|link=File:OWASP-SnakesAndLadders-WebApplications-BR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-DE.png|link=File:OWASP-SnakesAndLadders-WebApplications-DE.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; |[[Image:Osn-webapp-EN.png|link=File:OWASP-SnakesAndLadders-WebApplications-EN.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpentes e Escadas&amp;lt;br&amp;gt;Aplicativos da Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Schlangen und Leitern&amp;lt;br&amp;gt;Web Anwendungen&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Snakes and Ladders&amp;lt;br&amp;gt;Web Applications&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-ES.pdf ES: Español]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-FR.pdf FR: Français]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-JA.pdf JA: 日本語]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-ES.png|link=File:OWASP-SnakesAndLadders-WebApplications-ES.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-FR.png|link=File:OWASP-SnakesAndLadders-WebApplications-FR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-JA.png|link=File:OWASP-SnakesAndLadders-WebApplications-JA.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpientes y Escaleras&amp;lt;br&amp;gt;Aplicaciones Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpents et Échelles&amp;lt;br&amp;gt;Application Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇とはしご&amp;lt;br&amp;gt;ウェブアプリケーション&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-TR.pdf TR: Türkçe]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-ZH.pdf ZH: 中文]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-TR.png|link=File:OWASP-SnakesAndLadders-WebApplications-TR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-ZH.png|link=File:OWASP-SnakesAndLadders-WebApplications-ZH.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Yılanlar ve Merdivenler&amp;lt;br&amp;gt;Web Uygulamaları&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇梯棋&amp;lt;br&amp;gt;WEB应用程序&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Note that some languages choose not to change the EN text for risk and control names.&lt;br /&gt;
&lt;br /&gt;
([https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-Illustrator.zip Source Adobe Illustrator file])&lt;br /&gt;
&lt;br /&gt;
== Release History ==&lt;br /&gt;
&lt;br /&gt;
* [09 May 2018] 1.2 - EN version updated&lt;br /&gt;
* [12 May 2017] 1.11 - TR version release&lt;br /&gt;
* [15 Jun 2016] 1.1 - EN version updated&lt;br /&gt;
* [29 Sep 2015] 1.0.2 - BR version release&lt;br /&gt;
* [25 Nov 2014] 1.0.2 - Additional contributors added, FR, JA and ZH versions released&lt;br /&gt;
* [05 Nov 2014] 1.0.1 - Correction to paths in source Illustrator file; PDFs regenerated&lt;br /&gt;
* [31 Oct 2014] 1.0 - First release&lt;br /&gt;
&lt;br /&gt;
== Colour Scheme 'Classic' ==&lt;br /&gt;
&lt;br /&gt;
This edition uses simple primary colours, like [https://search.disconnect.me/searchTerms/serp?search=c45431fe-9ce8-415a-ac25-1e511f45ef51 many versions] that can be seen in pictures of Snakes and Ladders games. The colours used in 'Classic' are:&lt;br /&gt;
&lt;br /&gt;
* Green&lt;br /&gt;
* Yellow&lt;br /&gt;
* White&lt;br /&gt;
* Red&lt;br /&gt;
* Blue&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:75px;max-width:100%;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_webapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The start square (1) is yellow and the final square (100) is red.&lt;br /&gt;
&lt;br /&gt;
= Mobile Apps Edition =&lt;br /&gt;
&lt;br /&gt;
== OWASP Snakes and Ladders - Mobile Apps ==&lt;br /&gt;
&lt;br /&gt;
The edition for Mobile Apps was created after working out the idea and design for the web application version of the board game. It seemed easy to replicate the idea since the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Project] lists both security controls and risks. The virtuous behaviours (ladders) are mobile controls (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Controls Mobile Security Project Top Ten Controls] 2013) and the vices (snakes) are mobile risks (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks Top Ten Mobile Risks] 2014).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:539px;max-width:750px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Osn-poster-mob-ja.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Current Release ==&lt;br /&gt;
&lt;br /&gt;
{| &lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-MobileApps-EN.pdf EN: English]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-JA.pdf JA: 日本語]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-mobapp-EN.png|link=File:OWASP-SnakesAndLadders-MobileApps-EN.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-mobapp-JA.png|link=File:OWASP-SnakesAndLadders-MobileApps-JA.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Snakes and Ladders&amp;lt;br&amp;gt;Mobile Apps&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇とはしご&amp;lt;br&amp;gt; モバイルアプリ版&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
([https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-MobileApps-Illustrator.zip Source Adobe Illustrator file])&lt;br /&gt;
&lt;br /&gt;
== Release History ==&lt;br /&gt;
&lt;br /&gt;
* [02 Dec 2014] 1.0.2 - Additional contributor added, JA version released&lt;br /&gt;
* [05 Nov 2014] 1.0.1 - Correction to paths in source Illustrator file; EN PDF regenerated&lt;br /&gt;
* [31 Oct 2014] 1.0 - First release&lt;br /&gt;
&lt;br /&gt;
== Colour Scheme 'Farringdon' ==&lt;br /&gt;
&lt;br /&gt;
Other people's versions of Snakes and Ladders [https://search.disconnect.me/searchTerms/serp?search=c45431fe-9ce8-415a-ac25-1e511f45ef51 use a wide variety of designs and colour schemes]. Thus to make a complete contrast to the edition for web applications, the colours used are the designatory colours of the underground and mainline train services that run through Colin Watson's local station at Farringdon in Clerkenwell, London EC1. The colours in 'Farringdon' are:&lt;br /&gt;
&lt;br /&gt;
* Purple (future &amp;lt;strike&amp;gt;Crossrail&amp;lt;/strike&amp;gt; Elizabeth)&lt;br /&gt;
* Yellow (Circle)&lt;br /&gt;
* White (Thameslink)&lt;br /&gt;
* Maroon (Metropolitan)&lt;br /&gt;
* Pink (Hammersmith &amp;amp; City)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:75px;max-width:100%;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_mobapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can see these colours on [https://www.tfl.gov.uk/assets/downloads/standard-tube-map.pdf tube maps] and station signage. The start square (1) is yellow and the final square (100) is maroon.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Snakesandladders-mockup.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Why Snakes &amp;amp; Ladders? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well known document, but OWASP has many other resources which provide better approaches for secure application development. In particular, there are some &amp;quot;top 10 controls&amp;quot; lists, and I wanted to highlight those. Creating a board game that features both risks and controls is a simple way to compare and contrast these aspects.&lt;br /&gt;
&lt;br /&gt;
Players do not need to know either the risks or controls on the lists, since they are just the decoration to what is otherwise standard Snakes &amp;amp; Ladders. But as players land on assigned squares, this can be used to discuss the risks and controls they are labelled with.&lt;br /&gt;
&lt;br /&gt;
Also, after undertaking some due diligence, it was noted that since Snakes &amp;amp; Ladders is such an ancient game it is not anyone's intellectual property and many others have already created thousands of different designs and versions. Other games would not meet this requirement.&lt;br /&gt;
&lt;br /&gt;
==How was the game created?==&lt;br /&gt;
By hard work! Each list of risks and controls contains ten items, so the rough layout of snakes and ladder starting and end points was sketched out on paper, as shown for web applications on the right. Instructional text was written.&lt;br /&gt;
&lt;br /&gt;
The concept was then converted into a layered Adobe Illustrator file, and the text and graphics added. This design went through a number of iterations to ensure it was legible and appealing. The PDF was exported and both the PDF and AI files added to the project page. When translations were provided, these were added as separate text layers in the source Illustrator file, and then new files uploaded again to the project.&lt;br /&gt;
&lt;br /&gt;
Once Web Applications Snakes &amp;amp; Ladders was complete, the file was duplicated and edited for Mobile Apps. This has different risks, controls and arrangement of snakes and ladders. It also has its own colour scheme.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader aware of your available time to contribute to the project. It is also important to let the Leader know how you would like to contribute and pitch in to help the project meet its goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. Please see the {{#switchtablink:Road Map_and Getting Involved|road map and getting involved section}}&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for users, translators and people to promote the project. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Snakes and Ladders is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Ziyahan Albeniz&lt;br /&gt;
* Kembolle Amilkar&lt;br /&gt;
* Katy Anton&lt;br /&gt;
* Manuel Lopez Arredondo&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Álan Carlos B. Eufrázio&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Martin Haslinger&lt;br /&gt;
* Yongliang He&lt;br /&gt;
* Manfred Hofmeier&lt;br /&gt;
* Cédric Messeguer&lt;br /&gt;
* Takanori Nakanowatari&lt;br /&gt;
* Marcos Vinícius Nunes de Arruda&lt;br /&gt;
* Riotaro Okada&lt;br /&gt;
* Gabriel Pedro S. Peres&lt;br /&gt;
* Alison S. Ribeiro&lt;br /&gt;
* Ivy Zhang&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* The project leaders and contributors to the referenced controls and risks:&lt;br /&gt;
** [[OWASP Proactive Controls]]&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Top Ten]]&lt;br /&gt;
** [[OWASP Mobile Security Project|OWASP Mobile Security]]&lt;br /&gt;
* OWASP staff for helping to set up the project and support its ongoing activities.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Recently completed:&lt;br /&gt;
* Update web applications edition to Proactive Controls 2018 [EN recently completed]&lt;br /&gt;
* Translate into other languages [TR recently completed]&lt;br /&gt;
* Handouts at events&lt;br /&gt;
&lt;br /&gt;
As of May 2018, the priorities are:&lt;br /&gt;
* Update as other referenced projects updated (e.g. Top Ten)&lt;br /&gt;
&lt;br /&gt;
Other ideas are:&lt;br /&gt;
&lt;br /&gt;
* Promote use of Snakes and Ladders &lt;br /&gt;
* Develop other boards&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Snakes and Ladders is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help are listed below.&lt;br /&gt;
&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Snakes and Ladders into that language?&lt;br /&gt;
&lt;br /&gt;
The project is on [https://crowdin.com/project/owasp-snakes-and-ladders Crowdin]&lt;br /&gt;
&lt;br /&gt;
==Use and Promote the Board Game==&lt;br /&gt;
Please help raise awareness of Snakes and Ladders:&lt;br /&gt;
* Use the game with your colleagues, friends, families, students and children&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a multi-user mobile app or web application to play the game&lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_snakes_and_ladders project mailing list] for feedback:&lt;br /&gt;
* How did you use it?&lt;br /&gt;
* What is people's reaction?&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What doesn't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other boards would you like to see?&lt;br /&gt;
&lt;br /&gt;
==Create a Board==&lt;br /&gt;
Do you have an idea for your own application security Snakes and Ladders board? Please contribute your ideas via the [https://lists.owasp.org/mailman/listinfo/owasp_snakes_and_ladders mailing list].&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Snakes_and_Ladders&amp;diff=240554</id>
		<title>OWASP Snakes and Ladders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Snakes_and_Ladders&amp;diff=240554"/>
				<updated>2018-05-09T17:57:50Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Editions */ To reflect release&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders-header.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Snakes and Ladders==&lt;br /&gt;
&lt;br /&gt;
Snakes and Ladders is an educational project. It uses gamification to promote awareness of application security controls and risks, and in particular knowledge of other OWASP documents and tools.&lt;br /&gt;
&lt;br /&gt;
== Editions==&lt;br /&gt;
&lt;br /&gt;
''Web Applications''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;div style=&amp;quot;height:75px;max-width:375px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_webapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;--&amp;gt;In the board game for {{#switchtablink:Web Applications Edition|web applications}}, the virtuous behaviours (ladders) are secure coding practices (from [[OWASP Proactive Controls|OWASP Proactive Controls project]] 2014-2018) and the vices (snakes) are application security risks (from [[:Category:OWASP Top Ten Project|OWASP Top Ten Project]] 2013). See also a [https://www.owasp.org/index.php/OWASP_Proactive_Controls#tab=Top_Ten_Mapping mapping between these two lists].&lt;br /&gt;
&lt;br /&gt;
''Mobile Apps''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;div style=&amp;quot;height:75px;max-width:375px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_mobapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;--&amp;gt;The identical board game for {{#switchtablink:Mobile Apps Edition|mobile apps}} uses mobile controls (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Controls Mobile Security Project Top Ten Controls] 2013) as the virtuous behaviours and mobile risks (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks Top Ten Mobile Risks] 2014 from the same project) as the vices.&lt;br /&gt;
&lt;br /&gt;
== Background ==&lt;br /&gt;
&lt;br /&gt;
This board game was created to use as an ice-breaker in application security training, but it potentially has wider appeal simply as a promotional hand-out, and maybe also more usefully as learning materials for younger coders. To cover all of that, we use the phrase &amp;quot;OWASP Snakes and Ladders is meant to be used by software programmers, big and small&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The game is quite lightweight, and does not have the same rigour or depth as the card game Cornucopia, but it is meant to be just some fun with some learning attached.&lt;br /&gt;
&lt;br /&gt;
Print-ready PDFs have been published - these are poster sized A2 (international ISO 216 [https://en.wikipedia.org/wiki/Paper_size paper size] 420×594mm, approximately 16.5×23.4in, with 3mm bleed and printers' marks). But the original files are in Adobe Illustrator, so these are also available for anyone to use and improve upon. We recommend playing using a real die and counters (markers), but you can cut out and make these from the paper sheet itself if you have scissor and glue skills.&lt;br /&gt;
&lt;br /&gt;
We hope it may be of use in any upcoming office party, celebration, festival, seasonal event, application security awareness or training exercise. Or just to help spread the word about controls and risks at work, at college or at school. If you are training anyone about the OWASP Top Ten, OWASP Proactive Controls or the OWASP Mobile projects, please consider giving each attendee a printed copy of the game as a take away.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP Snakes and Ladders is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [https://www.owasp.org/index.php/OWASP_Cornucopia OWASP Cornucopia], [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game], [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is This? ==&lt;br /&gt;
&lt;br /&gt;
Snakes and Ladders is a popular board game, with [http://en.wikipedia.org/wiki/Snakes_and_Ladders ancient provenance] imported into [http://sandradodd.com/game/snakesandladders Great Britain from Asia] in the 19th century. The original game showed the effects of good and evil, or virtues and vices. This OWASP game is a poster-sized ''print-your-own'' paper sheet with the game board on it. Just get some players together with a die and counters. The virtues are application security controls, and the vices are risks.&lt;br /&gt;
&lt;br /&gt;
==How to Play==&lt;br /&gt;
&lt;br /&gt;
* The game is for 2-6 players. &lt;br /&gt;
* Firstly print the sheet out.&lt;br /&gt;
* Give each player a coloured counter (marker). To begin, each player should throw the die to determine who plays first; the highest can lead.&lt;br /&gt;
* Put all the players' counters onto the first square labelled “Start 1”.&lt;br /&gt;
* In turn, each player rolls the die and moves their counter by the number of squares indicated on the die. At the end of the move, if a player’s counter is at the bottom end of a ladder, the counter must be moved up the ladder to the square at its higher end. Conversely, if the player’s counter is located at the mouth of a snake, the counter must be moved down to the end of the snake’s tail.&lt;br /&gt;
* ''As a better alternative to enhance learning, either require the participants to discuss the risk/control when a player reaches each square, or only allow players to climb up a ladder after a quest about the control (e.g. simply describing the control, explain the risk (one example) the named control addresses and how the control (one example) could help prevent the named it''&lt;br /&gt;
*The first player to reach “100” at the top left wins. Give a prize.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Katyanton Katy Anton] [mailto:katy.anton@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Proactive Controls]]&lt;br /&gt;
* [[:Category:OWASP Top Ten Project|OWASP Top Ten]]&lt;br /&gt;
* [[OWASP Mobile Security Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*  Web Applications v1.0/v1.1&lt;br /&gt;
** [[media:OWASP-SnakesAndLadders-WebApplications-BR.pdf|BR]], [[media:OWASP-SnakesAndLadders-WebApplications-DE.pdf|DE]], [[media:OWASP-SnakesAndLadders-WebApplications-EN.pdf|EN]], [[media:OWASP-SnakesAndLadders-WebApplications-ES.pdf|ES]], [[media:OWASP-SnakesAndLadders-WebApplications-FR.pdf|FR]], [[media:OWASP-SnakesAndLadders-WebApplications-JA.pdf|JA]],  [[media:OWASP-SnakesAndLadders-WebApplications-TR.pdf|TR]], [[media:OWASP-SnakesAndLadders-WebApplications-ZH.pdf|ZH]]&lt;br /&gt;
** {{#switchtablink:Web Applications Edition|More options...}}&lt;br /&gt;
&lt;br /&gt;
*  Mobile Apps v1.0&lt;br /&gt;
** [[media:OWASP-SnakesAndLadders-MobileApps-EN.pdf|EN]], [[media:OWASP-SnakesAndLadders-MobileApps-JA.pdf|JA]]&lt;br /&gt;
** {{#switchtablink:Mobile Apps Edition|More options...}}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [09 May 2018] Web Applications v1.20 released in EN&lt;br /&gt;
* [12 May 2017] Web Applications TR&lt;br /&gt;
* [30 Jun 2016] Free copies at OWASP AppSec EU Rome 2017&lt;br /&gt;
* [05 Jun 2016] Web Applications v1.10 released in EN&lt;br /&gt;
* [30 Dec 2015] Katy Anton becomes project co-leader&lt;br /&gt;
* [01 Dec 2015] Free copies at PHP North West user group&lt;br /&gt;
* [24 Nov 2015] Free copies at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [12 Oct 2015] Free copies at PHP Hampshire user group&lt;br /&gt;
* [29 Sep 2015] Web Application v1.0 released in PT-BR&lt;br /&gt;
* [19 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - Dutch translation&lt;br /&gt;
* [11 May 2015] Lightning talk at the [http://tickets.digitalshoreditch.com/make/#session-53 Digital Shoreditch Festival]&lt;br /&gt;
* [04 Dec 2014] Free copies at [https://www.owasp.org/index.php/London OWASP London]&lt;br /&gt;
* [02 Dec 2014] Free copies at [https://www.owasp.org/index.php/Cambridge OWASP Cambridge]&lt;br /&gt;
* [02 Dec 2014] Mobile Apps JA&lt;br /&gt;
* [25 Nov 2014] Web Applications FR, JA and ZH&lt;br /&gt;
* [31 Oct 2014] Web Applications v1.0 released in DE, EN and ES&lt;br /&gt;
* [31 Oct 2014] Mobile Apps v1.0 released in EN&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
&lt;br /&gt;
[[File:OWASPSnakesWeb-profile-small.jpg|link=]]&lt;br /&gt;
Follow two mock games running on Twitter:&lt;br /&gt;
* [https://twitter.com/OWASPSnakesWeb @OWASPSnakesWeb]&lt;br /&gt;
* [https://twitter.com/OWASPSnakesMob @OWASPSnakesMob]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Web Applications Edition =&lt;br /&gt;
&lt;br /&gt;
== OWASP Snakes and Ladders - Web Applications ==&lt;br /&gt;
&lt;br /&gt;
This was the first edition created. The objective is to raise awareness of the security controls that every web application should have, but link that with the much more widely known Top Ten Risks. The virtuous behaviours (ladders) are secure coding practices (from [[OWASP Proactive Controls|OWASP Proactive Controls project]] 2014-2018) and the vices (snakes) are application security risks (from [[:Category:OWASP Top Ten Project|OWASP Top Ten Project]] 2013).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:539px;max-width:750px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Osn-poster-web-de.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Current Release ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| &lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-BR.pdf BR: Português Brasileiro]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-DE.pdf DE: Deutsch]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-EN.pdf EN: English]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-BR.png|link=File:OWASP-SnakesAndLadders-WebApplications-BR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-DE.png|link=File:OWASP-SnakesAndLadders-WebApplications-DE.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; |[[Image:Osn-webapp-EN.png|link=File:OWASP-SnakesAndLadders-WebApplications-EN.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpentes e Escadas&amp;lt;br&amp;gt;Aplicativos da Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Schlangen und Leitern&amp;lt;br&amp;gt;Web Anwendungen&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Snakes and Ladders&amp;lt;br&amp;gt;Web Applications&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-ES.pdf ES: Español]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-FR.pdf FR: Français]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-JA.pdf JA: 日本語]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-ES.png|link=File:OWASP-SnakesAndLadders-WebApplications-ES.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-FR.png|link=File:OWASP-SnakesAndLadders-WebApplications-FR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-JA.png|link=File:OWASP-SnakesAndLadders-WebApplications-JA.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpientes y Escaleras&amp;lt;br&amp;gt;Aplicaciones Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpents et Échelles&amp;lt;br&amp;gt;Application Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇とはしご&amp;lt;br&amp;gt;ウェブアプリケーション&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-TR.pdf TR: Türkçe]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-ZH.pdf ZH: 中文]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-TR.png|link=File:OWASP-SnakesAndLadders-WebApplications-TR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-ZH.png|link=File:OWASP-SnakesAndLadders-WebApplications-ZH.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Yılanlar ve Merdivenler&amp;lt;br&amp;gt;Web Uygulamaları&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇梯棋&amp;lt;br&amp;gt;WEB应用程序&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Note that some languages choose not to change the EN text for risk and control names.&lt;br /&gt;
&lt;br /&gt;
([https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-Illustrator.zip Source Adobe Illustrator file])&lt;br /&gt;
&lt;br /&gt;
== Release History ==&lt;br /&gt;
&lt;br /&gt;
* [09 May 2018] 1.2 - EN version updated&lt;br /&gt;
* [12 May 2017] 1.11 - TR version release&lt;br /&gt;
* [15 Jun 2016] 1.1 - EN version updated&lt;br /&gt;
* [29 Sep 2015] 1.0.2 - BR version release&lt;br /&gt;
* [25 Nov 2014] 1.0.2 - Additional contributors added, FR, JA and ZH versions released&lt;br /&gt;
* [05 Nov 2014] 1.0.1 - Correction to paths in source Illustrator file; PDFs regenerated&lt;br /&gt;
* [31 Oct 2014] 1.0 - First release&lt;br /&gt;
&lt;br /&gt;
== Colour Scheme 'Classic' ==&lt;br /&gt;
&lt;br /&gt;
This edition uses simple primary colours, like [https://search.disconnect.me/searchTerms/serp?search=c45431fe-9ce8-415a-ac25-1e511f45ef51 many versions] that can be seen in pictures of Snakes and Ladders games. The colours used in 'Classic' are:&lt;br /&gt;
&lt;br /&gt;
* Green&lt;br /&gt;
* Yellow&lt;br /&gt;
* White&lt;br /&gt;
* Red&lt;br /&gt;
* Blue&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:75px;max-width:100%;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_webapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The start square (1) is yellow and the final square (100) is red.&lt;br /&gt;
&lt;br /&gt;
= Mobile Apps Edition =&lt;br /&gt;
&lt;br /&gt;
== OWASP Snakes and Ladders - Mobile Apps ==&lt;br /&gt;
&lt;br /&gt;
The edition for Mobile Apps was created after working out the idea and design for the web application version of the board game. It seemed easy to replicate the idea since the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Project] lists both security controls and risks. The virtuous behaviours (ladders) are mobile controls (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Controls Mobile Security Project Top Ten Controls] 2013) and the vices (snakes) are mobile risks (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks Top Ten Mobile Risks] 2014).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:539px;max-width:750px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Osn-poster-mob-ja.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Current Release ==&lt;br /&gt;
&lt;br /&gt;
{| &lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-MobileApps-EN.pdf EN: English]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-JA.pdf JA: 日本語]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-mobapp-EN.png|link=File:OWASP-SnakesAndLadders-MobileApps-EN.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-mobapp-JA.png|link=File:OWASP-SnakesAndLadders-MobileApps-JA.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Snakes and Ladders&amp;lt;br&amp;gt;Mobile Apps&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇とはしご&amp;lt;br&amp;gt; モバイルアプリ版&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
([https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-MobileApps-Illustrator.zip Source Adobe Illustrator file])&lt;br /&gt;
&lt;br /&gt;
== Release History ==&lt;br /&gt;
&lt;br /&gt;
* [02 Dec 2014] 1.0.2 - Additional contributor added, JA version released&lt;br /&gt;
* [05 Nov 2014] 1.0.1 - Correction to paths in source Illustrator file; EN PDF regenerated&lt;br /&gt;
* [31 Oct 2014] 1.0 - First release&lt;br /&gt;
&lt;br /&gt;
== Colour Scheme 'Farringdon' ==&lt;br /&gt;
&lt;br /&gt;
Other people's versions of Snakes and Ladders [https://search.disconnect.me/searchTerms/serp?search=c45431fe-9ce8-415a-ac25-1e511f45ef51 use a wide variety of designs and colour schemes]. Thus to make a complete contrast to the edition for web applications, the colours used are the designatory colours of the underground and mainline train services that run through Colin Watson's local station at Farringdon in Clerkenwell, London EC1. The colours in 'Farringdon' are:&lt;br /&gt;
&lt;br /&gt;
* Purple (future &amp;lt;strike&amp;gt;Crossrail&amp;lt;/strike&amp;gt; Elizabeth)&lt;br /&gt;
* Yellow (Circle)&lt;br /&gt;
* White (Thameslink)&lt;br /&gt;
* Maroon (Metropolitan)&lt;br /&gt;
* Pink (Hammersmith &amp;amp; City)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:75px;max-width:100%;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_mobapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can see these colours on [https://www.tfl.gov.uk/assets/downloads/standard-tube-map.pdf tube maps] and station signage. The start square (1) is yellow and the final square (100) is maroon.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Snakesandladders-mockup.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Why Snakes &amp;amp; Ladders? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well known document, but OWASP has many other resources which provide better approaches for secure application development. In particular, there are some &amp;quot;top 10 controls&amp;quot; lists, and I wanted to highlight those. Creating a board game that features both risks and controls is a simple way to compare and contrast these aspects.&lt;br /&gt;
&lt;br /&gt;
Players do not need to know either the risks or controls on the lists, since they are just the decoration to what is otherwise standard Snakes &amp;amp; Ladders. But as players land on assigned squares, this can be used to discuss the risks and controls they are labelled with.&lt;br /&gt;
&lt;br /&gt;
Also, after undertaking some due diligence, it was noted that since Snakes &amp;amp; Ladders is such an ancient game it is not anyone's intellectual property and many others have already created thousands of different designs and versions. Other games would not meet this requirement.&lt;br /&gt;
&lt;br /&gt;
==How was the game created?==&lt;br /&gt;
By hard work! Each list of risks and controls contains ten items, so the rough layout of snakes and ladder starting and end points was sketched out on paper, as shown for web applications on the right. Instructional text was written.&lt;br /&gt;
&lt;br /&gt;
The concept was then converted into a layered Adobe Illustrator file, and the text and graphics added. This design went through a number of iterations to ensure it was legible and appealing. The PDF was exported and both the PDF and AI files added to the project page. When translations were provided, these were added as separate text layers in the source Illustrator file, and then new files uploaded again to the project.&lt;br /&gt;
&lt;br /&gt;
Once Web Applications Snakes &amp;amp; Ladders was complete, the file was duplicated and edited for Mobile Apps. This has different risks, controls and arrangement of snakes and ladders. It also has its own colour scheme.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader aware of your available time to contribute to the project. It is also important to let the Leader know how you would like to contribute and pitch in to help the project meet its goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. Please see the {{#switchtablink:Road Map_and Getting Involved|road map and getting involved section}}&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for users, translators and people to promote the project. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Snakes and Ladders is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Ziyahan Albeniz&lt;br /&gt;
* Kembolle Amilkar&lt;br /&gt;
* Katy Anton&lt;br /&gt;
* Manuel Lopez Arredondo&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Álan Carlos B. Eufrázio&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Martin Haslinger&lt;br /&gt;
* Yongliang He&lt;br /&gt;
* Manfred Hofmeier&lt;br /&gt;
* Cédric Messeguer&lt;br /&gt;
* Takanori Nakanowatari&lt;br /&gt;
* Marcos Vinícius Nunes de Arruda&lt;br /&gt;
* Riotaro Okada&lt;br /&gt;
* Gabriel Pedro S. Peres&lt;br /&gt;
* Alison S. Ribeiro&lt;br /&gt;
* Ivy Zhang&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* The project leaders and contributors to the referenced controls and risks:&lt;br /&gt;
** [[OWASP Proactive Controls]]&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Top Ten]]&lt;br /&gt;
** [[OWASP Mobile Security Project|OWASP Mobile Security]]&lt;br /&gt;
* OWASP staff for helping to set up the project and support its ongoing activities.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Recently completed:&lt;br /&gt;
* Update web applications edition to Proactive Controls 2018 [EN recently completed]&lt;br /&gt;
* Translate into other languages [TR recently completed]&lt;br /&gt;
* Handouts at events&lt;br /&gt;
&lt;br /&gt;
As of May 2018, the priorities are:&lt;br /&gt;
* Update as other referenced projects updated (e.g. Top Ten)&lt;br /&gt;
&lt;br /&gt;
Other ideas are:&lt;br /&gt;
&lt;br /&gt;
* Promote use of Snakes and Ladders &lt;br /&gt;
* Develop other boards&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Snakes and Ladders is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help are listed below.&lt;br /&gt;
&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Snakes and Ladders into that language?&lt;br /&gt;
&lt;br /&gt;
The project is on [https://crowdin.com/project/owasp-snakes-and-ladders Crowdin]&lt;br /&gt;
&lt;br /&gt;
==Use and Promote the Board Game==&lt;br /&gt;
Please help raise awareness of Snakes and Ladders:&lt;br /&gt;
* Use the game with your colleagues, friends, families, students and children&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a multi-user mobile app or web application to play the game&lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_snakes_and_ladders project mailing list] for feedback:&lt;br /&gt;
* How did you use it?&lt;br /&gt;
* What is people's reaction?&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What doesn't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other boards would you like to see?&lt;br /&gt;
&lt;br /&gt;
==Create a Board==&lt;br /&gt;
Do you have an idea for your own application security Snakes and Ladders board? Please contribute your ideas via the [https://lists.owasp.org/mailman/listinfo/owasp_snakes_and_ladders mailing list].&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Snakes_and_Ladders&amp;diff=240553</id>
		<title>OWASP Snakes and Ladders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Snakes_and_Ladders&amp;diff=240553"/>
				<updated>2018-05-09T17:57:16Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: News v1.20 EN / Project plan&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders-header.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Snakes and Ladders==&lt;br /&gt;
&lt;br /&gt;
Snakes and Ladders is an educational project. It uses gamification to promote awareness of application security controls and risks, and in particular knowledge of other OWASP documents and tools.&lt;br /&gt;
&lt;br /&gt;
== Editions==&lt;br /&gt;
&lt;br /&gt;
''Web Applications''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;div style=&amp;quot;height:75px;max-width:375px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_webapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;--&amp;gt;In the board game for {{#switchtablink:Web Applications Edition|web applications}}, the virtuous behaviours (ladders) are secure coding practices (from [[OWASP Proactive Controls|OWASP Proactive Controls project]] 2014-2016) and the vices (snakes) are application security risks (from [[:Category:OWASP Top Ten Project|OWASP Top Ten Project]] 2013). See also a [https://www.owasp.org/index.php/OWASP_Proactive_Controls#tab=Top_Ten_Mapping mapping between these two lists].&lt;br /&gt;
&lt;br /&gt;
''Mobile Apps''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;div style=&amp;quot;height:75px;max-width:375px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_mobapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;--&amp;gt;The identical board game for {{#switchtablink:Mobile Apps Edition|mobile apps}} uses mobile controls (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Controls Mobile Security Project Top Ten Controls] 2013) as the virtuous behaviours and mobile risks (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks Top Ten Mobile Risks] 2014 from the same project) as the vices.&lt;br /&gt;
&lt;br /&gt;
''Application Intrusion Detection''&lt;br /&gt;
&lt;br /&gt;
Coming soon.&lt;br /&gt;
&lt;br /&gt;
== Background ==&lt;br /&gt;
&lt;br /&gt;
This board game was created to use as an ice-breaker in application security training, but it potentially has wider appeal simply as a promotional hand-out, and maybe also more usefully as learning materials for younger coders. To cover all of that, we use the phrase &amp;quot;OWASP Snakes and Ladders is meant to be used by software programmers, big and small&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The game is quite lightweight, and does not have the same rigour or depth as the card game Cornucopia, but it is meant to be just some fun with some learning attached.&lt;br /&gt;
&lt;br /&gt;
Print-ready PDFs have been published - these are poster sized A2 (international ISO 216 [https://en.wikipedia.org/wiki/Paper_size paper size] 420×594mm, approximately 16.5×23.4in, with 3mm bleed and printers' marks). But the original files are in Adobe Illustrator, so these are also available for anyone to use and improve upon. We recommend playing using a real die and counters (markers), but you can cut out and make these from the paper sheet itself if you have scissor and glue skills.&lt;br /&gt;
&lt;br /&gt;
We hope it may be of use in any upcoming office party, celebration, festival, seasonal event, application security awareness or training exercise. Or just to help spread the word about controls and risks at work, at college or at school. If you are training anyone about the OWASP Top Ten, OWASP Proactive Controls or the OWASP Mobile projects, please consider giving each attendee a printed copy of the game as a take away.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP Snakes and Ladders is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [https://www.owasp.org/index.php/OWASP_Cornucopia OWASP Cornucopia], [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game], [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is This? ==&lt;br /&gt;
&lt;br /&gt;
Snakes and Ladders is a popular board game, with [http://en.wikipedia.org/wiki/Snakes_and_Ladders ancient provenance] imported into [http://sandradodd.com/game/snakesandladders Great Britain from Asia] in the 19th century. The original game showed the effects of good and evil, or virtues and vices. This OWASP game is a poster-sized ''print-your-own'' paper sheet with the game board on it. Just get some players together with a die and counters. The virtues are application security controls, and the vices are risks.&lt;br /&gt;
&lt;br /&gt;
==How to Play==&lt;br /&gt;
&lt;br /&gt;
* The game is for 2-6 players. &lt;br /&gt;
* Firstly print the sheet out.&lt;br /&gt;
* Give each player a coloured counter (marker). To begin, each player should throw the die to determine who plays first; the highest can lead.&lt;br /&gt;
* Put all the players' counters onto the first square labelled “Start 1”.&lt;br /&gt;
* In turn, each player rolls the die and moves their counter by the number of squares indicated on the die. At the end of the move, if a player’s counter is at the bottom end of a ladder, the counter must be moved up the ladder to the square at its higher end. Conversely, if the player’s counter is located at the mouth of a snake, the counter must be moved down to the end of the snake’s tail.&lt;br /&gt;
* ''As a better alternative to enhance learning, either require the participants to discuss the risk/control when a player reaches each square, or only allow players to climb up a ladder after a quest about the control (e.g. simply describing the control, explain the risk (one example) the named control addresses and how the control (one example) could help prevent the named it''&lt;br /&gt;
*The first player to reach “100” at the top left wins. Give a prize.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Katyanton Katy Anton] [mailto:katy.anton@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Proactive Controls]]&lt;br /&gt;
* [[:Category:OWASP Top Ten Project|OWASP Top Ten]]&lt;br /&gt;
* [[OWASP Mobile Security Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*  Web Applications v1.0/v1.1&lt;br /&gt;
** [[media:OWASP-SnakesAndLadders-WebApplications-BR.pdf|BR]], [[media:OWASP-SnakesAndLadders-WebApplications-DE.pdf|DE]], [[media:OWASP-SnakesAndLadders-WebApplications-EN.pdf|EN]], [[media:OWASP-SnakesAndLadders-WebApplications-ES.pdf|ES]], [[media:OWASP-SnakesAndLadders-WebApplications-FR.pdf|FR]], [[media:OWASP-SnakesAndLadders-WebApplications-JA.pdf|JA]],  [[media:OWASP-SnakesAndLadders-WebApplications-TR.pdf|TR]], [[media:OWASP-SnakesAndLadders-WebApplications-ZH.pdf|ZH]]&lt;br /&gt;
** {{#switchtablink:Web Applications Edition|More options...}}&lt;br /&gt;
&lt;br /&gt;
*  Mobile Apps v1.0&lt;br /&gt;
** [[media:OWASP-SnakesAndLadders-MobileApps-EN.pdf|EN]], [[media:OWASP-SnakesAndLadders-MobileApps-JA.pdf|JA]]&lt;br /&gt;
** {{#switchtablink:Mobile Apps Edition|More options...}}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [09 May 2018] Web Applications v1.20 released in EN&lt;br /&gt;
* [12 May 2017] Web Applications TR&lt;br /&gt;
* [30 Jun 2016] Free copies at OWASP AppSec EU Rome 2017&lt;br /&gt;
* [05 Jun 2016] Web Applications v1.10 released in EN&lt;br /&gt;
* [30 Dec 2015] Katy Anton becomes project co-leader&lt;br /&gt;
* [01 Dec 2015] Free copies at PHP North West user group&lt;br /&gt;
* [24 Nov 2015] Free copies at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [12 Oct 2015] Free copies at PHP Hampshire user group&lt;br /&gt;
* [29 Sep 2015] Web Application v1.0 released in PT-BR&lt;br /&gt;
* [19 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - Dutch translation&lt;br /&gt;
* [11 May 2015] Lightning talk at the [http://tickets.digitalshoreditch.com/make/#session-53 Digital Shoreditch Festival]&lt;br /&gt;
* [04 Dec 2014] Free copies at [https://www.owasp.org/index.php/London OWASP London]&lt;br /&gt;
* [02 Dec 2014] Free copies at [https://www.owasp.org/index.php/Cambridge OWASP Cambridge]&lt;br /&gt;
* [02 Dec 2014] Mobile Apps JA&lt;br /&gt;
* [25 Nov 2014] Web Applications FR, JA and ZH&lt;br /&gt;
* [31 Oct 2014] Web Applications v1.0 released in DE, EN and ES&lt;br /&gt;
* [31 Oct 2014] Mobile Apps v1.0 released in EN&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
&lt;br /&gt;
[[File:OWASPSnakesWeb-profile-small.jpg|link=]]&lt;br /&gt;
Follow two mock games running on Twitter:&lt;br /&gt;
* [https://twitter.com/OWASPSnakesWeb @OWASPSnakesWeb]&lt;br /&gt;
* [https://twitter.com/OWASPSnakesMob @OWASPSnakesMob]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Web Applications Edition =&lt;br /&gt;
&lt;br /&gt;
== OWASP Snakes and Ladders - Web Applications ==&lt;br /&gt;
&lt;br /&gt;
This was the first edition created. The objective is to raise awareness of the security controls that every web application should have, but link that with the much more widely known Top Ten Risks. The virtuous behaviours (ladders) are secure coding practices (from [[OWASP Proactive Controls|OWASP Proactive Controls project]] 2014-2018) and the vices (snakes) are application security risks (from [[:Category:OWASP Top Ten Project|OWASP Top Ten Project]] 2013).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:539px;max-width:750px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Osn-poster-web-de.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Current Release ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| &lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-BR.pdf BR: Português Brasileiro]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-DE.pdf DE: Deutsch]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-EN.pdf EN: English]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-BR.png|link=File:OWASP-SnakesAndLadders-WebApplications-BR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-DE.png|link=File:OWASP-SnakesAndLadders-WebApplications-DE.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; |[[Image:Osn-webapp-EN.png|link=File:OWASP-SnakesAndLadders-WebApplications-EN.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpentes e Escadas&amp;lt;br&amp;gt;Aplicativos da Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Schlangen und Leitern&amp;lt;br&amp;gt;Web Anwendungen&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Snakes and Ladders&amp;lt;br&amp;gt;Web Applications&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-ES.pdf ES: Español]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-FR.pdf FR: Français]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-JA.pdf JA: 日本語]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-ES.png|link=File:OWASP-SnakesAndLadders-WebApplications-ES.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-FR.png|link=File:OWASP-SnakesAndLadders-WebApplications-FR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-JA.png|link=File:OWASP-SnakesAndLadders-WebApplications-JA.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpientes y Escaleras&amp;lt;br&amp;gt;Aplicaciones Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpents et Échelles&amp;lt;br&amp;gt;Application Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇とはしご&amp;lt;br&amp;gt;ウェブアプリケーション&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-TR.pdf TR: Türkçe]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-ZH.pdf ZH: 中文]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-TR.png|link=File:OWASP-SnakesAndLadders-WebApplications-TR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-ZH.png|link=File:OWASP-SnakesAndLadders-WebApplications-ZH.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Yılanlar ve Merdivenler&amp;lt;br&amp;gt;Web Uygulamaları&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇梯棋&amp;lt;br&amp;gt;WEB应用程序&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Note that some languages choose not to change the EN text for risk and control names.&lt;br /&gt;
&lt;br /&gt;
([https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-Illustrator.zip Source Adobe Illustrator file])&lt;br /&gt;
&lt;br /&gt;
== Release History ==&lt;br /&gt;
&lt;br /&gt;
* [09 May 2018] 1.2 - EN version updated&lt;br /&gt;
* [12 May 2017] 1.11 - TR version release&lt;br /&gt;
* [15 Jun 2016] 1.1 - EN version updated&lt;br /&gt;
* [29 Sep 2015] 1.0.2 - BR version release&lt;br /&gt;
* [25 Nov 2014] 1.0.2 - Additional contributors added, FR, JA and ZH versions released&lt;br /&gt;
* [05 Nov 2014] 1.0.1 - Correction to paths in source Illustrator file; PDFs regenerated&lt;br /&gt;
* [31 Oct 2014] 1.0 - First release&lt;br /&gt;
&lt;br /&gt;
== Colour Scheme 'Classic' ==&lt;br /&gt;
&lt;br /&gt;
This edition uses simple primary colours, like [https://search.disconnect.me/searchTerms/serp?search=c45431fe-9ce8-415a-ac25-1e511f45ef51 many versions] that can be seen in pictures of Snakes and Ladders games. The colours used in 'Classic' are:&lt;br /&gt;
&lt;br /&gt;
* Green&lt;br /&gt;
* Yellow&lt;br /&gt;
* White&lt;br /&gt;
* Red&lt;br /&gt;
* Blue&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:75px;max-width:100%;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_webapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The start square (1) is yellow and the final square (100) is red.&lt;br /&gt;
&lt;br /&gt;
= Mobile Apps Edition =&lt;br /&gt;
&lt;br /&gt;
== OWASP Snakes and Ladders - Mobile Apps ==&lt;br /&gt;
&lt;br /&gt;
The edition for Mobile Apps was created after working out the idea and design for the web application version of the board game. It seemed easy to replicate the idea since the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Project] lists both security controls and risks. The virtuous behaviours (ladders) are mobile controls (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Controls Mobile Security Project Top Ten Controls] 2013) and the vices (snakes) are mobile risks (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks Top Ten Mobile Risks] 2014).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:539px;max-width:750px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Osn-poster-mob-ja.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Current Release ==&lt;br /&gt;
&lt;br /&gt;
{| &lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-MobileApps-EN.pdf EN: English]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-JA.pdf JA: 日本語]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-mobapp-EN.png|link=File:OWASP-SnakesAndLadders-MobileApps-EN.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-mobapp-JA.png|link=File:OWASP-SnakesAndLadders-MobileApps-JA.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Snakes and Ladders&amp;lt;br&amp;gt;Mobile Apps&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇とはしご&amp;lt;br&amp;gt; モバイルアプリ版&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
([https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-MobileApps-Illustrator.zip Source Adobe Illustrator file])&lt;br /&gt;
&lt;br /&gt;
== Release History ==&lt;br /&gt;
&lt;br /&gt;
* [02 Dec 2014] 1.0.2 - Additional contributor added, JA version released&lt;br /&gt;
* [05 Nov 2014] 1.0.1 - Correction to paths in source Illustrator file; EN PDF regenerated&lt;br /&gt;
* [31 Oct 2014] 1.0 - First release&lt;br /&gt;
&lt;br /&gt;
== Colour Scheme 'Farringdon' ==&lt;br /&gt;
&lt;br /&gt;
Other people's versions of Snakes and Ladders [https://search.disconnect.me/searchTerms/serp?search=c45431fe-9ce8-415a-ac25-1e511f45ef51 use a wide variety of designs and colour schemes]. Thus to make a complete contrast to the edition for web applications, the colours used are the designatory colours of the underground and mainline train services that run through Colin Watson's local station at Farringdon in Clerkenwell, London EC1. The colours in 'Farringdon' are:&lt;br /&gt;
&lt;br /&gt;
* Purple (future &amp;lt;strike&amp;gt;Crossrail&amp;lt;/strike&amp;gt; Elizabeth)&lt;br /&gt;
* Yellow (Circle)&lt;br /&gt;
* White (Thameslink)&lt;br /&gt;
* Maroon (Metropolitan)&lt;br /&gt;
* Pink (Hammersmith &amp;amp; City)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:75px;max-width:100%;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_mobapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can see these colours on [https://www.tfl.gov.uk/assets/downloads/standard-tube-map.pdf tube maps] and station signage. The start square (1) is yellow and the final square (100) is maroon.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Snakesandladders-mockup.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Why Snakes &amp;amp; Ladders? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well known document, but OWASP has many other resources which provide better approaches for secure application development. In particular, there are some &amp;quot;top 10 controls&amp;quot; lists, and I wanted to highlight those. Creating a board game that features both risks and controls is a simple way to compare and contrast these aspects.&lt;br /&gt;
&lt;br /&gt;
Players do not need to know either the risks or controls on the lists, since they are just the decoration to what is otherwise standard Snakes &amp;amp; Ladders. But as players land on assigned squares, this can be used to discuss the risks and controls they are labelled with.&lt;br /&gt;
&lt;br /&gt;
Also, after undertaking some due diligence, it was noted that since Snakes &amp;amp; Ladders is such an ancient game it is not anyone's intellectual property and many others have already created thousands of different designs and versions. Other games would not meet this requirement.&lt;br /&gt;
&lt;br /&gt;
==How was the game created?==&lt;br /&gt;
By hard work! Each list of risks and controls contains ten items, so the rough layout of snakes and ladder starting and end points was sketched out on paper, as shown for web applications on the right. Instructional text was written.&lt;br /&gt;
&lt;br /&gt;
The concept was then converted into a layered Adobe Illustrator file, and the text and graphics added. This design went through a number of iterations to ensure it was legible and appealing. The PDF was exported and both the PDF and AI files added to the project page. When translations were provided, these were added as separate text layers in the source Illustrator file, and then new files uploaded again to the project.&lt;br /&gt;
&lt;br /&gt;
Once Web Applications Snakes &amp;amp; Ladders was complete, the file was duplicated and edited for Mobile Apps. This has different risks, controls and arrangement of snakes and ladders. It also has its own colour scheme.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader aware of your available time to contribute to the project. It is also important to let the Leader know how you would like to contribute and pitch in to help the project meet its goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. Please see the {{#switchtablink:Road Map_and Getting Involved|road map and getting involved section}}&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for users, translators and people to promote the project. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Snakes and Ladders is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Ziyahan Albeniz&lt;br /&gt;
* Kembolle Amilkar&lt;br /&gt;
* Katy Anton&lt;br /&gt;
* Manuel Lopez Arredondo&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Álan Carlos B. Eufrázio&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Martin Haslinger&lt;br /&gt;
* Yongliang He&lt;br /&gt;
* Manfred Hofmeier&lt;br /&gt;
* Cédric Messeguer&lt;br /&gt;
* Takanori Nakanowatari&lt;br /&gt;
* Marcos Vinícius Nunes de Arruda&lt;br /&gt;
* Riotaro Okada&lt;br /&gt;
* Gabriel Pedro S. Peres&lt;br /&gt;
* Alison S. Ribeiro&lt;br /&gt;
* Ivy Zhang&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* The project leaders and contributors to the referenced controls and risks:&lt;br /&gt;
** [[OWASP Proactive Controls]]&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Top Ten]]&lt;br /&gt;
** [[OWASP Mobile Security Project|OWASP Mobile Security]]&lt;br /&gt;
* OWASP staff for helping to set up the project and support its ongoing activities.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Recently completed:&lt;br /&gt;
* Update web applications edition to Proactive Controls 2018 [EN recently completed]&lt;br /&gt;
* Translate into other languages [TR recently completed]&lt;br /&gt;
* Handouts at events&lt;br /&gt;
&lt;br /&gt;
As of May 2018, the priorities are:&lt;br /&gt;
* Update as other referenced projects updated (e.g. Top Ten)&lt;br /&gt;
&lt;br /&gt;
Other ideas are:&lt;br /&gt;
&lt;br /&gt;
* Promote use of Snakes and Ladders &lt;br /&gt;
* Develop other boards&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Snakes and Ladders is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help are listed below.&lt;br /&gt;
&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Snakes and Ladders into that language?&lt;br /&gt;
&lt;br /&gt;
The project is on [https://crowdin.com/project/owasp-snakes-and-ladders Crowdin]&lt;br /&gt;
&lt;br /&gt;
==Use and Promote the Board Game==&lt;br /&gt;
Please help raise awareness of Snakes and Ladders:&lt;br /&gt;
* Use the game with your colleagues, friends, families, students and children&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a multi-user mobile app or web application to play the game&lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_snakes_and_ladders project mailing list] for feedback:&lt;br /&gt;
* How did you use it?&lt;br /&gt;
* What is people's reaction?&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What doesn't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other boards would you like to see?&lt;br /&gt;
&lt;br /&gt;
==Create a Board==&lt;br /&gt;
Do you have an idea for your own application security Snakes and Ladders board? Please contribute your ideas via the [https://lists.owasp.org/mailman/listinfo/owasp_snakes_and_ladders mailing list].&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Snakes_and_Ladders&amp;diff=240552</id>
		<title>OWASP Snakes and Ladders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Snakes_and_Ladders&amp;diff=240552"/>
				<updated>2018-05-09T17:54:14Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Release History */ v1.20 EN&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders-header.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Snakes and Ladders==&lt;br /&gt;
&lt;br /&gt;
Snakes and Ladders is an educational project. It uses gamification to promote awareness of application security controls and risks, and in particular knowledge of other OWASP documents and tools.&lt;br /&gt;
&lt;br /&gt;
== Editions==&lt;br /&gt;
&lt;br /&gt;
''Web Applications''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;div style=&amp;quot;height:75px;max-width:375px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_webapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;--&amp;gt;In the board game for {{#switchtablink:Web Applications Edition|web applications}}, the virtuous behaviours (ladders) are secure coding practices (from [[OWASP Proactive Controls|OWASP Proactive Controls project]] 2014-2016) and the vices (snakes) are application security risks (from [[:Category:OWASP Top Ten Project|OWASP Top Ten Project]] 2013). See also a [https://www.owasp.org/index.php/OWASP_Proactive_Controls#tab=Top_Ten_Mapping mapping between these two lists].&lt;br /&gt;
&lt;br /&gt;
''Mobile Apps''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;div style=&amp;quot;height:75px;max-width:375px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_mobapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;--&amp;gt;The identical board game for {{#switchtablink:Mobile Apps Edition|mobile apps}} uses mobile controls (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Controls Mobile Security Project Top Ten Controls] 2013) as the virtuous behaviours and mobile risks (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks Top Ten Mobile Risks] 2014 from the same project) as the vices.&lt;br /&gt;
&lt;br /&gt;
''Application Intrusion Detection''&lt;br /&gt;
&lt;br /&gt;
Coming soon.&lt;br /&gt;
&lt;br /&gt;
== Background ==&lt;br /&gt;
&lt;br /&gt;
This board game was created to use as an ice-breaker in application security training, but it potentially has wider appeal simply as a promotional hand-out, and maybe also more usefully as learning materials for younger coders. To cover all of that, we use the phrase &amp;quot;OWASP Snakes and Ladders is meant to be used by software programmers, big and small&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The game is quite lightweight, and does not have the same rigour or depth as the card game Cornucopia, but it is meant to be just some fun with some learning attached.&lt;br /&gt;
&lt;br /&gt;
Print-ready PDFs have been published - these are poster sized A2 (international ISO 216 [https://en.wikipedia.org/wiki/Paper_size paper size] 420×594mm, approximately 16.5×23.4in, with 3mm bleed and printers' marks). But the original files are in Adobe Illustrator, so these are also available for anyone to use and improve upon. We recommend playing using a real die and counters (markers), but you can cut out and make these from the paper sheet itself if you have scissor and glue skills.&lt;br /&gt;
&lt;br /&gt;
We hope it may be of use in any upcoming office party, celebration, festival, seasonal event, application security awareness or training exercise. Or just to help spread the word about controls and risks at work, at college or at school. If you are training anyone about the OWASP Top Ten, OWASP Proactive Controls or the OWASP Mobile projects, please consider giving each attendee a printed copy of the game as a take away.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP Snakes and Ladders is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
==Other Security Gamification==&lt;br /&gt;
If you are interested in using gaming for security, also see [https://www.owasp.org/index.php/OWASP_Cornucopia OWASP Cornucopia], [http://www.microsoft.com/security/sdl/adopt/eop.aspx Elevation of Privilege: The Threat Modeling Game], [http://securitycards.cs.washington.edu/ Security Cards] from the University of Washington, the commercial card game [http://www.controlalthack.com/ Control-Alt-Hack] ([http://media.blackhat.com/bh-us-12/Briefings/Kohno/BH_US_12_Kohno_Control_Alt_Hack_Slides.pdf presentation] for latter), and web application security training tools incorporating gamification such as [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project],  [https://www.owasp.org/index.php/OWASP_Security_Shepherd OWASP Security Shepherd] and [http://itsecgames.blogspot.co.uk/ ITSEC Games].&lt;br /&gt;
&lt;br /&gt;
Additionally, Adam Shostack maintains a list of tabletop security games and related resources at [http://adam.shostack.org/games.html security games]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is This? ==&lt;br /&gt;
&lt;br /&gt;
Snakes and Ladders is a popular board game, with [http://en.wikipedia.org/wiki/Snakes_and_Ladders ancient provenance] imported into [http://sandradodd.com/game/snakesandladders Great Britain from Asia] in the 19th century. The original game showed the effects of good and evil, or virtues and vices. This OWASP game is a poster-sized ''print-your-own'' paper sheet with the game board on it. Just get some players together with a die and counters. The virtues are application security controls, and the vices are risks.&lt;br /&gt;
&lt;br /&gt;
==How to Play==&lt;br /&gt;
&lt;br /&gt;
* The game is for 2-6 players. &lt;br /&gt;
* Firstly print the sheet out.&lt;br /&gt;
* Give each player a coloured counter (marker). To begin, each player should throw the die to determine who plays first; the highest can lead.&lt;br /&gt;
* Put all the players' counters onto the first square labelled “Start 1”.&lt;br /&gt;
* In turn, each player rolls the die and moves their counter by the number of squares indicated on the die. At the end of the move, if a player’s counter is at the bottom end of a ladder, the counter must be moved up the ladder to the square at its higher end. Conversely, if the player’s counter is located at the mouth of a snake, the counter must be moved down to the end of the snake’s tail.&lt;br /&gt;
* ''As a better alternative to enhance learning, either require the participants to discuss the risk/control when a player reaches each square, or only allow players to climb up a ladder after a quest about the control (e.g. simply describing the control, explain the risk (one example) the named control addresses and how the control (one example) could help prevent the named it''&lt;br /&gt;
*The first player to reach “100” at the top left wins. Give a prize.&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] [mailto:colin.watson@owasp.org @]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Katyanton Katy Anton] [mailto:katy.anton@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP Proactive Controls]]&lt;br /&gt;
* [[:Category:OWASP Top Ten Project|OWASP Top Ten]]&lt;br /&gt;
* [[OWASP Mobile Security Project|OWASP Mobile Security]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
*  Web Applications v1.0/v1.1&lt;br /&gt;
** [[media:OWASP-SnakesAndLadders-WebApplications-BR.pdf|BR]], [[media:OWASP-SnakesAndLadders-WebApplications-DE.pdf|DE]], [[media:OWASP-SnakesAndLadders-WebApplications-EN.pdf|EN]], [[media:OWASP-SnakesAndLadders-WebApplications-ES.pdf|ES]], [[media:OWASP-SnakesAndLadders-WebApplications-FR.pdf|FR]], [[media:OWASP-SnakesAndLadders-WebApplications-JA.pdf|JA]],  [[media:OWASP-SnakesAndLadders-WebApplications-TR.pdf|TR]], [[media:OWASP-SnakesAndLadders-WebApplications-ZH.pdf|ZH]]&lt;br /&gt;
** {{#switchtablink:Web Applications Edition|More options...}}&lt;br /&gt;
&lt;br /&gt;
*  Mobile Apps v1.0&lt;br /&gt;
** [[media:OWASP-SnakesAndLadders-MobileApps-EN.pdf|EN]], [[media:OWASP-SnakesAndLadders-MobileApps-JA.pdf|JA]]&lt;br /&gt;
** {{#switchtablink:Mobile Apps Edition|More options...}}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [12 May 2017] Web Applications TR&lt;br /&gt;
* [30 Jun 2016] Free copies at OWASP AppSec EU Rome 2017&lt;br /&gt;
* [05 Jun 2016] Web Applications v1.10 released in EN&lt;br /&gt;
* [30 Dec 2015] Katy Anton becomes project co-leader&lt;br /&gt;
* [01 Dec 2015] Free copies at PHP North West user group&lt;br /&gt;
* [24 Nov 2015] Free copies at [https://www.owasp.org/index.php/Newcastle OWASP Newcastle]&lt;br /&gt;
* [12 Oct 2015] Free copies at PHP Hampshire user group&lt;br /&gt;
* [29 Sep 2015] Web Application v1.0 released in PT-BR&lt;br /&gt;
* [19 May 2015] Working session at [http://2015.appsec.eu/project-summit/ OWASP Project Summit] - Dutch translation&lt;br /&gt;
* [11 May 2015] Lightning talk at the [http://tickets.digitalshoreditch.com/make/#session-53 Digital Shoreditch Festival]&lt;br /&gt;
* [04 Dec 2014] Free copies at [https://www.owasp.org/index.php/London OWASP London]&lt;br /&gt;
* [02 Dec 2014] Free copies at [https://www.owasp.org/index.php/Cambridge OWASP Cambridge]&lt;br /&gt;
* [02 Dec 2014] Mobile Apps JA&lt;br /&gt;
* [25 Nov 2014] Web Applications FR, JA and ZH&lt;br /&gt;
* [31 Oct 2014] Web Applications v1.0 released in DE, EN and ES&lt;br /&gt;
* [31 Oct 2014] Mobile Apps v1.0 released in EN&lt;br /&gt;
&lt;br /&gt;
== Twitter ==&lt;br /&gt;
&lt;br /&gt;
[[File:OWASPSnakesWeb-profile-small.jpg|link=]]&lt;br /&gt;
Follow two mock games running on Twitter:&lt;br /&gt;
* [https://twitter.com/OWASPSnakesWeb @OWASPSnakesWeb]&lt;br /&gt;
* [https://twitter.com/OWASPSnakesMob @OWASPSnakesMob]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Web Applications Edition =&lt;br /&gt;
&lt;br /&gt;
== OWASP Snakes and Ladders - Web Applications ==&lt;br /&gt;
&lt;br /&gt;
This was the first edition created. The objective is to raise awareness of the security controls that every web application should have, but link that with the much more widely known Top Ten Risks. The virtuous behaviours (ladders) are secure coding practices (from [[OWASP Proactive Controls|OWASP Proactive Controls project]] 2014-2016) and the vices (snakes) are application security risks (from [[:Category:OWASP Top Ten Project|OWASP Top Ten Project]] 2013).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:539px;max-width:750px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Osn-poster-web-de.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Current Release ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| &lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-BR.pdf BR: Português Brasileiro]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-DE.pdf DE: Deutsch]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-EN.pdf EN: English]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-BR.png|link=File:OWASP-SnakesAndLadders-WebApplications-BR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-DE.png|link=File:OWASP-SnakesAndLadders-WebApplications-DE.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; |[[Image:Osn-webapp-EN.png|link=File:OWASP-SnakesAndLadders-WebApplications-EN.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpentes e Escadas&amp;lt;br&amp;gt;Aplicativos da Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Schlangen und Leitern&amp;lt;br&amp;gt;Web Anwendungen&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Snakes and Ladders&amp;lt;br&amp;gt;Web Applications&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-ES.pdf ES: Español]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-FR.pdf FR: Français]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-JA.pdf JA: 日本語]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-ES.png|link=File:OWASP-SnakesAndLadders-WebApplications-ES.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-FR.png|link=File:OWASP-SnakesAndLadders-WebApplications-FR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-JA.png|link=File:OWASP-SnakesAndLadders-WebApplications-JA.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpientes y Escaleras&amp;lt;br&amp;gt;Aplicaciones Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Serpents et Échelles&amp;lt;br&amp;gt;Application Web&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇とはしご&amp;lt;br&amp;gt;ウェブアプリケーション&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
| &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-TR.pdf TR: Türkçe]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-ZH.pdf ZH: 中文]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-TR.png|link=File:OWASP-SnakesAndLadders-WebApplications-TR.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-webapp-ZH.png|link=File:OWASP-SnakesAndLadders-WebApplications-ZH.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Yılanlar ve Merdivenler&amp;lt;br&amp;gt;Web Uygulamaları&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇梯棋&amp;lt;br&amp;gt;WEB应用程序&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Note that some languages choose not to change the EN text for risk and control names.&lt;br /&gt;
&lt;br /&gt;
([https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-Illustrator.zip Source Adobe Illustrator file])&lt;br /&gt;
&lt;br /&gt;
== Release History ==&lt;br /&gt;
&lt;br /&gt;
* [09 May 2018] 1.2 - EN version updated&lt;br /&gt;
* [12 May 2017] 1.11 - TR version release&lt;br /&gt;
* [15 Jun 2016] 1.1 - EN version updated&lt;br /&gt;
* [29 Sep 2015] 1.0.2 - BR version release&lt;br /&gt;
* [25 Nov 2014] 1.0.2 - Additional contributors added, FR, JA and ZH versions released&lt;br /&gt;
* [05 Nov 2014] 1.0.1 - Correction to paths in source Illustrator file; PDFs regenerated&lt;br /&gt;
* [31 Oct 2014] 1.0 - First release&lt;br /&gt;
&lt;br /&gt;
== Colour Scheme 'Classic' ==&lt;br /&gt;
&lt;br /&gt;
This edition uses simple primary colours, like [https://search.disconnect.me/searchTerms/serp?search=c45431fe-9ce8-415a-ac25-1e511f45ef51 many versions] that can be seen in pictures of Snakes and Ladders games. The colours used in 'Classic' are:&lt;br /&gt;
&lt;br /&gt;
* Green&lt;br /&gt;
* Yellow&lt;br /&gt;
* White&lt;br /&gt;
* Red&lt;br /&gt;
* Blue&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:75px;max-width:100%;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_webapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The start square (1) is yellow and the final square (100) is red.&lt;br /&gt;
&lt;br /&gt;
= Mobile Apps Edition =&lt;br /&gt;
&lt;br /&gt;
== OWASP Snakes and Ladders - Mobile Apps ==&lt;br /&gt;
&lt;br /&gt;
The edition for Mobile Apps was created after working out the idea and design for the web application version of the board game. It seemed easy to replicate the idea since the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Project] lists both security controls and risks. The virtuous behaviours (ladders) are mobile controls (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Controls Mobile Security Project Top Ten Controls] 2013) and the vices (snakes) are mobile risks (from the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks Top Ten Mobile Risks] 2014).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:539px;max-width:750px;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Osn-poster-mob-ja.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Current Release ==&lt;br /&gt;
&lt;br /&gt;
{| &lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-MobileApps-EN.pdf EN: English]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-WebApplications-JA.pdf JA: 日本語]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-mobapp-EN.png|link=File:OWASP-SnakesAndLadders-MobileApps-EN.pdf]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; | [[Image:Osn-mobapp-JA.png|link=File:OWASP-SnakesAndLadders-MobileApps-JA.pdf]]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | Snakes and Ladders&amp;lt;br&amp;gt;Mobile Apps&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;250&amp;quot; | 蛇とはしご&amp;lt;br&amp;gt; モバイルアプリ版&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
([https://www.owasp.org/index.php/File:OWASP-SnakesAndLadders-MobileApps-Illustrator.zip Source Adobe Illustrator file])&lt;br /&gt;
&lt;br /&gt;
== Release History ==&lt;br /&gt;
&lt;br /&gt;
* [02 Dec 2014] 1.0.2 - Additional contributor added, JA version released&lt;br /&gt;
* [05 Nov 2014] 1.0.1 - Correction to paths in source Illustrator file; EN PDF regenerated&lt;br /&gt;
* [31 Oct 2014] 1.0 - First release&lt;br /&gt;
&lt;br /&gt;
== Colour Scheme 'Farringdon' ==&lt;br /&gt;
&lt;br /&gt;
Other people's versions of Snakes and Ladders [https://search.disconnect.me/searchTerms/serp?search=c45431fe-9ce8-415a-ac25-1e511f45ef51 use a wide variety of designs and colour schemes]. Thus to make a complete contrast to the edition for web applications, the colours used are the designatory colours of the underground and mainline train services that run through Colin Watson's local station at Farringdon in Clerkenwell, London EC1. The colours in 'Farringdon' are:&lt;br /&gt;
&lt;br /&gt;
* Purple (future Crossrail)&lt;br /&gt;
* Yellow (Circle)&lt;br /&gt;
* White (Thameslink)&lt;br /&gt;
* Maroon (Metropolitan)&lt;br /&gt;
* Pink (Hammersmith &amp;amp; City)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;height:75px;max-width:100%;border:0,margin:0;overflow:hidden;&amp;quot;&amp;gt;[[File:Snakes_and_ladders_mobapp-mini-banner.png|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can see these colours on [https://www.tfl.gov.uk/assets/downloads/standard-tube-map.pdf tube maps] and station signage. The start square (1) is yellow and the final square (100) is maroon.&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
[[File:Snakesandladders-mockup.jpg|right|link=]]&lt;br /&gt;
&lt;br /&gt;
==Why Snakes &amp;amp; Ladders? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well known document, but OWASP has many other resources which provide better approaches for secure application development. In particular, there are some &amp;quot;top 10 controls&amp;quot; lists, and I wanted to highlight those. Creating a board game that features both risks and controls is a simple way to compare and contrast these aspects.&lt;br /&gt;
&lt;br /&gt;
Players do not need to know either the risks or controls on the lists, since they are just the decoration to what is otherwise standard Snakes &amp;amp; Ladders. But as players land on assigned squares, this can be used to discuss the risks and controls they are labelled with.&lt;br /&gt;
&lt;br /&gt;
Also, after undertaking some due diligence, it was noted that since Snakes &amp;amp; Ladders is such an ancient game it is not anyone's intellectual property and many others have already created thousands of different designs and versions. Other games would not meet this requirement.&lt;br /&gt;
&lt;br /&gt;
==How was the game created?==&lt;br /&gt;
By hard work! Each list of risks and controls contains ten items, so the rough layout of snakes and ladder starting and end points was sketched out on paper, as shown for web applications on the right. Instructional text was written.&lt;br /&gt;
&lt;br /&gt;
The concept was then converted into a layered Adobe Illustrator file, and the text and graphics added. This design went through a number of iterations to ensure it was legible and appealing. The PDF was exported and both the PDF and AI files added to the project page. When translations were provided, these were added as separate text layers in the source Illustrator file, and then new files uploaded again to the project.&lt;br /&gt;
&lt;br /&gt;
Once Web Applications Snakes &amp;amp; Ladders was complete, the file was duplicated and edited for Mobile Apps. This has different risks, controls and arrangement of snakes and ladders. It also has its own colour scheme.&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader aware of your available time to contribute to the project. It is also important to let the Leader know how you would like to contribute and pitch in to help the project meet its goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. Please see the {{#switchtablink:Road Map_and Getting Involved|road map and getting involved section}}&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for users, translators and people to promote the project. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Volunteers==&lt;br /&gt;
Snakes and Ladders is developed, maintained, updated and promoted by a worldwide team of volunteers. The contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Ziyahan Albeniz&lt;br /&gt;
* Kembolle Amilkar&lt;br /&gt;
* Katy Anton&lt;br /&gt;
* Manuel Lopez Arredondo&lt;br /&gt;
* Fabio Cerullo&lt;br /&gt;
* Álan Carlos B. Eufrázio&lt;br /&gt;
* Tobias Gondrom&lt;br /&gt;
* Martin Haslinger&lt;br /&gt;
* Yongliang He&lt;br /&gt;
* Manfred Hofmeier&lt;br /&gt;
* Cédric Messeguer&lt;br /&gt;
* Takanori Nakanowatari&lt;br /&gt;
* Marcos Vinícius Nunes de Arruda&lt;br /&gt;
* Riotaro Okada&lt;br /&gt;
* Gabriel Pedro S. Peres&lt;br /&gt;
* Alison S. Ribeiro&lt;br /&gt;
* Ivy Zhang&lt;br /&gt;
* Colin Watson&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* The project leaders and contributors to the referenced controls and risks:&lt;br /&gt;
** [[OWASP Proactive Controls]]&lt;br /&gt;
** [[:Category:OWASP Top Ten Project|OWASP Top Ten]]&lt;br /&gt;
** [[OWASP Mobile Security Project|OWASP Mobile Security]]&lt;br /&gt;
* OWASP staff for helping to set up the project and support its ongoing activities.&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Recently completed:&lt;br /&gt;
* Update web applications edition to Proactive Controls 2016 [EN recently completed]&lt;br /&gt;
* Translate into other languages [TR recently completed]&lt;br /&gt;
* Handouts at events&lt;br /&gt;
&lt;br /&gt;
As of May 2017, the priorities are:&lt;br /&gt;
* Update as other referenced projects updated (e.g. Top Ten 2017)&lt;br /&gt;
&lt;br /&gt;
Other ideas are:&lt;br /&gt;
&lt;br /&gt;
* Promote use of Snakes and Ladders &lt;br /&gt;
* Develop other boards&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of Snakes and Ladders is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help are listed below.&lt;br /&gt;
&lt;br /&gt;
==Localization==&lt;br /&gt;
Are you fluent in another language? Can you help translate Snakes and Ladders into that language?&lt;br /&gt;
&lt;br /&gt;
The project is on [https://crowdin.com/project/owasp-snakes-and-ladders Crowdin]&lt;br /&gt;
&lt;br /&gt;
==Use and Promote the Board Game==&lt;br /&gt;
Please help raise awareness of Snakes and Ladders:&lt;br /&gt;
* Use the game with your colleagues, friends, families, students and children&lt;br /&gt;
* Create video about how to play the game&lt;br /&gt;
* Develop a multi-user mobile app or web application to play the game&lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/owasp_snakes_and_ladders project mailing list] for feedback:&lt;br /&gt;
* How did you use it?&lt;br /&gt;
* What is people's reaction?&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
* What doesn't make sense?&lt;br /&gt;
* How could the guidance be improved? &lt;br /&gt;
* What other boards would you like to see?&lt;br /&gt;
&lt;br /&gt;
==Create a Board==&lt;br /&gt;
Do you have an idea for your own application security Snakes and Ladders board? Please contribute your ideas via the [https://lists.owasp.org/mailman/listinfo/owasp_snakes_and_ladders mailing list].&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP-SnakesAndLadders-WebApplications-EN.pdf&amp;diff=240551</id>
		<title>File:OWASP-SnakesAndLadders-WebApplications-EN.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP-SnakesAndLadders-WebApplications-EN.pdf&amp;diff=240551"/>
				<updated>2018-05-09T17:52:45Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: Clerkendweller uploaded a new version of File:OWASP-SnakesAndLadders-WebApplications-EN.pdf&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Snakes and Ladders for Web Applications - EN - Version 1.0&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Cheat_Sheet_Series&amp;diff=239509</id>
		<title>OWASP Cheat Sheet Series</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Cheat_Sheet_Series&amp;diff=239509"/>
				<updated>2018-04-09T16:15:07Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: Updated spec&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Main = &lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Our goal == &lt;br /&gt;
&lt;br /&gt;
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics. These cheat sheets were created by various application security professionals who have expertise in specific topics. We hope that the OWASP Cheat Sheet Series provides you with excellent security guidance in an easy to read format.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the OWASP Cheat Sheet Series, please email the project leader [mailto:jim.manico@owasp.org Jim Manico], subscribe to our [https://lists.owasp.org/mailman/listinfo/owasp-cheat-sheets project email list] or contact us on the project's Slack channel.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Authors ==&lt;br /&gt;
&lt;br /&gt;
'''Project Leaders:''' [https://www.owasp.org/index.php/User:Jmanico Jim Manico] and  [https://www.owasp.org/index.php/User:Dominique_RIGHETTO Dominique Righetto] [mailto:dominique.righetto@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Contributors:''' Paweł Krawczyk, Mishra Dhiraj, Shruti Kulkarni, Torsten Gigler, Michael Coates, Jeff Williams, Dave Wichers, Kevin Wall, Jeffrey Walton, Eric Sheridan, Kevin Kenan, David Rook, Fred Donovan, Abraham Kang, Dave Ferguson, Shreeraj Shah, Raul Siles, Colin Watson, Neil Matatall, Zaur Molotnikov and &amp;lt;b&amp;gt;many more&amp;lt;/b&amp;gt;!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Cheat Sheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Classifications ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Midlevel_projects.png|130px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects|Lab Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;center&amp;quot; width=&amp;quot;50%&amp;quot; | &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== Slack &amp;amp; Twitter ==&lt;br /&gt;
&lt;br /&gt;
Slack channel information:&lt;br /&gt;
* Server &amp;lt;code&amp;gt;owasp.slack.com&amp;lt;/code&amp;gt;&lt;br /&gt;
* Channel &amp;lt;code&amp;gt;cheatsheets&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Twitter hash tag: '''#[https://twitter.com/search?q=%23owaspcheatsheetseries&amp;amp;src=typd owaspcheatsheetseries]'''&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp-cheat-sheets Project Email List]&lt;br /&gt;
&lt;br /&gt;
== Licensing ==&lt;br /&gt;
The OWASP &amp;lt;i&amp;gt;Cheat Sheet Series&amp;lt;/i&amp;gt; is free to use under the [https://creativecommons.org/licenses/by-sa/3.0/us/ Creative Commons ShareAlike 3 License].&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
* [[OWASP Proactive Controls]]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project OWASP Application Security Verification Standard Project]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [Mar 18 2018] [[Password_Storage_Cheat_Sheet|Password Storage Cheat Sheet]] updated&lt;br /&gt;
* [Feb 21 2018] [[HTML5_Security_Cheat_Sheet|HTML5 Security Cheat Sheet]] updated&lt;br /&gt;
* [Feb 18 2018] [[Password_Storage_Cheat_Sheet|Password Storage Cheat Sheet]] updated&lt;br /&gt;
* [Jan 14 2018] [[Insecure_Direct_Object_Reference_Prevention_Cheat_Sheet|Insecure Direct Object Reference Prevention Cheat Sheet]] updated&lt;br /&gt;
* [Dec 04 2017] [[Ruby_on_Rails_Cheatsheet|Ruby On Rails Cheat Sheet]] updated&lt;br /&gt;
* [Nov 19 2017] [[JSON_Web_Token_(JWT)_Cheat_Sheet_for_Java|JWT Cheat Sheet for Java]] updated&lt;br /&gt;
* [Nov 17 2017] [[OS_Command_Injection_Defense_Cheat_Sheet|OS Command Injection Defense Cheat Sheet]] added to project&lt;br /&gt;
* [Nov 04 2017] [[Authorization_Testing_Automation|Authorization Testing Automation Cheat Sheet]] added to project&lt;br /&gt;
* [Jan 17 2017] [[XML_Security_Cheat_Sheet|XML Security Cheat Sheet]] added to project&lt;br /&gt;
* [Feb 06 2016] New navigation template rolled out project-wide&lt;br /&gt;
* [Jun 11 2015] [[SAML_Security_Cheat_Sheet|SAML Cheat Sheet]] added to project&lt;br /&gt;
* [Feb 11 2015] [https://www.owasp.org/images/9/9a/OWASP_Cheatsheets_Book.pdf Cheat Sheet &amp;quot;book&amp;quot;] added to project &lt;br /&gt;
* [Apr 04 2014] All non-draft cheat sheets moved to new wiki template!&lt;br /&gt;
* [Feb 04 2014] Project-wide cleanup started&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Master Cheat Sheet =&lt;br /&gt;
&lt;br /&gt;
==Authentication==&lt;br /&gt;
Ensure all entities go through an appropriate and adequate form of authentication. All the application non-public resource must be protected and shouldn't be bypassed.&lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/Authentication_Cheat_Sheet Authentication Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
==Session Management==&lt;br /&gt;
&lt;br /&gt;
Use secure session management practices that ensure that authenticated users have a robust and cryptographically secure association with their session. &lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/Session_Management_Cheat_Sheet Session Management Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
==Access Control==&lt;br /&gt;
&lt;br /&gt;
Ensure that a user has access only to the resources they are entitled to. Perform access control checks on the server side on every request. All user-controlled parameters should be validated for entitlemens checks. Check if user name or role name is passed through the URL or through hidden variables. Prepare an ACL containing the Role-to-Function mapping and validate if the users are granted access as per the ACL.&lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/Access_Control_Cheat_Sheet Access Control Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
==Input Validation==&lt;br /&gt;
&lt;br /&gt;
Input validation is performed to minimize malformed data from entering the system. Input Validation is NOT the primary method of preventing XSS, SQL Injection. These are covered in output encoding below.&lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/Input_Validation_Cheat_Sheet Input Validation Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
==Output Encoding==&lt;br /&gt;
&lt;br /&gt;
Output encoding is the primary method of preventing XSS and injection attacks. Input validation helps minimize the introduction of malformed data, but it is a secondary control.&lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/XSS_Prevention_Cheat_Sheet XSS (Cross Site Scripting) Prevention Cheat Sheet].&lt;br /&gt;
&lt;br /&gt;
==Cross Domain==&lt;br /&gt;
&lt;br /&gt;
Ensure that adequate controls are present to prevent against Cross-site Request Forgery, Clickjacking and other 3rd Party Malicious scripts.&lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)_Prevention_Cheat_Sheet Cross Site Request Forgery]&lt;br /&gt;
&lt;br /&gt;
==Secure Transmission==&lt;br /&gt;
&lt;br /&gt;
Ensure that all the applications pages are served over cryptographically secure HTTPs protocols. Prohibit the transmission of session cookies over HTTP.&lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet Transport Protection Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
==Logging==&lt;br /&gt;
&lt;br /&gt;
Ensure that all the security related events are logged. Events include: User log-in (success/fail); view; update; create, delete, file upload/download, attempt to access through URL, URL tampering. Audit logs should be immutable and write only and must be protected from unauthorized access.&lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/Logging_Cheat_Sheet Logging Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
==Uploads==&lt;br /&gt;
&lt;br /&gt;
Ensure that the size, type, contents, and name of the uploaded files are validated. Uploaded files must not be accessible to users by direct browsing. Preferably store all the uploaded files in a different file server/drive on the server. All files must be virus scanned using a regularly updated scanner.&lt;br /&gt;
&lt;br /&gt;
For more information, check https://www.owasp.org/index.php/Input_Validation_Cheat_Sheet#File_Uploads&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
'''Global:'''&lt;br /&gt;
&lt;br /&gt;
* Bring all cheat sheets out of draft fin end of 2018.&lt;br /&gt;
* Go through the cheat sheets to make sure what they recommend is consistent with ASVS.&lt;br /&gt;
* Move all code snippets of CS from '''pre''' tag to '''syntaxhighlight''' tag to enhance CS readability.&lt;br /&gt;
* Find a way to automate the generation of a PDF referential file gathering all CS.&lt;br /&gt;
* Go through the cheat sheets to make sure they follow the CS guideline.&lt;br /&gt;
* Create branding stickers for the project.&lt;br /&gt;
* Remove CS that that do not bring added value.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Next work on Cheat Sheets (CS) and work assignment:'''&lt;br /&gt;
&lt;br /&gt;
* [[Ruby_on_Rails_Cheatsheet|Ruby On Rails]] CS: &lt;br /&gt;
** '''Action:''' CS complete refactoring.&lt;br /&gt;
** '''People in charge:''' Zaur Molotnikov.&lt;br /&gt;
** '''Status:''' &amp;lt;span style=&amp;quot;background:#008000;color:#ffffff&amp;quot;&amp;gt;Work in progress&amp;lt;/span&amp;gt;.&lt;br /&gt;
* Android and iOS CS:&lt;br /&gt;
** '''Action:''' Replace content of the following CS to pointer to the dedicated section in the [https://github.com/OWASP/owasp-mstg OWASP Mobile Security Testing Guide] project, motivation is explained [https://github.com/OWASP/owasp-mstg/issues/872 here]:&lt;br /&gt;
*** [[Android_Testing_Cheat_Sheet|Android Testing Cheat Sheet]]&lt;br /&gt;
*** [[IOS_Developer_Cheat_Sheet|IOS Developer Cheat Sheet]]&lt;br /&gt;
*** [[IOS_Application_Security_Testing_Cheat_Sheet|IOS Application Security Testing Cheat Sheet]]&lt;br /&gt;
** '''People in charge:''' Dominique Righetto.&lt;br /&gt;
** '''Status:''' &amp;lt;span style=&amp;quot;background:#008000;color:#ffffff&amp;quot;&amp;gt;Work in progress&amp;lt;/span&amp;gt;.&lt;br /&gt;
* General OAuth introduction CS:&lt;br /&gt;
** '''Action:''' Create it.&lt;br /&gt;
** '''People in charge:''' Simon Bennetts &amp;amp; Jim Manico.&lt;br /&gt;
** '''Status:''' &amp;lt;span style=&amp;quot;background:#008000;color:#ffffff&amp;quot;&amp;gt;Work in progress&amp;lt;/span&amp;gt;.&lt;br /&gt;
* OAuth and OIDC for SPA Applications CS:&lt;br /&gt;
** '''Action:''' Create it.&lt;br /&gt;
** '''People in charge:''' Simon Bennetts &amp;amp; Jim Manico.&lt;br /&gt;
** '''Status:''' &amp;lt;span style=&amp;quot;background:#008000;color:#ffffff&amp;quot;&amp;gt;Work in progress&amp;lt;/span&amp;gt;.&lt;br /&gt;
* [[Credential_Stuffing_Prevention_Cheat_Sheet|Credential Stuffing Prevention]] CS:&lt;br /&gt;
** '''Action:''' Refresh it.&lt;br /&gt;
** '''People in charge:''' Not assigned.&lt;br /&gt;
** '''Status:''' &amp;lt;span style=&amp;quot;background:#ff9933;color:#ffffff&amp;quot;&amp;gt;In backlog&amp;lt;/span&amp;gt;.&lt;br /&gt;
* Server Side Request Forgery Defense CS:&lt;br /&gt;
** '''Action:''' Create it.&lt;br /&gt;
** '''People in charge:''' Not assigned.&lt;br /&gt;
** '''Status:''' &amp;lt;span style=&amp;quot;background:#ff9933;color:#ffffff&amp;quot;&amp;gt;In backlog&amp;lt;/span&amp;gt;.&lt;br /&gt;
* [[Forgot_Password_Cheat_Sheet|Forgot Password]] CS:&lt;br /&gt;
** '''Action:''' Add a POC in order to provide actionable code.&lt;br /&gt;
** '''People in charge:''' Not assigned.&lt;br /&gt;
** '''Status:''' &amp;lt;span style=&amp;quot;background:#ff9933;color:#ffffff&amp;quot;&amp;gt;In backlog&amp;lt;/span&amp;gt;.&lt;br /&gt;
* [[OS_Command_Injection_Defense_Cheat_Sheet|OS Command Injection Defense]] CS:&lt;br /&gt;
** '''Action:''' Add information about system command escaping.&lt;br /&gt;
** '''People in charge:''' Not assigned.&lt;br /&gt;
** '''Status:''' &amp;lt;span style=&amp;quot;background:#ff9933;color:#ffffff&amp;quot;&amp;gt;In backlog&amp;lt;/span&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
= Cheat sheet Guideline =&lt;br /&gt;
&lt;br /&gt;
== Cheat sheet content ==&lt;br /&gt;
&lt;br /&gt;
The key points that all cheat sheets (called '''CS''') must provides are the following:&lt;br /&gt;
&lt;br /&gt;
# Address a single topic (ex: password storage, OS command injection, REST service, CSRF, HTML5 new features security...).&lt;br /&gt;
# Be concise and focused: A cheat sheet must be directly actionable (a CS is not a guide) and must be directly useful for a developer.&lt;br /&gt;
# Do not re-address topic handled by others CS. In this case, the target CS will be enhanced with missing points.&lt;br /&gt;
# When applicable, provide a solution proposal implementation through a full documented POC on a public well know Git repository (GitHub is highly prefered), the POC can be used as a '''playground''' for a developer wanting to play/evaluate your solution proposal.&lt;br /&gt;
&lt;br /&gt;
== Cheat sheet structure ==&lt;br /&gt;
&lt;br /&gt;
A CS must have these sections:&lt;br /&gt;
&lt;br /&gt;
# '''Introduction''': Provide high level information about the topic in order to introduce it to people that do not know it. You can add pointer to external sources if needed but at least give an overview allowing a reader to continue on the CS. You can also add schema or diagram in any part of the CS but be sure to respect the copyright of the source file.&lt;br /&gt;
# '''Context''': Describe the security issues that are bring or commonly meet when someone must work on this topic.&lt;br /&gt;
# '''Objective''': Describe the objective of the CS. What the CS will bring to the reader?&lt;br /&gt;
# '''Proposition''': &lt;br /&gt;
## Describe how to address the security issues in a possible technology agnostic approach.&lt;br /&gt;
## Using your POC, describe your solution proposal in the more teaching possible way.&lt;br /&gt;
# '''Sources of the prototype''': Add pointer to the public GitHub repository on which the source code of POC is hosted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For the code snippet, use the mediawiki tag '''syntaxhighlight''':&lt;br /&gt;
* Tag [https://www.mediawiki.org/wiki/Extension:SyntaxHighlight documentation].&lt;br /&gt;
* Supported [http://pygments.org/languages languages].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you want to be careful in order to prevent to break something in the target existing CS, you can follow this contribution procedure:&lt;br /&gt;
# Take a copy of the CS that you want to enhance (mediawiki syntax in the source tab).&lt;br /&gt;
# Add your enhancement and publish the updated CS on the same GitHub repository than your POC (it support the mediawiki syntax).&lt;br /&gt;
# Notify the CS Community using this mailing [https://lists.owasp.org/mailman/listinfo/owasp-cheat-sheets list] and the CS Community will review the CS using GitHub comments system.&lt;br /&gt;
# When the feedback loop is finished, the CS Community will help you to have right access to the wiki in order to update the CS.&lt;br /&gt;
&lt;br /&gt;
== Cheat sheet template ==&lt;br /&gt;
&lt;br /&gt;
If the target CS is a new one then please use the following template struture. &lt;br /&gt;
&lt;br /&gt;
It allow you to work:&lt;br /&gt;
* Online by using the wiki ''Show preview'' option.&lt;br /&gt;
* Offline by using an text editor like [https://atom.io/ Atom] with the [https://atom.io/packages/language-mediawiki mediawiki plugin].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;html&amp;quot; highlight=&amp;quot;10,18,24,31,38,44&amp;quot;&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
__TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Provide high level information about the topic in order to introduce it to people that do not know it.&lt;br /&gt;
You can add pointer to external sources if needed but at least give an overview allowing a reader to continue on the CS.&lt;br /&gt;
You can also add schema or diagram in any part of the CS but be sure to respect the copyright of the source file.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Context =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Describe the security issues that are bring or commonly meet when someone must work on this topic.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Objective =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Describe the objective of the CS.&lt;br /&gt;
What the CS will bring to the reader.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Proposition =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
1. Describe how to address the security issues in a possible technology agnostic approach.&lt;br /&gt;
2. Using your POC, describe your solution proposal in the more teaching possible way. Use &amp;quot;syntaxhighlight&amp;quot; tag for code snippet.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Sources of the prototype =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Add pointer to the public GitHub repository on which the source code of POC is hosted.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Add your name and email.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Other Cheatsheets =&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Project Logo =&lt;br /&gt;
&lt;br /&gt;
This section contains the information that we have gathered and plan to use for the creation of the project logo and related design materials.&lt;br /&gt;
&lt;br /&gt;
The first phase of the work is to commission a project logo.&lt;br /&gt;
&lt;br /&gt;
== Phase 1: Logo ==&lt;br /&gt;
&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
&lt;br /&gt;
The project requires a logo which will comprise three components:&lt;br /&gt;
&lt;br /&gt;
* Graphical element indicating the idea or use of the cheat sheets&lt;br /&gt;
* The project title&lt;br /&gt;
* Motto/straplines.&lt;br /&gt;
&lt;br /&gt;
Not all of these will necessarily be shown together at the same time. Phase 1 requires the creation of a logo, which may be used with one, two or all three of these components.&lt;br /&gt;
&lt;br /&gt;
The logo will be used in many ways such as on a website banner, or just the graphical element on a bag, or the graphical element and a motto/strapline on a t-shirt. These other outputs are not included in the scope of Phase 1.&lt;br /&gt;
&lt;br /&gt;
=== Project Name ===&lt;br /&gt;
&lt;br /&gt;
The project name is ''OWASP Cheat Sheet Series project''. The project name will be positioned next to the graphical element in some outputs, and this layout must be provided. In other cases, the project name will not be included beside the logo.&lt;br /&gt;
&lt;br /&gt;
=== Motto/Strapline ===&lt;br /&gt;
&lt;br /&gt;
Three mottos/straplines will be used in the logo - they are context dependent:&lt;br /&gt;
&lt;br /&gt;
* ''Life is too short, AppSec is tough, Cheat!''&lt;br /&gt;
* ''Its not cheating if you do it for the right reasons''&lt;br /&gt;
* ''Sometimes the only good thing to do is cheat''.&lt;br /&gt;
&lt;br /&gt;
The logo layout must allow for any of these or none to be included.&lt;br /&gt;
&lt;br /&gt;
=== Layout, Media Formats and Colours ===&lt;br /&gt;
&lt;br /&gt;
Some media or placements may mean the motto/strapline does not fit or is not needed. Therefore the logo must be usable with, or without, the motto/strapline.&lt;br /&gt;
&lt;br /&gt;
The logo will need to be used at multiple scales. For example, if the logo is square excluding the motto/strapline, the following formats must work&lt;br /&gt;
&lt;br /&gt;
* Low-resolution use on web pages (e.g. as small as 100x100 pixels excluding moto/strapline) &lt;br /&gt;
* Medium resolution use on fabric such as t-sirts or bags (e.g. 900x900 pixels at 150 dpi)&lt;br /&gt;
* High-resolution use on large posters and banners (e.g. as large as 5,000x5,000 pixels at 300dpi).&lt;br /&gt;
&lt;br /&gt;
The logo may be printed in CMYK for physical media, but must also have RGB colours for screen use. Additionally the logo must also be available in grayscale, and separately as single colour (i.e. black and white without any tones).&lt;br /&gt;
&lt;br /&gt;
=== Deliverables Required ===&lt;br /&gt;
&lt;br /&gt;
All outputs must be provided digitally:&lt;br /&gt;
&lt;br /&gt;
# Logo demonstrating how it looks with just the graphical element, the graphical element with the project title, and the graphical element with each of the mottos/straplines, and everything together&lt;br /&gt;
# Source layered vector graphic files created in Adobe Illustrator&lt;br /&gt;
# Exported versions for quick use low, medium and high resolution full-colour PNG/JPEGs in RGB and CMYK&lt;br /&gt;
# Colour and font specification.&lt;br /&gt;
&lt;br /&gt;
Rights/licensing:&lt;br /&gt;
&lt;br /&gt;
# The designer will not retain any rights - all design and use rights will be given to OWASP, who will publish the logo and files using am open source licence, and OWASP will be able to use the logo, source files, ideas, designs in any manner it desires in any media in any quantity, without any additional payments, commission or royalties to the designer or anyone else&lt;br /&gt;
# All fonts used in the design must be provided to OWASP and comply with the above requirements&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Future Phases: Other Graphical Elements ==&lt;br /&gt;
&lt;br /&gt;
Scope TBC - Banners, t-shirts, etc&lt;br /&gt;
&lt;br /&gt;
Background pictures (picture provider and designer will be cited on the project site):&lt;br /&gt;
* ''A smart tech looking woman reading a piece of paper (the cheatsheet) while resting on a beach.''&lt;br /&gt;
* ''A woman hand holding cards with an ace up the sleeve.''&lt;br /&gt;
&lt;br /&gt;
Pictures proposal (just a proposal as bootstrap, others pictures can be used):&lt;br /&gt;
* Cards:&lt;br /&gt;
** https://www.pexels.com/photo/woman-holding-queen-of-hearts-and-diamonds-922706/&lt;br /&gt;
** https://www.pexels.com/photo/ace-card-gambling-hand-274373/&lt;br /&gt;
** https://www.pexels.com/photo/ace-bet-business-card-262333/&lt;br /&gt;
* Beach:&lt;br /&gt;
** https://www.pexels.com/photo/laptop-mockup-notebook-outside-4778/&lt;br /&gt;
** https://www.pexels.com/photo/apple-check-computer-female-7079/&lt;br /&gt;
** https://www.pexels.com/photo/beach-beach-chair-blur-casual-319921/&lt;br /&gt;
** https://www.pexels.com/photo/close-up-of-woman-typing-on-keyboard-of-laptop-6352/&lt;br /&gt;
** https://www.pexels.com/photo/black-and-gray-computer-laptop-159784/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|OWASP Cheat Sheets Project]]&lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
[[Category:OWASP_Alpha_Quality_Document]]&lt;br /&gt;
[[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=238934</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=238934"/>
				<updated>2018-03-26T12:23:21Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: Added project and presentation links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster], [mailto:mike.goodwin@owasp.org Mike Goodwin,] and [mailto:andrew.pannell@owasp.org Andi Pannell]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
Our next event will be held on 27th March 2018. 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.  &lt;br /&gt;
&lt;br /&gt;
''Talk 1: Andi Pannell''&lt;br /&gt;
&lt;br /&gt;
''The Internet of (broken) Things''&lt;br /&gt;
&lt;br /&gt;
Talk: This talk will focus on the internet of things, how we’re connecting everything to the internet now, because why not add a WiFi connection to your Fridge? And how security is unlikely to be a consideration when making these products. I’ll also talk about DefCon, as last year my company sent a team of us to DefCon 25 in Las Vegas, explaining what DefCon is, what happens there, and how we won the IoT Village 0-day contest and I'll conclude with a '''live hacking demo'''.&lt;br /&gt;
&lt;br /&gt;
''Talk 2: Colin Watson''&lt;br /&gt;
&lt;br /&gt;
''An introduction to The OWASP Automated Threats to Web Applications''&lt;br /&gt;
&lt;br /&gt;
Talk: Web applications are subjected to unwanted automated usage – day in, day out. The vast majority of these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is often mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the attacker’s primary intent.&lt;br /&gt;
&lt;br /&gt;
This OWASP project researched these aspects in 2015 and created a new ontology of web application automation threats, and has been updated twice since with the most recent release in February 2018. This presentation will describe the need, how the threats were classified and names defined, and how they information can be used in the real world developing and operating web applications. Attendees to the OWASP Newcastle event will receive a printed copy of the handbook; the PDF handbook and all other outputs are free to download from the OWASP website. [https://www.owasp.org/index.php/OWASP_Automated_Threats_to_Web_Applications Project page] | [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Handbook PDF file] | [http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-23540699.html Handbook print version] | [https://www.owasp.org/index.php/File:AutomatedThreats-Newcastle-20180327.pptx Newcastle PPT presentation]&lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://lists.owasp.org/mailman/listinfo/owasp-Newcastle chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle]&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
'''2018 Dates'''&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
30/01/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE01-008.&lt;br /&gt;
&lt;br /&gt;
Speakers&lt;br /&gt;
* '''Neil Dixley: Code that fights back.''' Lessons from the gaming world on detecting and responding to attacks on software assets. An introduction to proactive software security including a philosophical look at how far we should go to protect our apps.&lt;br /&gt;
&lt;br /&gt;
* '''Luke Sadler: Practical demonstration of mobile software penetration'''. Luke Sadler walks us through hands on examples of cracking mobile technology.&lt;br /&gt;
----'''2017 Dates'''&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
21/11/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Lorenzo Grespan: Explain hacking in ten minutes.''' Bio: Lorenzo Grespan is a computer scientist currently working as an application security specialist for Secarma, Ltd. While his main interest has always been computer security, he also worked as a developer, systems administrator and project manager for a research effort in robotic surgery. His background is in computational neuroscience, neural networks and evolutionary systems and he likes to solve interesting problems at the intersection of people and technology. Talk (30 minutes): Recently I had to show a 10-minute  &amp;quot;live hack&amp;quot; to a non-technical audience. As an introvert and a geek my main effort was in maintaining technical accuracy, however what made the audience go &amp;quot;aha!&amp;quot; turned out to be what for me was the least significant detail of the entire demo. In this talk I will show the hack, share the lessons learned and discuss how to communicate security concerns to non technical stakeholders, higher management and end users. [[Media:OWASPNCL LG 21112017.pdf]]&lt;br /&gt;
&lt;br /&gt;
* '''Robin Sillem:''' '''Building a Development Environment That's 'Secure Enough'.''' This will be a discussion of how a team at DWP is using modern DevOps practices to create a dev/build/test platform secure enough for development of services handling large volumes of UK citizen data. [[Media:Modern_DevOps_and_security.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
19/09/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Gareth Dixon: Running a security event using OWASP Security Shepherd.''' In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
* '''Mike Goodwin: Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon'''. Threat modelling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://www.droidandy.com/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Ben Lee''' and '''Ross Dargan''': '''The problems with proving identity.''' In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers. The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…* (*Talk may not be historically accurate! ;)) [[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
* '''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks.''' The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities. Take a copy of the game away with you - it is suitable for developers of all sizes. [[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
* '''Michael Haselhurst - Automated Security Testing Using The ZAP API.''' This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi. [[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
* '''Mike Goodwin - Real world defence in depth (part 1).''' Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality. [[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf |Media: CSP_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.''' [[Media: OWASP_Honeypots.odp]]  &lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.''' [[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' An introduction to penetration testing, using several OWASP projects as well as other open source and free programs. [[Media: An_introduction_to_penetration_testing.pptx]] &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises. [[Media: Threat_Modeling_Presentation.pptx]] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Robin Fewster|Robin Fewster]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Slack =&lt;br /&gt;
OWASP Newcastle has a slack group which you're welcome to join and chat to us! You can join us [https://owasp.slack.com/messages/C0CLHS45S Here]&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter events and corporate sponsorship officer [mailto:katy.l.buller@pwc.com Katy Buller].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AutomatedThreats-Newcastle-20180327.pptx&amp;diff=238933</id>
		<title>File:AutomatedThreats-Newcastle-20180327.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AutomatedThreats-Newcastle-20180327.pptx&amp;diff=238933"/>
				<updated>2018-03-26T12:19:10Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: Clerkendweller uploaded a new version of File:AutomatedThreats-Newcastle-20180327.pptx&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP Automated Threats to Web Applications presentation for OWASP Newcastle on 27 March 2018, by Colin Watson&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AutomatedThreats-Newcastle-20180327.pptx&amp;diff=238418</id>
		<title>File:AutomatedThreats-Newcastle-20180327.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AutomatedThreats-Newcastle-20180327.pptx&amp;diff=238418"/>
				<updated>2018-03-07T14:25:34Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: OWASP Automated Threats to Web Applications presentation for OWASP Newcastle on 27 March 2018, by Colin Watson&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP Automated Threats to Web Applications presentation for OWASP Newcastle on 27 March 2018, by Colin Watson&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=238139</id>
		<title>OWASP Automated Threats to Web Applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=238139"/>
				<updated>2018-02-26T19:54:18Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* What Isn't It? */ Nots&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Automated-threats-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Automated Threats to Web Applications==&lt;br /&gt;
&lt;br /&gt;
The OWASP Automated Threats to Web Applications Project has completed a review of reports, academic and other papers, news stories and vulnerability taxonomies/listings to identify, name and classify these scenarios – automated by software causing a divergence from accepted behavior producing one or more undesirable effects on a web application, but excluding tool-based exploitation of single-issue vulnerabilities. The initial objective was to produce an ontology providing a common language for developers, architects, operators, business owners, security engineers, purchasers and suppliers/ vendors, to facilitate clear communication and help tackle the issues.&lt;br /&gt;
The project also identifies symptoms, mitigations and controls in this problem area. Like all OWASP outputs, everything is free and published using an open source license.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Automation-project-briefing.pdf Two page summary project briefing as a PDF].&lt;br /&gt;
&lt;br /&gt;
== Description==&lt;br /&gt;
&lt;br /&gt;
Web applications are subjected to unwanted automated usage – day in, day out. Often these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is commonly mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the primary intent. Frequently these have sector-specific names. Most of these problems seen regularly by web application owners are not listed in any OWASP Top Ten or other top issue list. Furthermore, they are not enumerated or defined adequately in existing dictionaries. These factors have contributed to inadequate visibility, and an inconsistency in naming such threats, with a consequent lack of clarity in attempts to address the issues.&lt;br /&gt;
&lt;br /&gt;
Without sharing a common language between devops, architects, business owners, security engineers, purchasers and suppliers/vendors, everyone has to make extra effort to communicate clearly. Misunderstandings can be costly. The adverse impacts affect the privacy and security of individuals as well as the security of the applications and related system components.&lt;br /&gt;
&lt;br /&gt;
== Automated Threats ==&lt;br /&gt;
&lt;br /&gt;
The list of threat events, defined more fully in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-020 Account Aggregation]]&lt;br /&gt;
* [[OAT-019 Account Creation]]&lt;br /&gt;
* [[OAT-003 Ad Fraud]]&lt;br /&gt;
* [[OAT-009 CAPTCHA Defeat]]&lt;br /&gt;
* [[OAT-010 Card Cracking]]&lt;br /&gt;
* [[OAT-001 Carding]]&lt;br /&gt;
* [[OAT-012 Cashing Out]]&lt;br /&gt;
* [[OAT-007 Credential Cracking]]&lt;br /&gt;
* [[OAT-008 Credential Stuffing]]&lt;br /&gt;
* [[OAT-021 Denial of Inventory]]&lt;br /&gt;
* [[OAT-015  Denial of Service]]&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-006 Expediting]]&lt;br /&gt;
* [[OAT-004 Fingerprinting]]&lt;br /&gt;
* [[OAT-018 Footprinting]]&lt;br /&gt;
* [[OAT-005 Scalping]]&lt;br /&gt;
* [[OAT-011 Scraping]]&lt;br /&gt;
* [[OAT-016 Skewing]]&lt;br /&gt;
* [[OAT-013 Sniping]]&lt;br /&gt;
* [[OAT-017 Spamming]]&lt;br /&gt;
* [[OAT-002 Token Cracking]]&lt;br /&gt;
* [[OAT-014 Vulnerability Scanning]]&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
Not sure which is which? Use the [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] in conjunction with the full [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
All the materials are free to use. They are licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What Is This? ==&lt;br /&gt;
&lt;br /&gt;
Information and resources to help web application owners defend against [[:Category:Automated Threat|automated threats]]&lt;br /&gt;
&lt;br /&gt;
== What Isn't It? ==&lt;br /&gt;
&lt;br /&gt;
* Not another vulnerability list&lt;br /&gt;
* Not an OWASP Top N List&lt;br /&gt;
* Not threat modelling&lt;br /&gt;
* Not attack trees&lt;br /&gt;
* Not non web&lt;br /&gt;
* Not non application&lt;br /&gt;
&lt;br /&gt;
==Project Objective==&lt;br /&gt;
&lt;br /&gt;
This project brings together research and analysis of real world automated attacks against web applications, to produce documentation to assist operators defend against these threats. Sector-specific guidance will be available.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Automatedthreats-presentation-small.jpg|link=media:Bots-AppSecUSA2017-Project-Summit.pptx]]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP WASC Web Hacking Incidents Database Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
* [[OWASP AppSensor Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP ModSecurity Core Rule Set Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Download the free handbook as a PDF]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [16 Feb 2018] OAT wiki pages created&lt;br /&gt;
* [15 Feb 2018] v1.2 Handbook published&lt;br /&gt;
* [25 Sep 2017] Promoted to Labs status&lt;br /&gt;
* [19-20 Sep 2017] Working session at the AppSecUSA 2017 Project Summit&lt;br /&gt;
* [15 May 2017] Draft feedback on Top Ten A7 shared&lt;br /&gt;
* [17 Apr 2017] [https://www.owasp.org/index.php/File:BadBots_OWASP_AppSec_CA_2017.pptx Slides] from AppSec California (2017)&lt;br /&gt;
* [20 Dec 2016] Threat identification chart [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf published]&lt;br /&gt;
* [03 Nov 2016] Presentation at [http://lascon.org/ LASCON 2016]&lt;br /&gt;
* [03 Nov 2016] v1.1 Handbook published&lt;br /&gt;
* [11-12 Oct 2016] Working session at the [https://docs.google.com/presentation/d/1iMQHTc-h5qcP7gBBRcPHGmVaTWqx3dpMwNMVlA--rqs/edit#slide=id.p3 AppSecUSA 2017 Project Summit]&lt;br /&gt;
* [04 Aug 2016] Project Q&amp;amp;A at Blackhat USA 2-5pm in the OWASP booth&lt;br /&gt;
* [26 Oct 2015] [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf v1.01 handbook] published&lt;br /&gt;
* [24 Sep 2015] [https://www.owasp.org/index.php/File:Colinwatson-a-new-ontology-of-unwanted-automation.pptx Presentation] at [https://2015.appsecusa.org/c/?page_id=896#a AppSec USA 2015]&lt;br /&gt;
&lt;br /&gt;
==In Print==&lt;br /&gt;
&lt;br /&gt;
[[File:AutomatedThreatHandbook_small.jpg|link=http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22932107.html]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-23540699.html Automated Threat Handbook] can be purchased at cost as a print on demand book.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
    &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Scope and Definitions =&lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The aim was to create a listing of vendor-neutral and technology agnostic terms that describe real-world automated threats to web applications, at a level of abstraction that application owners can relate to. These terms are threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
The focus is on abuse of functionality - misuse of inherent functionality and related design flaws, some of which are also referred to as business logic flaws. There is almost no focus on implementation bugs. It is not that the latter are not the target for attacks, but there is much more knowledge published in that area with a greater agreement on terminology. All the scenarios identified must require the web to exist for the threat to be materialised. Many of the scenarios have impacts upon the organisation that owns or operates web applications, but some scenarios have impacts more focused on individuals or other bodies. An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
==Definitions ==&lt;br /&gt;
&lt;br /&gt;
=== Automated Threats to Web Applications ===&lt;br /&gt;
&lt;br /&gt;
Threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
== Glossary ==&lt;br /&gt;
&lt;br /&gt;
;Action&lt;br /&gt;
: An act taken against an asset by a threat agent. Requires first that contact occurs between the asset and threat agent (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Application&lt;br /&gt;
: Software that performs a business process i.e. not system software&lt;br /&gt;
: A software program hosted by an information system (Ref 2)&lt;br /&gt;
&lt;br /&gt;
; Application layer&lt;br /&gt;
: &amp;quot;Layer 7” in the OSI model (Ref 3) and “application layer” in the TCP/IP model (Ref 4)&lt;br /&gt;
&lt;br /&gt;
;Threat&lt;br /&gt;
: Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events, etc.); malicious actors; errors; failures (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Agent&lt;br /&gt;
: Any agent (e.g., object, substance, human, etc.) that is capable of acting against an asset in a manner that can result in harm (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Event&lt;br /&gt;
: Occurs when a threat agent acts against an asset (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Web&lt;br /&gt;
: The World Wide Web (WWW, or simply Web) is an information space in which the items of interest, referred to as resources, are identified by global identifiers called Uniform Resource Identifiers (URI) (Ref 5)&lt;br /&gt;
: The first three specifications for Web technologies defined URLs, HTTP, and HTML (Ref 6)&lt;br /&gt;
&lt;br /&gt;
; Web application&lt;br /&gt;
: An application delivered over the web&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Glossary references:&lt;br /&gt;
# [http://pubs.opengroup.org/onlinepubs/9699919899/toc.pdf Risk Taxonomy, Technical Standard, The Open Group, 2009]&lt;br /&gt;
# [http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf NISTIR 7298 rev 2, NIST]&lt;br /&gt;
# [http://en.wikipedia.org/wiki/OSI_model OSI model, Wikipedia] &lt;br /&gt;
# [http://en.wikipedia.org/wiki/Internet_protocol_suite TCP/IP model, Wikipedia]&lt;br /&gt;
# [http://www.w3.org/TR/webarch/ Architecture of the World Wide Web, Volume One, W3C]&lt;br /&gt;
# [http://www.w3.org/Help/ Help and FAQ, W3C]&lt;br /&gt;
&lt;br /&gt;
=Use Case Scanarios=&lt;br /&gt;
&lt;br /&gt;
The following scenarios and organisation names are completely fictitious.&lt;br /&gt;
&lt;br /&gt;
==Defining application development security requirements==&lt;br /&gt;
&lt;br /&gt;
Cinnaminta SpA intends to build and launch a new multi-lingual and multi-currency ecommerce website. The development will be outsourced and Cinnaminta has been working on the functional design document. Among many other requirements, the application security specification requires that the website must not include any vulnerabilities identified in PCI DSS v3.1 Requirement 6.5, nor any other vulnerabilities that could affect the protection of payment cardholder data. Cinnaminta specifies that the website's payment functions must not be susceptible to the threat events '''OAT-001 Carding''' or '''OAT-010 Card Cracking''' as defined in the '''OWASP Automated Threat Handbook'''. In addition, the application must interact with the company's existing fraud detection system to counter '''OAT-012 Cashing Out'''. The requirements are specified in terms of these threat events, rather than particular product or service categories. Development houses responding to the call for bids use the ontology to focus their answers to these aspects appropriately.&lt;br /&gt;
&lt;br /&gt;
== Sharing intelligence within a sector==&lt;br /&gt;
&lt;br /&gt;
Unlimited Innovations Inc develops and supports patient-facing software solutions to a range of healthcare providers, many of which participate in the National Health Service Cyber Intelligence Sharing Center (NHS-CISC). Unlimited Innovations already builds continuous monitoring capabilities into its software and decides to provide an optional enhancement so that customers could choose to share their misuse event data with each other, to benefit from the combined threat intelligence. Rather than sharing large quantities of low-level data, Unlimited Innovations aggregates information and broadcasts validated and categorised threat data amongst the participating organisations. Automation attacks are classified according to the threat events defined in the '''OWASP Automated Threat Handbook''' so that each receiving party understands the nature of the threat. Even organisations that do not want to take part in this information sharing can benefit, since their own categorised information is made available to internal business management in the form of an easy-to-comprehend monitoring dashboard. The information gathered can also be fed into their other business information management systems to help improve patient service.&lt;br /&gt;
&lt;br /&gt;
== Exchanging threat data between CERTs==&lt;br /&gt;
&lt;br /&gt;
National Computer Emergency Response Teams (CERTs) recognise that sharing of local information can contribute to worldwide prevention of cyber attacks. Despite advances in cooperation between CERTs, anything to increase continuity and interoperability, such as standards for data exchange, is encouraged. CERT Zog is concerned about the sparsity of application-specific data it receives, and also the classification of that data. It has a particular concern about attacks and breaches that affect sectors defined in Zog's 2015 national cyber security strategy. CERT Zog and its neighbour CERT Tarset agree to tag threat events using the '''OWASP Automated Threat Handbook''' in order to add greater context to existing solutions being used for threat data exchange between them. The programme also collects sector metadata, so that all organisations within these can benefit from the centralised intelligence.&lt;br /&gt;
&lt;br /&gt;
== Enhancing application penetration test findings==&lt;br /&gt;
&lt;br /&gt;
Specialist application security penetration testing firm Cherak Industries Pte Ltd works primarily for financial services companies in the banking and insurance sectors, and is looking to expand its business throughout Asia. Cherak has some innovative pen test result reporting systems which integrate with client software fault and vulnerability tracking systems, and it actively looks for methods to provide additional value to its clients. Cherak has identified that pen test clients would benefit from help to in understanding the effects of combinations of vulnerabilities, especially design flaws, and has decided to utilise the '''OWASP Automated Threat Handbook''' to define and explain the automation-related threats. The individual vulnerabilities were scored as normal using CVSSv2 and v3, the matching CWEs identified, and mitigations in place documented. In addition, Cherak uses the threat events defined in the '''OWASP Automated Threat Handbook''' to help create a new section in the executive summary that explains how combinations of the issues found could lead to automation threats and the possible technical and business impacts. For example, an assessment for one client had identified weaknesses in authentication so that there is a risk of '''OAT-008 Credential Stuffing'''. The defined identifier was provided to the client, so its technical staff could refer to additional information on the OWASP website.&lt;br /&gt;
&lt;br /&gt;
== Specifying service acquisition needs==&lt;br /&gt;
&lt;br /&gt;
Falstone Paradise Inc is concerned about malicious use of their portfolio of hotel and resort websites. The majority of the websites use a shared application platform, but there are some unique applications and a large number of other micro-sites, some of which use generic content management systems such as Wordpress and Drupal. Falstone Paradise has identified that its IT operations team are spending too much time dealing with the effects of automated misuse, such as cleaning up data, resetting customer accounts and providing extra capacity during attacks. Furthermore, the unwanted automation is also causing some instabilities leading to negative feedback from customers. Therefore Falstone Paradise decides to go out to the security marketplace to identify, assess and select products or services that might help address these automation issues for all its websites. Their buying team works with their information technology colleagues to write the detailed requirements in an Invitation to Tender (ITT) document. This describes the types of attacks its web applications are receiving, their frequency of occurrence and their magnitudes. These are defined according to the '''OWASP Automated Threat Handbook''', so that vendors do not misunderstand the requirements, and each vendor's offering can be assessed against the particular automation threat events of concern.&lt;br /&gt;
&lt;br /&gt;
== Characterising vendor services ==&lt;br /&gt;
&lt;br /&gt;
Better Best Ltd has developed an innovative technology to help gaming companies defend against a range of automated threats that can otherwise permit cheating and distortion of the game, leading to disruption for normal players. The solution can be deployed on premises, but is also available in the cloud as a service. But Better Best is finding difficulty explaining its solution in the market place, especially since it does not fit into any conventional product category. Better Best decide to use the terminology and threat events listed in the '''OWASP Automated Threat Handbook''' to define their product's capabilities. They hope this will provide some clarity about their offering, and also demonstrate how their product can be used to replace more than one other conventional security device. Additionally, Better Best writes a white paper describing how their product has been successfully used by one of their reference customers Hollybush Challenge Games to protect against '''OAT-006 Expediting''', '''OAT-005 Scalping''', '''OAT-016 Skewing''' and '''OAT-013 Sniping'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Ontology=&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The A-Z list of [[:Category:Automated Threat|automated threat events]] and summary descriptions, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-020 Account Aggregation]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Use by an intermediary application that collects together multiple accounts and interacts on their behalf.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-019 Account Creation]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Create multiple accounts for subsequent misuse.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-003 Ad Fraud]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
False clicks and fraudulent display of web-placed advertisements.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-009 CAPTCHA Defeat]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Solve anti-automation tests.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-010 Card Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify missing start/expiry dates and security codes for stolen payment card data by trying different values.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-001 Carding]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Multiple payment authorisation attempts used to verify the validity of bulk stolen payment card data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-012 Cashing Out]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Buy goods or obtain cash utilising validated stolen payment card or other user account data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-007 Credential Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify valid login credentials by trying different values for usernames and/or passwords.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-008 Credential Stuffing]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass log in attempts used to verify the validity of stolen username/password pairs.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-021 Denial of Inventory]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Deplete goods or services stock without ever completing the purchase or committing to the transaction.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-015  Denial of Service]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Target resources of the application and database servers, or individual user accounts, to achieve denial of service (DoS).&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-006 Expediting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Perform actions to hasten progress of usually slow, tedious or time-consuming actions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-004 Fingerprinting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Elicit information about the supporting software and framework types and versions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-018 Footprinting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Probe and explore application to identify its constituents and properties.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-005 Scalping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Obtain limited-availability and/or preferred goods/services by unfair methods.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-011 Scraping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Collect application content and/or other data for use elsewhere.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-016 Skewing]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Repeated link clicks, page requests or form submissions intended to alter some metric.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-013 Sniping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Last minute bid or offer for goods or services.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-017 Spamming]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Malicious or questionable information addition that appears in public or private content, databases or user messages.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-002 Token Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass enumeration of coupon numbers, voucher codes, discount tokens, etc.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-014 Vulnerability Scanning]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Crawl and fuzz application to identify weaknesses and possible vulnerabilities.&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Comparison with other dictionaries, taxonomies and lists==&lt;br /&gt;
&lt;br /&gt;
===[https://capec.mitre.org/ Common Attack Pattern Enumeration and Classification] (CAPEC)===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-capec-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
CAPEC is a dictionary and classification taxonomy of known attacks on software. Its primary classification structures are:&lt;br /&gt;
&lt;br /&gt;
* [https://capec.mitre.org/data/definitions/3000.html Domains of attack] (3000) - Social Engineering (403), [https://capec.mitre.org/data/definitions/437.html Supply Chain] (437), Communications (512), [https://capec.mitre.org/data/definitions/513.html Software] (513), Physical Security (514), Hardware (515)&lt;br /&gt;
* Mechanism of Attack (1000) - Gather Information (118), Deplete Resources (119), Injection (152), Deceptive Interactions (156), Manipulate Timing and State (172), Abuse of Functionality (210), Probabilistic Techniques (223), Exploitation of Authentication (225), Exploitation of Authorization (232), Manipulate Data Structures (255), Manipulate Resources (262), Analyze Target (281), Gain Physical Access (436), Malicious Code Execution (525), Alter System Components (526), Manipulate System Users (527)&lt;br /&gt;
&lt;br /&gt;
===[http://projects.webappsec.org/w/page/13246978/Threat%20Classification WASC Threat Classification]===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-wasc-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
The WASC Threat Classification classifies weaknesses and attacks that can lead to the compromise of a website, its data, or its users.&lt;br /&gt;
&lt;br /&gt;
===[[OWASP WASC Web Hacking Incidents Database Project]] (WHID)===&lt;br /&gt;
&lt;br /&gt;
WHID [https://www.google.com/fusiontables/DataSource?snapid=S1536501YnLo classifies] publicly known incidents using:&lt;br /&gt;
&lt;br /&gt;
* attack methods e.g. ARP spoofing, abuse of functionality, account compromise, administration error, automation, backdoor, banking trojan, brute force, clickjacking, code injection, content injection, content spoofing, credential/session prediction, cross site request forgery (CSRF), cross-site scripting (XSS), denial of service, directory traversal, domain hijacking, DNS hijacking, forceful browsing, HTTP response splitting, hidden parameter manipulation, hosting malicious code, information leakage, insufficient authentication, known vulnerability, local file inclusion (LFI), malvertising, malware, malware injection, mass assignment, misconfiguration, OS commanding, parameter manipulation, path traversal, phishing, predictable resource location, process automation, redirection, remote file inclusion (RFI), rogue 3rd party app, scaping, search engine poisoning, shell injection, social engineering, stolen credentials, SQL injection, unintentional information disclosure, weak password recovery validation, worm&lt;br /&gt;
* weakness e.g. abuse of functionality, application misconfiguration, directory indexing, improper filesystem permissions, improper input handling, improper output handling, information leakage, insecure indexing, insufficient anti-automation, insufficient authentication, insufficient authorization, insufficient entropy, insufficient password recovery, insufficient process validation, insufficient session expiration, insufficient transport layer protection, misconfiguration, predictable resource location, weak password&lt;br /&gt;
* outcome account hijacking, account takeover, botnet participation, chaos, credit card leakage, data loss, defacement, DDoS attacks, DNS hijacking, DNS redirection, disinformation, disclosure only, downtime, extortion, fraud, information warfare, leakage of information, link spam, loss of sales, malware distribution,  monetary loss, phishing, planting of malware, service disruption, session hijacking, spam, spam links, stolen credentials, worm&lt;br /&gt;
&lt;br /&gt;
Plus other/various/unknown.&lt;br /&gt;
&lt;br /&gt;
= Bibliography =&lt;br /&gt;
&lt;br /&gt;
The following academic, open source, commercial and news sources were used in the research on automated threats to web applications. OWASP is a worldwide not-for-profit charitable organization focused on improving the security of software.  We operate under a vendor neutral policy and we do not endorse products or services.&lt;br /&gt;
&lt;br /&gt;
* 10 years of Application Security, Denyall http://www.denyall.com/resources/whitepapers/?aliId=3438442&lt;br /&gt;
*	2012 Payment Card Threat Report	 https://www.securitymetrics.com/static/resources/orange/2012%20Payment%20Card%20Threat%20Report%20copy.pdf				&lt;br /&gt;
*	2014 Bot Traffic Report: Just the Droids You were Looking for	 http://www.incapsula.com/blog/bot-traffic-report-2014.html				&lt;br /&gt;
*	3 Types of ‘Return Fraud’ to Monitor this Holiday Season	 http://www.practicalecommerce.com/articles/3168-3-Types-of-%E2%80%98Return-Fraud-to-Monitor-this-Holiday-Season	&lt;br /&gt;
* 7 Ways Bots Hurt Your Website, Distil Networks http://www.distilnetworks.com/7-ways-bots-hurt-website-whitepaper/						&lt;br /&gt;
*	Abusing HTML 5 Structured Client-side Storage	2008	 http://packetstorm.wowhacker.com/papers/general/html5whitepaper.pdf		&lt;br /&gt;
* Acquiring Experience with Ontology and Vocabularies, Walt Melo, Risa Mayan and Jean Stanford, 2011  http://www.omg.org/news/meetings/workshops/SOA-HC/presentations-2011/13_SC-6_Melo_Stanford_Mayan.pdf	&lt;br /&gt;
*	An Anatomy of a SQL Injection Attack	 Hacker Intelligence Initiative	 Imperva	 	 http://www.imperva.com/docs/HII_An_Anatomy_of_a_SQL_Injection_Attack_SQLi.pdf	&lt;br /&gt;
*	The Anatomy of Clickbot.A	 https://www.usenix.org/legacy/event/hotbots07/tech/full_papers/daswani/daswani.pdf				&lt;br /&gt;
*	Anatomy of comment spam	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Anatomy_of_Comment_Spam.pdf		&lt;br /&gt;
*	Anti-Automation Monitoring and Prevention	2015	 https://www.clerkendweller.uk/2015/1/29/AntiAutomation-Monitoring-and-Prevention			&lt;br /&gt;
*	Anti-DDoS Solution for Internet Corporation	 http://www.nsfocus.com/uploadfile/Solution/NSFOCUS%20Anti-DDoS%20Solution%20for%20Internet%20Corporation.pdf				&lt;br /&gt;
*	Anti-Fraud Principles and Proposed Taxonomy	 Sep 2014	 http://www.iab.net/media/file/IAB_Anti_Fraud_Principles_and_Taxonomy.pdf			&lt;br /&gt;
*	Apache Security	 Ivan Ristic	 			&lt;br /&gt;
* Application Security Desk Reference, OWASP https://www.owasp.org/index.php/Category:OWASP_ASDR_Project&lt;br /&gt;
* Application Security Guide For CISOs, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf&lt;br /&gt;
* AppSensor, OWASP https://www.owasp.org/index.php/OWASP_AppSensor_Project&lt;br /&gt;
*	Attack &amp;amp; Defense Labs	 http://www.andlabs.org/html5.html				&lt;br /&gt;
*	Attack categories	 OWASP	 https://www.owasp.org/index.php/Category:Attack	&lt;br /&gt;
* Attack Trees, Schneier, Dr. Dobb's Journal, December 1999 https://www.schneier.com/paper-attacktrees-ddj-ft.html		&lt;br /&gt;
*	Attacking with HTML5	2010	 https://media.blackhat.com/bh-ad-10/Kuppan/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-wp.pdf			&lt;br /&gt;
*	Automated attacks	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Automation_of_Attacks.pdf		&lt;br /&gt;
*	Avoiding the Top 10 Software Security Design Flaws	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf				&lt;br /&gt;
*	Bad Bots On The Rise	 Dec 2014	 http://www.darkreading.com/informationweek-home/bad-bots-on-the-rise/d/d-id/1318276	&lt;br /&gt;
* Banking Botnets Persist Despite Takedowns, Dell SecureWorks, 2015 http://www.secureworks.com/cyber-threat-intelligence/threats/banking-botnets-persist-despite-takedowns/	&lt;br /&gt;
*	The Barracuda Web Application Firewall: XML Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_XML_Firewall.pdf	&lt;br /&gt;
*	Blocking Brute Force Attacks	 http://www.cs.virginia.edu/~csadmin/gen_support/brute_force.php				&lt;br /&gt;
*	Bot Traffic Growing Problem for Digital	 Oct 2014	 http://www.netnewscheck.com/article/36537/bot-traffic-growing-problem-for-digital			&lt;br /&gt;
*	BotoPedia	 Incapsula	 http://www.botopedia.org/			&lt;br /&gt;
*	Boy in the Browser	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/Boy_in_the_Browser	&lt;br /&gt;
* Business Logic Attacks - Bots and BATs, Eldad Chai, 2009 http://www.owasp.org/images/9/96/AppSecEU09_BusinessLogicAttacks_EldadChai.ppt		&lt;br /&gt;
*	Bypassing Client Application Protection Techniques	 http://www.securiteam.com/securityreviews/6S0030ABPE.html&lt;br /&gt;
*	A CAPTCHA in the Rye	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_a_CAPTCHA_in_the_Rye.pdf					&lt;br /&gt;
*	Characterizing Large Scale Click fraud	 http://cseweb.ucsd.edu/~voelker/pubs/za-ccs14.pdf	&lt;br /&gt;
* Charter Addition Proposal: &amp;quot;Trusted Code&amp;quot; for the Web https://lists.w3.org/Archives/Public/public-webappsec/2015Mar/0150.html&lt;br /&gt;
*	A cheesy Apache / IIS DoS vuln (+a question) 	 http://www.securityfocus.com/archive/1/456339/30/0/threaded	&lt;br /&gt;
* China's Man-on-the-Side Attack on GitHub http://www.netresec.com/?page=Blog&amp;amp;month=2015-03&amp;amp;post=China%27s-Man-on-the-Side-Attack-on-GitHub&lt;br /&gt;
* The CISO Survey and Report, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-report-2013-1.0.pdf&lt;br /&gt;
* Common Attack Pattern Enumeration and Classification (CAPEC), Mitre https://capec.mitre.org/			&lt;br /&gt;
*	Common Cyber Attacks: Reducing the Impact	 CERT-UK	 https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/400106/Common_Cyber_Attacks-Reducing_The_Impact.pdf			&lt;br /&gt;
*	Corporate espionage – the internet’s new growth industry	 http://www.itproportal.com/2015/03/19/corporate-espionage-internets-new-growth-industry/				&lt;br /&gt;
*	CSA Top Threats to Cloud Computing	 https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf				&lt;br /&gt;
*	CSRF vulnerability in GMail service	 http://seclists.org/fulldisclosure/2009/Mar/29		&lt;br /&gt;
* CWE/SANS Top 25 Most Dangerous Software Errors, 2011 http://cwe.mitre.org/top25/		&lt;br /&gt;
*	Cyber Fraud - Tactics	 Techniques and Procedures	 http://www.crcpress.com/product/isbn/9781420091274			&lt;br /&gt;
* Cybercrime Report: Q1 2015, ThreatMetrix, 2015 http://info.threatmetrix.com/WP-2015Q1CybercrimeReport_WP-LP.html&lt;br /&gt;
*	Data Breach Investigations Report (DBIR), 2014	 http://www.verizonenterprise.com/DBIR/2014/				&lt;br /&gt;
* Data Breach Investigations Report (DBIR), 2015 http://www.verizonenterprise.com/DBIR/2015/&lt;br /&gt;
*	Data Breaches Fuel Login Attacks	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2014-state-of-the-internet-threat-advisory-public-data-breaches-fuel-login-attacks.pdf		&lt;br /&gt;
*	Data Scraping	 Wikipedia	 http://en.wikipedia.org/wiki/Data_scraping			&lt;br /&gt;
*	DDoS Quick Guide	 https://www.us-cert.gov/sites/default/files/publications/DDoS%20Quick%20Guide.pdf	&lt;br /&gt;
* DDoS Threat Landscape Report, 2013-2014 http://lp.incapsula.com/rs/incapsulainc/images/2013-14_ddos_threat_landscape.pdf	&lt;br /&gt;
* Defending Against an Internet-based Attack on the Physical World http://avirubin.com/scripted.attacks.pdf		&lt;br /&gt;
*	Defending Against Application-Based DDoS Attacks with the Barracuda Web Application Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_Defending%20_Against_%20Application-Based_%20DDoS_%20Attacks.pdf				&lt;br /&gt;
*	Demystifying HTML 5 Attacks	 http://resources.infosecinstitute.com/demystifying-html-5-attacks/				&lt;br /&gt;
*	Denial of Service Attacks: A Comprehensive Guide to Trends	 Techniques	 and Technologies	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Denial_of_Service_Attacks-Trends_Techniques_and_Technologies.pdf&lt;br /&gt;
*	Detecting and Blocking Site Scraping Attacks	 Imperva	 http://www.imperva.com/docs/WP_Detecting_and_Blocking_Site_Scraping_Attacks.pdf			&lt;br /&gt;
*	Detecting Automation of Twitter Accounts: Are you a human	 cyborg	 or a bot?	 http://www.cs.wm.edu/~hnw/paper/tdsc12b.pdf		&lt;br /&gt;
*	Detecting Malice	 Robert &amp;quot;RSnake&amp;quot; Hansen	2009	 http://www.detectmalice.com/		&lt;br /&gt;
*	Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) 	 http://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1414072277428&amp;amp;uri=CELEX:32002L0058				&lt;br /&gt;
*	Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data 	 http://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:31995L0046				&lt;br /&gt;
*	Distributed Denial-of-Service (DDoS) Cyber-Attacks	 Risk Mitigation	 and Additional Resources	 Federal Financial Institutions Examination Council	 http://www.ffiec.gov/press/PDF/FFIEC%20DDoS%20Joint%20Statement.pdf	&lt;br /&gt;
*	Do Evil - The Business of Social Media Bots	 Forbes	 http://www.forbes.com/sites/lutzfinger/2015/02/17/do-evil-the-business-of-social-media-bots/			&lt;br /&gt;
*	DoS and DDoS Glossary of Terms	 prolexic	 http://www.prolexic.com/knowledge-center-dos-and-ddos-glossary.html#layer-7-ddos-attack			&lt;br /&gt;
*	E-commerce Malware	 Trustwave	 https://gsr.trustwave.com/topics/placeholder-topic/e-commerce-malware/	&lt;br /&gt;
* Exploiting Software, G. Hoglund and G. McGraw, Addison-Wesley, 2004&lt;br /&gt;
* Five Trends to Track in E-Commerce Fraud, ThreatMetrix, 2013 http://info.threatmetrix.com/rs/threatmetrix/images/Five_Trends_eCommerce_Fraud_WP.pdf&lt;br /&gt;
* Hacker builds cheatbot for hit app Trivia Crack http://www.theregister.co.uk/2015/03/26/hacker_builds_trivia_crack_cheat_app/	&lt;br /&gt;
* Has Walmart opened itself up to “Denial of inventory” attacks?  https://arstechnica.com/business/2012/05/has-walmart-opened-itself-up-to-denial-of-inventory-attacks/	&lt;br /&gt;
* How Hoarder Bots Steal sales from Online Retailers https://www.internetretailer.com/mobile/2016/12/16/how-hoarder-bots-steal-sales-online-retailers&lt;br /&gt;
*	How to Defend Against DDoS Attacks - Strategies for the Network	 Transport	 and Application Layers	 Prolexic	 http://www.prolexic.com/kcresources/white-paper/strategies-for-the-network-transport-and-application-layers-412/Strategies_for_the_Network_Transport_and_Application_Layers_Prolexic_White_Paper_A4_082412.pdf	&lt;br /&gt;
* How to Defend Online Travel Websites in the Era of Site Scraping, Distil Networks http://www.distilnetworks.com/defend-online-travel-websites-era-site-scraping-download/&lt;br /&gt;
*	How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores	 http://research.microsoft.com/pubs/145858/caas-oakland-final.pdf				&lt;br /&gt;
*	HTML5 Overview	 A look at HTML5 Attack Scenarios	 Trend Micro	2011	 http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt_html5-attack-scenarios.pdf	&lt;br /&gt;
*	HTML5 Top 10 Threats Stealth Attacks and Silent Exploits	2012	 https://media.blackhat.com/bh-eu-12/shah/bh-eu-12-Shah_HTML5_Top_10-WP.pdf			&lt;br /&gt;
*	HTML5 web security	2011	 http://media.hacking-lab.com/hlnews/HTML5_Web_Security_v1.0.pdf			&lt;br /&gt;
*	HTTPPOST - Slow POST	 Wong Onn Chee	 OWASP AppSec DC 2010	 https://www.owasp.org/images/4/43/Layer_7_DDOS.pdf	&lt;br /&gt;
* If you've got @British_Airways account may make sense to change your password. Just had all my Avios cleared out! https://twitter.com/suttonnick/status/581556027948195840/photo/1	&lt;br /&gt;
* Internet Security Threat Report, Volume 19, 2014 http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf&lt;br /&gt;
*	An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks	 http://www.springer.com/gb/book/9788132202769	&lt;br /&gt;
*	Is Your Data Center Ready for Today’s DDoS Threats? DDoS attack types	 protection methods and testing your detection and mitigation defenses	 http://www.fortinet.com/sites/default/files/whitepapers/WP-DDoS-Testing.pdf			&lt;br /&gt;
*	Joomla Reflection DDoS-for-Hire	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2015-state-of-the-internet-threat-advisory-joomla-reflection-attack-ddos-for-hire.pdf		&lt;br /&gt;
*	Layer 7 DDOS – Blocking HTTP Flood Attacks	 http://blog.sucuri.net/2014/02/layer-7-ddos-blocking-http-flood-attacks.html				&lt;br /&gt;
*	Lenovo	 Superfish put smut on my system' – class-action lawsuit	 The Register	 http://www.theregister.co.uk/2015/02/23/lenovo_superfish_class_action_lawsuit/		&lt;br /&gt;
* List of Attack Vectors   Relative Vulnerability Rating TECAPI http://www.tecapi.com/public/relative-vulnerability-rating-gui.jsp#&lt;br /&gt;
*	Man in the Browser	 http://scisweb.ulster.ac.uk/~kevin/IJACI-Vol4No1-maninbrowser.pdf				&lt;br /&gt;
*	Man in the Browser Attack	 https://www.owasp.org/index.php/Man-in-the-browser_attack&lt;br /&gt;
* Mapping and Measuring Cybercrime, Oxford Internet Institute http://www.oii.ox.ac.uk/publications/FD18.pdf				&lt;br /&gt;
*	Massive Changes in the Criminal Landscape	 Europol	2015	 https://www.europol.europa.eu/content/massive-changes-criminal-landscape	&lt;br /&gt;
* Matching Attack Patterns to Security Vulnerabilities in Software-Intensive System Designs http://collaboration.csc.ncsu.edu/laurie/Papers/ICSE_Final_MCG_LW.pdf	&lt;br /&gt;
*	Mitigating DDoS Attacks with F5 Technology	 F5	 https://f5.com/resources/white-papers/mitigating-ddos-attacks-with-f5-technology			&lt;br /&gt;
* Mitigating the DoS/DDosS Threat, Radware, 2012 http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452061&lt;br /&gt;
* Modern Web Attacks, Sophos, 2007 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/modern-web-attacks.aspx&lt;br /&gt;
*	ModSecurity Advanced Topic of the Week: Mitigating Slow HTTP DoS Attacks	 https://www.trustwave.com/Resources/SpiderLabs-Blog/(Updated)-ModSecurity-Advanced-Topic-of-the-Week--Mitigating-Slow-HTTP-DoS-Attacks/	&lt;br /&gt;
* Most common attacks on web applications https://ipsec.pl/web-application-security/most-common-attacks-web-applications.html			&lt;br /&gt;
* Multi-dimensional Vulnerability Hierarchies Daniel Miessler  https://danielmiessler.com/study/multi-dimensional-vulnerability-hierarchies/&lt;br /&gt;
*	New Wave of DDoS Attacks Launched	 BankInfoSecurity.com	 Mar 2013	 http://www.bankinfosecurity.com/new-wave-ddos-attacks-launched-a-5584/op-1		&lt;br /&gt;
*	NOMAD: Toward Non-Invasive Moving Target Defense Against Web Bots	 http://faculty.cs.tamu.edu/guofei/paper/NOMAD_CNS13.pdf				&lt;br /&gt;
*	Online Ad Fraud Exposed: Advertisers Losing $6.3 Billion To $10 Billion Per Year	 Sep 2014	 http://www.darkreading.com/analytics/threat-intelligence/online-ad-fraud-exposed-advertisers-losing-$63-billion-to-$10-billion-per-year/d/d-id/1317979			&lt;br /&gt;
* Online Data Companies versus Bots: The Fight is on for Control of Online Data, Distil Networks http://www.distilnetworks.com/online-data-companies-vs-bots-download/&lt;br /&gt;
*	Optimal Airline Ticket Purchasing Using Automated User-Guided Feature Selection	 http://ijcai.org/papers13/Papers/IJCAI13-032.pdf				&lt;br /&gt;
*	Payment Checkout Flaws and Bugs	2014	 https://www.clerkendweller.uk/2014/11/4/Payment-Checkout-Flaws-and-Bugs			&lt;br /&gt;
*	PCI Compliance Report 2015	 Verizon	 http://www.verizonenterprise.com/pcireport/2015/			&lt;br /&gt;
*	Pixel Perfect Timing Attacks with HTML5	2013	 http://www.contextis.com/services/research/white-papers/pixel-perfect-timing-attacks-html5/			&lt;br /&gt;
*	Polymorphism as a Defense for Automated Attack of Websites	 http://link.springer.com/chapter/10.1007%2F978-3-319-07536-5_30				&lt;br /&gt;
*	Preventing Web Scraping: Best Practice 	 https://creativedigitalideas.files.wordpress.com/2014/11/best-practice-to-prevent-web-scraping.pdf				&lt;br /&gt;
*	Profile: Automated Credit Card Fraud	 http://old.honeynet.org/papers/profiles/cc-fraud.pdf				&lt;br /&gt;
* Protecting Against Web Floods, Radware http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452968&lt;br /&gt;
*	Q4 2014 State of the Internet Security Report	 prolexic	 http://www.stateoftheinternet.com/downloads/pdfs/2014-internet-security-report-q4.pdf			&lt;br /&gt;
*	Reflection injection	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf		&lt;br /&gt;
* A Report on taxonomy and evaluation of existing inventories, ENISAhttp://ecrime-project.eu/wp-content/uploads/2015/02/E-Crime-Deliverable-2-1-20141128_FINAL.pdf			&lt;br /&gt;
* Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft, Dept of Justice http://www.justice.gov/criminal/cybercrime/docs/ip-victim-guide-and-checklist-march-2013.pdf&lt;br /&gt;
*	SANS Top 20 Critical Controls	 https://www.sans.org/critical-security-controls/		&lt;br /&gt;
* Securing Websites, Sophos, 2011 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/securing-websites.aspx		&lt;br /&gt;
*	Security Insights: Defending Against Automated Threats	 http://www.securityweek.com/security-insights-defending-against-automated-threats				&lt;br /&gt;
*	Server side DDoS	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/DDOS_Attack_Method_Payload_05182010			&lt;br /&gt;
*	Slow Read Denial of Service attack	 https://code.google.com/p/slowhttptest/wiki/SlowReadTest				&lt;br /&gt;
*	Slow-Read DoS Attack	 https://www.trustwave.com/Resources/SpiderLabs-Blog/ModSecurity-Advanced-Topic-of-the-Week--Mitigation-of--Slow-Read--Denial-of-Service-Attack/				&lt;br /&gt;
*	Slowloris HTTP DoS	 http://ha.ckers.org/slowloris/	 	&lt;br /&gt;
* So what are the &amp;quot;most critical&amp;quot; application flaws? On new OWASP Top 10 https://ipsec.pl/application-security/2013/so-what-are-most-critical-application-flaws-new-owasp-top-10.html		&lt;br /&gt;
*	Social Media Bots Offer Phony Friends and Real Profit	 NY Times	 http://www.nytimes.com/2014/11/20/fashion/social-media-bots-offer-phony-friends-and-real-profit.html?_r=1			&lt;br /&gt;
* Software Vulnerability Analysis, Krsul, 1998 http://www.krsul.org/ivan/articles/main.pdf&lt;br /&gt;
*	Sophos Security Threat Report	 http://blogs.sophos.com/2014/12/11/our-top-10-predictions-for-security-threats-in-2015-and-beyond/&lt;br /&gt;
* SpoofedMe Social Login Attack Discovered by IBM X-Force Researchers http://securityintelligence.com/spoofedme-social-login-attack-discovered-by-ibm-x-force-researchers/#.VSuiEhPSngM				&lt;br /&gt;
* State of Software Security Report, Volume 5, Veracode, 2013 https://info.veracode.com/state-of-software-security-report-volume5.html&lt;br /&gt;
*	Stopping Automated Attack Tools	 http://www.technicalinfo.net/papers/StoppingAutomatedAttackTools.html&lt;br /&gt;
* Taxonomy on Online Game Security http://www.math.snu.ac.kr/~jhcheon/publications/2004/Taxonomy%20on%20online%20game%20security_EL.pdf	&lt;br /&gt;
* A Taxonomy of Computer Program Security Flaws, with Examples, Landwehr https://cwe.mitre.org/documents/sources/ATaxonomyofComputerProgramSecurityFlawswithExamples%5BLandwehr93%5D.pdf&lt;br /&gt;
* A Taxonomy of Security Faults in the UNIX Operating System, Aslam, 1995 https://cwe.mitre.org/documents/sources/ATaxonomyofSecurityFaultsintheUNIXOperatingSystem%5BAslam95%5D.pdf		&lt;br /&gt;
* Testing Guide, v4, OWASP, 2014 https://www.owasp.org/images/5/52/OWASP_Testing_Guide_v4.pdf								&lt;br /&gt;
*	The Bot Baseline: Fraud in Digital Advertising	 https://s3.amazonaws.com/whiteops-public/WO-ANA-Baseline-Study-of-Bot-Fraud.pdf							&lt;br /&gt;
*	The Internet Organised Crime Threat Assessment (iOCTA) 2014	 https://www.europol.europa.eu/content/internet-organised-crime-threat-assesment-iocta				&lt;br /&gt;
*	The Notorious Nine	 Cloud Computing Top Threats in 2013	 CSA	 https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf	&lt;br /&gt;
* The Risks of Content Management Systems, IBM, 2015 https://portal.sec.ibm.com/mss/html/en_US/support_resources/pdf/CMS_Threats_MSS_Threat_Report.pdf	&lt;br /&gt;
* The Spy in the Sandbox – Practical Cache Attacks in Javascript http://iss.oy.ne.ro/SpyInTheSandbox.pdf						&lt;br /&gt;
* Thousands of Hacked Uber Accounts Selling on Dark Web for $1 http://thehackernews.com/2015/03/thousands-of-hacked-uber-accounts_30.html?m=1&lt;br /&gt;
* Threat Intelligence Quarterly, IBM, 1Q 2015 https://www.ibm.com/services/forms/signup.do?source=swg-WW_Security_Organic&amp;amp;S_PKG=ov33510&amp;amp;S_TACT=C327017W&amp;amp;dynform=18101&lt;br /&gt;
* Threat Modeling: Designing for Security, Adam Shostack, Wiley, April 2014 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118809998.html&lt;br /&gt;
*	Threats and Mitigations: A Guide to Multi-Layered Web Security - eBook	 Prolexic	 	 http://www.prolexic.com/knowledge-center/prolexic-download/guide-multi-layered-web-security-ebook.pdf		&lt;br /&gt;
* Trapping Unknown Malware in a Context Web, Sophos http://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/HuqSzabo-VB2013.pdf?la=en.pdf&lt;br /&gt;
*	Trustwave Global Security Report	2014	 https://www2.trustwave.com/GSR2014.html?utm_source=redirect&amp;amp;utm_medium=web&amp;amp;utm_campaign=GSR2014			&lt;br /&gt;
*	TurboTax’s Anti-Fraud Efforts Under Scrutiny	 http://krebsonsecurity.com/2015/02/turbotaxs-anti-fraud-efforts-under-scrutiny/				&lt;br /&gt;
*	Two Security Vulnerabilities in the Spring Framework’s MVC pdf (from 2008)	 http://blog.diniscruz.com/2011/07/two-security-vulnerabilities-in-spring.html&lt;br /&gt;
*	The Underground Economy of Spam: A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns	 http://static.usenix.org/events/leet11/tech/full_papers/Stone-Gross.pdf					&lt;br /&gt;
*	Understanding Web Bots and How They Hurt Your Business	 Encapsula	 http://www.slideshare.net/Incapsula/understanding-web-bots-and-how-they-hurt-your-business		&lt;br /&gt;
* Use of A Taxonomy of Security Faults, Taimur Aslam, Ivan Krsul and Eugene H Spafford, 1996  http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=2304&amp;amp;context=cstech&lt;br /&gt;
*	The WASC Threat Classification v2.0	 http://projects.webappsec.org/w/page/13246978/Threat%20Classification	&lt;br /&gt;
* Warhol Worms: The Potential for Very Fast Internet Plagues http://www.iwar.org.uk/comsec/resources/worms/warhol-worm.htm	&lt;br /&gt;
*	Web Application Attack Report #5	 Imperva	 http://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed5.pdf	&lt;br /&gt;
* Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Ryan Barnett, Wiley, December 2012 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118362187.html		&lt;br /&gt;
*	Web Attacks in the Wild	 Corsaire	 https://www.owasp.org/images/a/a7/Web_attacks_in_the_wild_-_ap.pdf			&lt;br /&gt;
*	Web Automation	 Friend or Foe?	 https://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf			&lt;br /&gt;
*	Web Spambot Detection Based on Web Navigation Behaviour 	 http://pedramhayati.com/papers/Web_Spambot_Detection_Based_on_Web_Usage_Behaviour.pdf		&lt;br /&gt;
* Website Security Statistics Report, 2014 http://info.whitehatsec.com/rs/whitehatsecurity/images/statsreport2014-20140410.pdf		&lt;br /&gt;
*	What is Zeus?	 http://www.sophos.com/medialibrary/pdfs/technical%20papers/sophos%20what%20is%20zeus%20tp.pdf				&lt;br /&gt;
*	When Web 2.0 Attacks! Understanding Ajax	 Flash and other highly interactive web technologies…	 https://www.owasp.org/images/f/fc/When_Web_2.0_Attacks_-_Understanding_Security_Implications_of_Highly_Interactive_Technologies-Rafal_Los.pdf			&lt;br /&gt;
*	Where have all of our Passwords Gone?	 Gartner	2015	 http://blogs.gartner.com/avivah-litan/2015/01/22/where-have-all-our-passwords-gone/		&lt;br /&gt;
*	WS-Attacks.org	 http://www.ws-attacks.org/index.php/Main_Page&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; What do you mean by &amp;quot;web&amp;quot;, &amp;quot;application&amp;quot; and &amp;quot;automated threat&amp;quot;?&lt;br /&gt;
: See the definitions in the project's {{#switchtablink:Project Scope and Definitions|glossary}}.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;ontology&amp;quot;?&lt;br /&gt;
: An ontology is a set of types, properties, and relationship. These together define a subject description language. This particular ontology is meant to represent what automated threats real world owners observe affecting their web applications in usual operations.&lt;br /&gt;
&lt;br /&gt;
; Isn't this another bug (vulnerability) list?&lt;br /&gt;
: No, none of the named automated threat events are implementation bugs - they relate to abuse of functionality using automated means.&lt;br /&gt;
&lt;br /&gt;
; But is it an OWASP Top N List?&lt;br /&gt;
: Again no, it's an ontology which currently contains 21 items but there may be more identified in the future. Also it is not an ordered list (like OWASP Top N lists) - the OAT identification numbers were randomly assigned, so the list is often written in alphabetical order to emphasize this.&lt;br /&gt;
&lt;br /&gt;
; I thought &amp;quot;so and so&amp;quot; already did that?&lt;br /&gt;
: We found that it did not exist. While many threats are mentioned in the sources researched, there was no overall list or definitions. We found the automated threat events tended to all be in a small number of definied items from Mitre CAPEC and WASC Threat Classification. If you know of other automated threat lists/taxonomies/ontologies, please share them.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;oat&amp;quot;?&lt;br /&gt;
: It is our abbreviation for OWASP Automated Threat (OAT).&lt;br /&gt;
&lt;br /&gt;
; I am confused and don't know which OAT my problem is - how do I identify it?&lt;br /&gt;
: In 2017 we created a [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] to help identify the correct OAT, which can then be confirmed by reading the full description in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook]. The short summaries are important explanations of each OAT name.&lt;br /&gt;
&lt;br /&gt;
; How can I help?&lt;br /&gt;
: Please join our mailing list, send ideas, contribute clarifications, corrections and improvement, and let other people know about the project and its handbook.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements and Sponsors =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
* Sumit Agarwal&lt;br /&gt;
* Jason Chan&lt;br /&gt;
* Mark Hall&lt;br /&gt;
* Omri Iluz&lt;br /&gt;
* Andrew van der Stock&lt;br /&gt;
* Roland Weber&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
Additionally other professional colleagues and website owners and operators who provided feedback.&lt;br /&gt;
&lt;br /&gt;
==Reviewers==&lt;br /&gt;
&lt;br /&gt;
* Igor Andriushchenko&lt;br /&gt;
* Gabriel Mendez Justiniano&lt;br /&gt;
* Matt Tesauro&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
All OWASP Projects are run and developed by volunteers and rely on personal donations and sponsorship to continue their development. OWASP does not endorse or recommend commercial products or services, allowing our community to remain vendor neutral with the collective wisdom of the best minds in software security worldwide. This project has received the sponsorship part of their Corporate OWASP membership fees from Verizon Digital Media Services in 2016 and Distil Networks in 2017, which has already contributed to the v1.2 production design costs, and will also be utilised to help promote knowledge of the project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[file:Verizon_Digital_Medial_Logo.jpg|size=150x45px|link=https://www.verizondigitalmedia.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Distil-flat-logo-2.png|link=https://www.distilnetworks.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Can you help? The project is looking for information on the prevalence and types of automated threats seen by web application owners in the real world. This will be used to refine and organise the information gathered from research papers, whitepapers, security reports and industry news. Please use the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/automated_threats_to_web_applications Mailing list]&lt;br /&gt;
&lt;br /&gt;
To share information confidentially, you can email the project leaders directly: [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:colin.watson@owasp.org Colin Watson].&lt;br /&gt;
&lt;br /&gt;
== Completed Outputs==&lt;br /&gt;
&lt;br /&gt;
* {{#switchtablink:Scope and Definitions|Glossary}}&lt;br /&gt;
* {{#switchtablink:Bibliography|Bibligraphy of information sources}}&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automated-threats.pdf summary chart] has been published summarising the information gathered and work to date&lt;br /&gt;
* Identifying automated threats to web applications, and determining the primary name used. This first part of the project intends to produce a consistent vocabulary for discussing the threats before moving onto other aspects&lt;br /&gt;
* The primary terms have now been defined and described for the ontology&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automation-briefing.pdf briefing document] was produced in May 2015&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Automated Threat Handbook] July 2015 [https://www.owasp.org/index.php/File:Owasp-automated-threat-handbook-source-files.zip source files], updated in November 2016&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automation-project-briefing.pdf project overview flyer]  July 2015&lt;br /&gt;
* Release  [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] December 2016&lt;br /&gt;
&lt;br /&gt;
== Roadmap==&lt;br /&gt;
&lt;br /&gt;
The project's roadmap was updated in October 2017.&lt;br /&gt;
&lt;br /&gt;
===Q1 2015===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Feb 2015: Define scope and terminology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Mar 2015: Research prior work and reports about automated threats to web applications to create bibliography&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q2 2015===&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Assess threats/attacks and create ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Application owner interviews and creation of initial project outputs, to refine model&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Publication of outputs and request for review/data&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Summit session and survey at AppSec EU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Write ontology document&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Write 2-page project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Publish project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul 2015: Publish v1.0 ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q3 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul-Sep 2016: Gathering of additional contributions and update handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q4 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Nov 2016: Release updated handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec 2016: Threat identification chart&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q1 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec-Mar 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check against changes to CAPEC v2.9&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q2 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Apr-Jun 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecEU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q3 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Chase up ongoing project review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecUS&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q4 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Release v1.2 &amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q1 2018 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create OAT wiki pages&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Future ===&lt;br /&gt;
* Write executive summary&lt;br /&gt;
* Release executive summary document&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-SR-2]] [[Category:SAMM-TA-1]] [[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=238132</id>
		<title>OWASP Automated Threats to Web Applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=238132"/>
				<updated>2018-02-26T15:47:00Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Roadmap */ v1.2 released&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Automated-threats-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Automated Threats to Web Applications==&lt;br /&gt;
&lt;br /&gt;
The OWASP Automated Threats to Web Applications Project has completed a review of reports, academic and other papers, news stories and vulnerability taxonomies/listings to identify, name and classify these scenarios – automated by software causing a divergence from accepted behavior producing one or more undesirable effects on a web application, but excluding tool-based exploitation of single-issue vulnerabilities. The initial objective was to produce an ontology providing a common language for developers, architects, operators, business owners, security engineers, purchasers and suppliers/ vendors, to facilitate clear communication and help tackle the issues.&lt;br /&gt;
The project also identifies symptoms, mitigations and controls in this problem area. Like all OWASP outputs, everything is free and published using an open source license.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Automation-project-briefing.pdf Two page summary project briefing as a PDF].&lt;br /&gt;
&lt;br /&gt;
== Description==&lt;br /&gt;
&lt;br /&gt;
Web applications are subjected to unwanted automated usage – day in, day out. Often these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is commonly mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the primary intent. Frequently these have sector-specific names. Most of these problems seen regularly by web application owners are not listed in any OWASP Top Ten or other top issue list. Furthermore, they are not enumerated or defined adequately in existing dictionaries. These factors have contributed to inadequate visibility, and an inconsistency in naming such threats, with a consequent lack of clarity in attempts to address the issues.&lt;br /&gt;
&lt;br /&gt;
Without sharing a common language between devops, architects, business owners, security engineers, purchasers and suppliers/vendors, everyone has to make extra effort to communicate clearly. Misunderstandings can be costly. The adverse impacts affect the privacy and security of individuals as well as the security of the applications and related system components.&lt;br /&gt;
&lt;br /&gt;
== Automated Threats ==&lt;br /&gt;
&lt;br /&gt;
The list of threat events, defined more fully in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-020 Account Aggregation]]&lt;br /&gt;
* [[OAT-019 Account Creation]]&lt;br /&gt;
* [[OAT-003 Ad Fraud]]&lt;br /&gt;
* [[OAT-009 CAPTCHA Defeat]]&lt;br /&gt;
* [[OAT-010 Card Cracking]]&lt;br /&gt;
* [[OAT-001 Carding]]&lt;br /&gt;
* [[OAT-012 Cashing Out]]&lt;br /&gt;
* [[OAT-007 Credential Cracking]]&lt;br /&gt;
* [[OAT-008 Credential Stuffing]]&lt;br /&gt;
* [[OAT-021 Denial of Inventory]]&lt;br /&gt;
* [[OAT-015  Denial of Service]]&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-006 Expediting]]&lt;br /&gt;
* [[OAT-004 Fingerprinting]]&lt;br /&gt;
* [[OAT-018 Footprinting]]&lt;br /&gt;
* [[OAT-005 Scalping]]&lt;br /&gt;
* [[OAT-011 Scraping]]&lt;br /&gt;
* [[OAT-016 Skewing]]&lt;br /&gt;
* [[OAT-013 Sniping]]&lt;br /&gt;
* [[OAT-017 Spamming]]&lt;br /&gt;
* [[OAT-002 Token Cracking]]&lt;br /&gt;
* [[OAT-014 Vulnerability Scanning]]&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
Not sure which is which? Use the [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] in conjunction with the full [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
All the materials are free to use. They are licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What Is This? ==&lt;br /&gt;
&lt;br /&gt;
Information and resources to help web application owners defend against [[:Category:Automated Threat|automated threats]]&lt;br /&gt;
&lt;br /&gt;
== What Isn't It? ==&lt;br /&gt;
&lt;br /&gt;
* Another vulnerability list&lt;br /&gt;
* An OWASP Top N List&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Attack trees&lt;br /&gt;
* Non web&lt;br /&gt;
* Non application&lt;br /&gt;
&lt;br /&gt;
==Project Objective==&lt;br /&gt;
&lt;br /&gt;
This project brings together research and analysis of real world automated attacks against web applications, to produce documentation to assist operators defend against these threats. Sector-specific guidance will be available.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Automatedthreats-presentation-small.jpg|link=media:Bots-AppSecUSA2017-Project-Summit.pptx]]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP WASC Web Hacking Incidents Database Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
* [[OWASP AppSensor Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP ModSecurity Core Rule Set Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Download the free handbook as a PDF]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [16 Feb 2018] OAT wiki pages created&lt;br /&gt;
* [15 Feb 2018] v1.2 Handbook published&lt;br /&gt;
* [25 Sep 2017] Promoted to Labs status&lt;br /&gt;
* [19-20 Sep 2017] Working session at the AppSecUSA 2017 Project Summit&lt;br /&gt;
* [15 May 2017] Draft feedback on Top Ten A7 shared&lt;br /&gt;
* [17 Apr 2017] [https://www.owasp.org/index.php/File:BadBots_OWASP_AppSec_CA_2017.pptx Slides] from AppSec California (2017)&lt;br /&gt;
* [20 Dec 2016] Threat identification chart [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf published]&lt;br /&gt;
* [03 Nov 2016] Presentation at [http://lascon.org/ LASCON 2016]&lt;br /&gt;
* [03 Nov 2016] v1.1 Handbook published&lt;br /&gt;
* [11-12 Oct 2016] Working session at the [https://docs.google.com/presentation/d/1iMQHTc-h5qcP7gBBRcPHGmVaTWqx3dpMwNMVlA--rqs/edit#slide=id.p3 AppSecUSA 2017 Project Summit]&lt;br /&gt;
* [04 Aug 2016] Project Q&amp;amp;A at Blackhat USA 2-5pm in the OWASP booth&lt;br /&gt;
* [26 Oct 2015] [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf v1.01 handbook] published&lt;br /&gt;
* [24 Sep 2015] [https://www.owasp.org/index.php/File:Colinwatson-a-new-ontology-of-unwanted-automation.pptx Presentation] at [https://2015.appsecusa.org/c/?page_id=896#a AppSec USA 2015]&lt;br /&gt;
&lt;br /&gt;
==In Print==&lt;br /&gt;
&lt;br /&gt;
[[File:AutomatedThreatHandbook_small.jpg|link=http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22932107.html]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-23540699.html Automated Threat Handbook] can be purchased at cost as a print on demand book.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
    &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Scope and Definitions =&lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The aim was to create a listing of vendor-neutral and technology agnostic terms that describe real-world automated threats to web applications, at a level of abstraction that application owners can relate to. These terms are threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
The focus is on abuse of functionality - misuse of inherent functionality and related design flaws, some of which are also referred to as business logic flaws. There is almost no focus on implementation bugs. It is not that the latter are not the target for attacks, but there is much more knowledge published in that area with a greater agreement on terminology. All the scenarios identified must require the web to exist for the threat to be materialised. Many of the scenarios have impacts upon the organisation that owns or operates web applications, but some scenarios have impacts more focused on individuals or other bodies. An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
==Definitions ==&lt;br /&gt;
&lt;br /&gt;
=== Automated Threats to Web Applications ===&lt;br /&gt;
&lt;br /&gt;
Threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
== Glossary ==&lt;br /&gt;
&lt;br /&gt;
;Action&lt;br /&gt;
: An act taken against an asset by a threat agent. Requires first that contact occurs between the asset and threat agent (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Application&lt;br /&gt;
: Software that performs a business process i.e. not system software&lt;br /&gt;
: A software program hosted by an information system (Ref 2)&lt;br /&gt;
&lt;br /&gt;
; Application layer&lt;br /&gt;
: &amp;quot;Layer 7” in the OSI model (Ref 3) and “application layer” in the TCP/IP model (Ref 4)&lt;br /&gt;
&lt;br /&gt;
;Threat&lt;br /&gt;
: Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events, etc.); malicious actors; errors; failures (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Agent&lt;br /&gt;
: Any agent (e.g., object, substance, human, etc.) that is capable of acting against an asset in a manner that can result in harm (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Event&lt;br /&gt;
: Occurs when a threat agent acts against an asset (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Web&lt;br /&gt;
: The World Wide Web (WWW, or simply Web) is an information space in which the items of interest, referred to as resources, are identified by global identifiers called Uniform Resource Identifiers (URI) (Ref 5)&lt;br /&gt;
: The first three specifications for Web technologies defined URLs, HTTP, and HTML (Ref 6)&lt;br /&gt;
&lt;br /&gt;
; Web application&lt;br /&gt;
: An application delivered over the web&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Glossary references:&lt;br /&gt;
# [http://pubs.opengroup.org/onlinepubs/9699919899/toc.pdf Risk Taxonomy, Technical Standard, The Open Group, 2009]&lt;br /&gt;
# [http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf NISTIR 7298 rev 2, NIST]&lt;br /&gt;
# [http://en.wikipedia.org/wiki/OSI_model OSI model, Wikipedia] &lt;br /&gt;
# [http://en.wikipedia.org/wiki/Internet_protocol_suite TCP/IP model, Wikipedia]&lt;br /&gt;
# [http://www.w3.org/TR/webarch/ Architecture of the World Wide Web, Volume One, W3C]&lt;br /&gt;
# [http://www.w3.org/Help/ Help and FAQ, W3C]&lt;br /&gt;
&lt;br /&gt;
=Use Case Scanarios=&lt;br /&gt;
&lt;br /&gt;
The following scenarios and organisation names are completely fictitious.&lt;br /&gt;
&lt;br /&gt;
==Defining application development security requirements==&lt;br /&gt;
&lt;br /&gt;
Cinnaminta SpA intends to build and launch a new multi-lingual and multi-currency ecommerce website. The development will be outsourced and Cinnaminta has been working on the functional design document. Among many other requirements, the application security specification requires that the website must not include any vulnerabilities identified in PCI DSS v3.1 Requirement 6.5, nor any other vulnerabilities that could affect the protection of payment cardholder data. Cinnaminta specifies that the website's payment functions must not be susceptible to the threat events '''OAT-001 Carding''' or '''OAT-010 Card Cracking''' as defined in the '''OWASP Automated Threat Handbook'''. In addition, the application must interact with the company's existing fraud detection system to counter '''OAT-012 Cashing Out'''. The requirements are specified in terms of these threat events, rather than particular product or service categories. Development houses responding to the call for bids use the ontology to focus their answers to these aspects appropriately.&lt;br /&gt;
&lt;br /&gt;
== Sharing intelligence within a sector==&lt;br /&gt;
&lt;br /&gt;
Unlimited Innovations Inc develops and supports patient-facing software solutions to a range of healthcare providers, many of which participate in the National Health Service Cyber Intelligence Sharing Center (NHS-CISC). Unlimited Innovations already builds continuous monitoring capabilities into its software and decides to provide an optional enhancement so that customers could choose to share their misuse event data with each other, to benefit from the combined threat intelligence. Rather than sharing large quantities of low-level data, Unlimited Innovations aggregates information and broadcasts validated and categorised threat data amongst the participating organisations. Automation attacks are classified according to the threat events defined in the '''OWASP Automated Threat Handbook''' so that each receiving party understands the nature of the threat. Even organisations that do not want to take part in this information sharing can benefit, since their own categorised information is made available to internal business management in the form of an easy-to-comprehend monitoring dashboard. The information gathered can also be fed into their other business information management systems to help improve patient service.&lt;br /&gt;
&lt;br /&gt;
== Exchanging threat data between CERTs==&lt;br /&gt;
&lt;br /&gt;
National Computer Emergency Response Teams (CERTs) recognise that sharing of local information can contribute to worldwide prevention of cyber attacks. Despite advances in cooperation between CERTs, anything to increase continuity and interoperability, such as standards for data exchange, is encouraged. CERT Zog is concerned about the sparsity of application-specific data it receives, and also the classification of that data. It has a particular concern about attacks and breaches that affect sectors defined in Zog's 2015 national cyber security strategy. CERT Zog and its neighbour CERT Tarset agree to tag threat events using the '''OWASP Automated Threat Handbook''' in order to add greater context to existing solutions being used for threat data exchange between them. The programme also collects sector metadata, so that all organisations within these can benefit from the centralised intelligence.&lt;br /&gt;
&lt;br /&gt;
== Enhancing application penetration test findings==&lt;br /&gt;
&lt;br /&gt;
Specialist application security penetration testing firm Cherak Industries Pte Ltd works primarily for financial services companies in the banking and insurance sectors, and is looking to expand its business throughout Asia. Cherak has some innovative pen test result reporting systems which integrate with client software fault and vulnerability tracking systems, and it actively looks for methods to provide additional value to its clients. Cherak has identified that pen test clients would benefit from help to in understanding the effects of combinations of vulnerabilities, especially design flaws, and has decided to utilise the '''OWASP Automated Threat Handbook''' to define and explain the automation-related threats. The individual vulnerabilities were scored as normal using CVSSv2 and v3, the matching CWEs identified, and mitigations in place documented. In addition, Cherak uses the threat events defined in the '''OWASP Automated Threat Handbook''' to help create a new section in the executive summary that explains how combinations of the issues found could lead to automation threats and the possible technical and business impacts. For example, an assessment for one client had identified weaknesses in authentication so that there is a risk of '''OAT-008 Credential Stuffing'''. The defined identifier was provided to the client, so its technical staff could refer to additional information on the OWASP website.&lt;br /&gt;
&lt;br /&gt;
== Specifying service acquisition needs==&lt;br /&gt;
&lt;br /&gt;
Falstone Paradise Inc is concerned about malicious use of their portfolio of hotel and resort websites. The majority of the websites use a shared application platform, but there are some unique applications and a large number of other micro-sites, some of which use generic content management systems such as Wordpress and Drupal. Falstone Paradise has identified that its IT operations team are spending too much time dealing with the effects of automated misuse, such as cleaning up data, resetting customer accounts and providing extra capacity during attacks. Furthermore, the unwanted automation is also causing some instabilities leading to negative feedback from customers. Therefore Falstone Paradise decides to go out to the security marketplace to identify, assess and select products or services that might help address these automation issues for all its websites. Their buying team works with their information technology colleagues to write the detailed requirements in an Invitation to Tender (ITT) document. This describes the types of attacks its web applications are receiving, their frequency of occurrence and their magnitudes. These are defined according to the '''OWASP Automated Threat Handbook''', so that vendors do not misunderstand the requirements, and each vendor's offering can be assessed against the particular automation threat events of concern.&lt;br /&gt;
&lt;br /&gt;
== Characterising vendor services ==&lt;br /&gt;
&lt;br /&gt;
Better Best Ltd has developed an innovative technology to help gaming companies defend against a range of automated threats that can otherwise permit cheating and distortion of the game, leading to disruption for normal players. The solution can be deployed on premises, but is also available in the cloud as a service. But Better Best is finding difficulty explaining its solution in the market place, especially since it does not fit into any conventional product category. Better Best decide to use the terminology and threat events listed in the '''OWASP Automated Threat Handbook''' to define their product's capabilities. They hope this will provide some clarity about their offering, and also demonstrate how their product can be used to replace more than one other conventional security device. Additionally, Better Best writes a white paper describing how their product has been successfully used by one of their reference customers Hollybush Challenge Games to protect against '''OAT-006 Expediting''', '''OAT-005 Scalping''', '''OAT-016 Skewing''' and '''OAT-013 Sniping'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Ontology=&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The A-Z list of [[:Category:Automated Threat|automated threat events]] and summary descriptions, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-020 Account Aggregation]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Use by an intermediary application that collects together multiple accounts and interacts on their behalf.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-019 Account Creation]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Create multiple accounts for subsequent misuse.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-003 Ad Fraud]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
False clicks and fraudulent display of web-placed advertisements.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-009 CAPTCHA Defeat]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Solve anti-automation tests.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-010 Card Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify missing start/expiry dates and security codes for stolen payment card data by trying different values.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-001 Carding]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Multiple payment authorisation attempts used to verify the validity of bulk stolen payment card data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-012 Cashing Out]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Buy goods or obtain cash utilising validated stolen payment card or other user account data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-007 Credential Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify valid login credentials by trying different values for usernames and/or passwords.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-008 Credential Stuffing]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass log in attempts used to verify the validity of stolen username/password pairs.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-021 Denial of Inventory]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Deplete goods or services stock without ever completing the purchase or committing to the transaction.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-015  Denial of Service]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Target resources of the application and database servers, or individual user accounts, to achieve denial of service (DoS).&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-006 Expediting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Perform actions to hasten progress of usually slow, tedious or time-consuming actions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-004 Fingerprinting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Elicit information about the supporting software and framework types and versions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-018 Footprinting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Probe and explore application to identify its constituents and properties.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-005 Scalping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Obtain limited-availability and/or preferred goods/services by unfair methods.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-011 Scraping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Collect application content and/or other data for use elsewhere.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-016 Skewing]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Repeated link clicks, page requests or form submissions intended to alter some metric.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-013 Sniping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Last minute bid or offer for goods or services.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-017 Spamming]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Malicious or questionable information addition that appears in public or private content, databases or user messages.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-002 Token Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass enumeration of coupon numbers, voucher codes, discount tokens, etc.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-014 Vulnerability Scanning]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Crawl and fuzz application to identify weaknesses and possible vulnerabilities.&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Comparison with other dictionaries, taxonomies and lists==&lt;br /&gt;
&lt;br /&gt;
===[https://capec.mitre.org/ Common Attack Pattern Enumeration and Classification] (CAPEC)===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-capec-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
CAPEC is a dictionary and classification taxonomy of known attacks on software. Its primary classification structures are:&lt;br /&gt;
&lt;br /&gt;
* [https://capec.mitre.org/data/definitions/3000.html Domains of attack] (3000) - Social Engineering (403), [https://capec.mitre.org/data/definitions/437.html Supply Chain] (437), Communications (512), [https://capec.mitre.org/data/definitions/513.html Software] (513), Physical Security (514), Hardware (515)&lt;br /&gt;
* Mechanism of Attack (1000) - Gather Information (118), Deplete Resources (119), Injection (152), Deceptive Interactions (156), Manipulate Timing and State (172), Abuse of Functionality (210), Probabilistic Techniques (223), Exploitation of Authentication (225), Exploitation of Authorization (232), Manipulate Data Structures (255), Manipulate Resources (262), Analyze Target (281), Gain Physical Access (436), Malicious Code Execution (525), Alter System Components (526), Manipulate System Users (527)&lt;br /&gt;
&lt;br /&gt;
===[http://projects.webappsec.org/w/page/13246978/Threat%20Classification WASC Threat Classification]===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-wasc-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
The WASC Threat Classification classifies weaknesses and attacks that can lead to the compromise of a website, its data, or its users.&lt;br /&gt;
&lt;br /&gt;
===[[OWASP WASC Web Hacking Incidents Database Project]] (WHID)===&lt;br /&gt;
&lt;br /&gt;
WHID [https://www.google.com/fusiontables/DataSource?snapid=S1536501YnLo classifies] publicly known incidents using:&lt;br /&gt;
&lt;br /&gt;
* attack methods e.g. ARP spoofing, abuse of functionality, account compromise, administration error, automation, backdoor, banking trojan, brute force, clickjacking, code injection, content injection, content spoofing, credential/session prediction, cross site request forgery (CSRF), cross-site scripting (XSS), denial of service, directory traversal, domain hijacking, DNS hijacking, forceful browsing, HTTP response splitting, hidden parameter manipulation, hosting malicious code, information leakage, insufficient authentication, known vulnerability, local file inclusion (LFI), malvertising, malware, malware injection, mass assignment, misconfiguration, OS commanding, parameter manipulation, path traversal, phishing, predictable resource location, process automation, redirection, remote file inclusion (RFI), rogue 3rd party app, scaping, search engine poisoning, shell injection, social engineering, stolen credentials, SQL injection, unintentional information disclosure, weak password recovery validation, worm&lt;br /&gt;
* weakness e.g. abuse of functionality, application misconfiguration, directory indexing, improper filesystem permissions, improper input handling, improper output handling, information leakage, insecure indexing, insufficient anti-automation, insufficient authentication, insufficient authorization, insufficient entropy, insufficient password recovery, insufficient process validation, insufficient session expiration, insufficient transport layer protection, misconfiguration, predictable resource location, weak password&lt;br /&gt;
* outcome account hijacking, account takeover, botnet participation, chaos, credit card leakage, data loss, defacement, DDoS attacks, DNS hijacking, DNS redirection, disinformation, disclosure only, downtime, extortion, fraud, information warfare, leakage of information, link spam, loss of sales, malware distribution,  monetary loss, phishing, planting of malware, service disruption, session hijacking, spam, spam links, stolen credentials, worm&lt;br /&gt;
&lt;br /&gt;
Plus other/various/unknown.&lt;br /&gt;
&lt;br /&gt;
= Bibliography =&lt;br /&gt;
&lt;br /&gt;
The following academic, open source, commercial and news sources were used in the research on automated threats to web applications. OWASP is a worldwide not-for-profit charitable organization focused on improving the security of software.  We operate under a vendor neutral policy and we do not endorse products or services.&lt;br /&gt;
&lt;br /&gt;
* 10 years of Application Security, Denyall http://www.denyall.com/resources/whitepapers/?aliId=3438442&lt;br /&gt;
*	2012 Payment Card Threat Report	 https://www.securitymetrics.com/static/resources/orange/2012%20Payment%20Card%20Threat%20Report%20copy.pdf				&lt;br /&gt;
*	2014 Bot Traffic Report: Just the Droids You were Looking for	 http://www.incapsula.com/blog/bot-traffic-report-2014.html				&lt;br /&gt;
*	3 Types of ‘Return Fraud’ to Monitor this Holiday Season	 http://www.practicalecommerce.com/articles/3168-3-Types-of-%E2%80%98Return-Fraud-to-Monitor-this-Holiday-Season	&lt;br /&gt;
* 7 Ways Bots Hurt Your Website, Distil Networks http://www.distilnetworks.com/7-ways-bots-hurt-website-whitepaper/						&lt;br /&gt;
*	Abusing HTML 5 Structured Client-side Storage	2008	 http://packetstorm.wowhacker.com/papers/general/html5whitepaper.pdf		&lt;br /&gt;
* Acquiring Experience with Ontology and Vocabularies, Walt Melo, Risa Mayan and Jean Stanford, 2011  http://www.omg.org/news/meetings/workshops/SOA-HC/presentations-2011/13_SC-6_Melo_Stanford_Mayan.pdf	&lt;br /&gt;
*	An Anatomy of a SQL Injection Attack	 Hacker Intelligence Initiative	 Imperva	 	 http://www.imperva.com/docs/HII_An_Anatomy_of_a_SQL_Injection_Attack_SQLi.pdf	&lt;br /&gt;
*	The Anatomy of Clickbot.A	 https://www.usenix.org/legacy/event/hotbots07/tech/full_papers/daswani/daswani.pdf				&lt;br /&gt;
*	Anatomy of comment spam	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Anatomy_of_Comment_Spam.pdf		&lt;br /&gt;
*	Anti-Automation Monitoring and Prevention	2015	 https://www.clerkendweller.uk/2015/1/29/AntiAutomation-Monitoring-and-Prevention			&lt;br /&gt;
*	Anti-DDoS Solution for Internet Corporation	 http://www.nsfocus.com/uploadfile/Solution/NSFOCUS%20Anti-DDoS%20Solution%20for%20Internet%20Corporation.pdf				&lt;br /&gt;
*	Anti-Fraud Principles and Proposed Taxonomy	 Sep 2014	 http://www.iab.net/media/file/IAB_Anti_Fraud_Principles_and_Taxonomy.pdf			&lt;br /&gt;
*	Apache Security	 Ivan Ristic	 			&lt;br /&gt;
* Application Security Desk Reference, OWASP https://www.owasp.org/index.php/Category:OWASP_ASDR_Project&lt;br /&gt;
* Application Security Guide For CISOs, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf&lt;br /&gt;
* AppSensor, OWASP https://www.owasp.org/index.php/OWASP_AppSensor_Project&lt;br /&gt;
*	Attack &amp;amp; Defense Labs	 http://www.andlabs.org/html5.html				&lt;br /&gt;
*	Attack categories	 OWASP	 https://www.owasp.org/index.php/Category:Attack	&lt;br /&gt;
* Attack Trees, Schneier, Dr. Dobb's Journal, December 1999 https://www.schneier.com/paper-attacktrees-ddj-ft.html		&lt;br /&gt;
*	Attacking with HTML5	2010	 https://media.blackhat.com/bh-ad-10/Kuppan/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-wp.pdf			&lt;br /&gt;
*	Automated attacks	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Automation_of_Attacks.pdf		&lt;br /&gt;
*	Avoiding the Top 10 Software Security Design Flaws	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf				&lt;br /&gt;
*	Bad Bots On The Rise	 Dec 2014	 http://www.darkreading.com/informationweek-home/bad-bots-on-the-rise/d/d-id/1318276	&lt;br /&gt;
* Banking Botnets Persist Despite Takedowns, Dell SecureWorks, 2015 http://www.secureworks.com/cyber-threat-intelligence/threats/banking-botnets-persist-despite-takedowns/	&lt;br /&gt;
*	The Barracuda Web Application Firewall: XML Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_XML_Firewall.pdf	&lt;br /&gt;
*	Blocking Brute Force Attacks	 http://www.cs.virginia.edu/~csadmin/gen_support/brute_force.php				&lt;br /&gt;
*	Bot Traffic Growing Problem for Digital	 Oct 2014	 http://www.netnewscheck.com/article/36537/bot-traffic-growing-problem-for-digital			&lt;br /&gt;
*	BotoPedia	 Incapsula	 http://www.botopedia.org/			&lt;br /&gt;
*	Boy in the Browser	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/Boy_in_the_Browser	&lt;br /&gt;
* Business Logic Attacks - Bots and BATs, Eldad Chai, 2009 http://www.owasp.org/images/9/96/AppSecEU09_BusinessLogicAttacks_EldadChai.ppt		&lt;br /&gt;
*	Bypassing Client Application Protection Techniques	 http://www.securiteam.com/securityreviews/6S0030ABPE.html&lt;br /&gt;
*	A CAPTCHA in the Rye	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_a_CAPTCHA_in_the_Rye.pdf					&lt;br /&gt;
*	Characterizing Large Scale Click fraud	 http://cseweb.ucsd.edu/~voelker/pubs/za-ccs14.pdf	&lt;br /&gt;
* Charter Addition Proposal: &amp;quot;Trusted Code&amp;quot; for the Web https://lists.w3.org/Archives/Public/public-webappsec/2015Mar/0150.html&lt;br /&gt;
*	A cheesy Apache / IIS DoS vuln (+a question) 	 http://www.securityfocus.com/archive/1/456339/30/0/threaded	&lt;br /&gt;
* China's Man-on-the-Side Attack on GitHub http://www.netresec.com/?page=Blog&amp;amp;month=2015-03&amp;amp;post=China%27s-Man-on-the-Side-Attack-on-GitHub&lt;br /&gt;
* The CISO Survey and Report, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-report-2013-1.0.pdf&lt;br /&gt;
* Common Attack Pattern Enumeration and Classification (CAPEC), Mitre https://capec.mitre.org/			&lt;br /&gt;
*	Common Cyber Attacks: Reducing the Impact	 CERT-UK	 https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/400106/Common_Cyber_Attacks-Reducing_The_Impact.pdf			&lt;br /&gt;
*	Corporate espionage – the internet’s new growth industry	 http://www.itproportal.com/2015/03/19/corporate-espionage-internets-new-growth-industry/				&lt;br /&gt;
*	CSA Top Threats to Cloud Computing	 https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf				&lt;br /&gt;
*	CSRF vulnerability in GMail service	 http://seclists.org/fulldisclosure/2009/Mar/29		&lt;br /&gt;
* CWE/SANS Top 25 Most Dangerous Software Errors, 2011 http://cwe.mitre.org/top25/		&lt;br /&gt;
*	Cyber Fraud - Tactics	 Techniques and Procedures	 http://www.crcpress.com/product/isbn/9781420091274			&lt;br /&gt;
* Cybercrime Report: Q1 2015, ThreatMetrix, 2015 http://info.threatmetrix.com/WP-2015Q1CybercrimeReport_WP-LP.html&lt;br /&gt;
*	Data Breach Investigations Report (DBIR), 2014	 http://www.verizonenterprise.com/DBIR/2014/				&lt;br /&gt;
* Data Breach Investigations Report (DBIR), 2015 http://www.verizonenterprise.com/DBIR/2015/&lt;br /&gt;
*	Data Breaches Fuel Login Attacks	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2014-state-of-the-internet-threat-advisory-public-data-breaches-fuel-login-attacks.pdf		&lt;br /&gt;
*	Data Scraping	 Wikipedia	 http://en.wikipedia.org/wiki/Data_scraping			&lt;br /&gt;
*	DDoS Quick Guide	 https://www.us-cert.gov/sites/default/files/publications/DDoS%20Quick%20Guide.pdf	&lt;br /&gt;
* DDoS Threat Landscape Report, 2013-2014 http://lp.incapsula.com/rs/incapsulainc/images/2013-14_ddos_threat_landscape.pdf	&lt;br /&gt;
* Defending Against an Internet-based Attack on the Physical World http://avirubin.com/scripted.attacks.pdf		&lt;br /&gt;
*	Defending Against Application-Based DDoS Attacks with the Barracuda Web Application Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_Defending%20_Against_%20Application-Based_%20DDoS_%20Attacks.pdf				&lt;br /&gt;
*	Demystifying HTML 5 Attacks	 http://resources.infosecinstitute.com/demystifying-html-5-attacks/				&lt;br /&gt;
*	Denial of Service Attacks: A Comprehensive Guide to Trends	 Techniques	 and Technologies	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Denial_of_Service_Attacks-Trends_Techniques_and_Technologies.pdf&lt;br /&gt;
*	Detecting and Blocking Site Scraping Attacks	 Imperva	 http://www.imperva.com/docs/WP_Detecting_and_Blocking_Site_Scraping_Attacks.pdf			&lt;br /&gt;
*	Detecting Automation of Twitter Accounts: Are you a human	 cyborg	 or a bot?	 http://www.cs.wm.edu/~hnw/paper/tdsc12b.pdf		&lt;br /&gt;
*	Detecting Malice	 Robert &amp;quot;RSnake&amp;quot; Hansen	2009	 http://www.detectmalice.com/		&lt;br /&gt;
*	Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) 	 http://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1414072277428&amp;amp;uri=CELEX:32002L0058				&lt;br /&gt;
*	Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data 	 http://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:31995L0046				&lt;br /&gt;
*	Distributed Denial-of-Service (DDoS) Cyber-Attacks	 Risk Mitigation	 and Additional Resources	 Federal Financial Institutions Examination Council	 http://www.ffiec.gov/press/PDF/FFIEC%20DDoS%20Joint%20Statement.pdf	&lt;br /&gt;
*	Do Evil - The Business of Social Media Bots	 Forbes	 http://www.forbes.com/sites/lutzfinger/2015/02/17/do-evil-the-business-of-social-media-bots/			&lt;br /&gt;
*	DoS and DDoS Glossary of Terms	 prolexic	 http://www.prolexic.com/knowledge-center-dos-and-ddos-glossary.html#layer-7-ddos-attack			&lt;br /&gt;
*	E-commerce Malware	 Trustwave	 https://gsr.trustwave.com/topics/placeholder-topic/e-commerce-malware/	&lt;br /&gt;
* Exploiting Software, G. Hoglund and G. McGraw, Addison-Wesley, 2004&lt;br /&gt;
* Five Trends to Track in E-Commerce Fraud, ThreatMetrix, 2013 http://info.threatmetrix.com/rs/threatmetrix/images/Five_Trends_eCommerce_Fraud_WP.pdf&lt;br /&gt;
* Hacker builds cheatbot for hit app Trivia Crack http://www.theregister.co.uk/2015/03/26/hacker_builds_trivia_crack_cheat_app/	&lt;br /&gt;
* Has Walmart opened itself up to “Denial of inventory” attacks?  https://arstechnica.com/business/2012/05/has-walmart-opened-itself-up-to-denial-of-inventory-attacks/	&lt;br /&gt;
* How Hoarder Bots Steal sales from Online Retailers https://www.internetretailer.com/mobile/2016/12/16/how-hoarder-bots-steal-sales-online-retailers&lt;br /&gt;
*	How to Defend Against DDoS Attacks - Strategies for the Network	 Transport	 and Application Layers	 Prolexic	 http://www.prolexic.com/kcresources/white-paper/strategies-for-the-network-transport-and-application-layers-412/Strategies_for_the_Network_Transport_and_Application_Layers_Prolexic_White_Paper_A4_082412.pdf	&lt;br /&gt;
* How to Defend Online Travel Websites in the Era of Site Scraping, Distil Networks http://www.distilnetworks.com/defend-online-travel-websites-era-site-scraping-download/&lt;br /&gt;
*	How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores	 http://research.microsoft.com/pubs/145858/caas-oakland-final.pdf				&lt;br /&gt;
*	HTML5 Overview	 A look at HTML5 Attack Scenarios	 Trend Micro	2011	 http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt_html5-attack-scenarios.pdf	&lt;br /&gt;
*	HTML5 Top 10 Threats Stealth Attacks and Silent Exploits	2012	 https://media.blackhat.com/bh-eu-12/shah/bh-eu-12-Shah_HTML5_Top_10-WP.pdf			&lt;br /&gt;
*	HTML5 web security	2011	 http://media.hacking-lab.com/hlnews/HTML5_Web_Security_v1.0.pdf			&lt;br /&gt;
*	HTTPPOST - Slow POST	 Wong Onn Chee	 OWASP AppSec DC 2010	 https://www.owasp.org/images/4/43/Layer_7_DDOS.pdf	&lt;br /&gt;
* If you've got @British_Airways account may make sense to change your password. Just had all my Avios cleared out! https://twitter.com/suttonnick/status/581556027948195840/photo/1	&lt;br /&gt;
* Internet Security Threat Report, Volume 19, 2014 http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf&lt;br /&gt;
*	An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks	 http://www.springer.com/gb/book/9788132202769	&lt;br /&gt;
*	Is Your Data Center Ready for Today’s DDoS Threats? DDoS attack types	 protection methods and testing your detection and mitigation defenses	 http://www.fortinet.com/sites/default/files/whitepapers/WP-DDoS-Testing.pdf			&lt;br /&gt;
*	Joomla Reflection DDoS-for-Hire	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2015-state-of-the-internet-threat-advisory-joomla-reflection-attack-ddos-for-hire.pdf		&lt;br /&gt;
*	Layer 7 DDOS – Blocking HTTP Flood Attacks	 http://blog.sucuri.net/2014/02/layer-7-ddos-blocking-http-flood-attacks.html				&lt;br /&gt;
*	Lenovo	 Superfish put smut on my system' – class-action lawsuit	 The Register	 http://www.theregister.co.uk/2015/02/23/lenovo_superfish_class_action_lawsuit/		&lt;br /&gt;
* List of Attack Vectors   Relative Vulnerability Rating TECAPI http://www.tecapi.com/public/relative-vulnerability-rating-gui.jsp#&lt;br /&gt;
*	Man in the Browser	 http://scisweb.ulster.ac.uk/~kevin/IJACI-Vol4No1-maninbrowser.pdf				&lt;br /&gt;
*	Man in the Browser Attack	 https://www.owasp.org/index.php/Man-in-the-browser_attack&lt;br /&gt;
* Mapping and Measuring Cybercrime, Oxford Internet Institute http://www.oii.ox.ac.uk/publications/FD18.pdf				&lt;br /&gt;
*	Massive Changes in the Criminal Landscape	 Europol	2015	 https://www.europol.europa.eu/content/massive-changes-criminal-landscape	&lt;br /&gt;
* Matching Attack Patterns to Security Vulnerabilities in Software-Intensive System Designs http://collaboration.csc.ncsu.edu/laurie/Papers/ICSE_Final_MCG_LW.pdf	&lt;br /&gt;
*	Mitigating DDoS Attacks with F5 Technology	 F5	 https://f5.com/resources/white-papers/mitigating-ddos-attacks-with-f5-technology			&lt;br /&gt;
* Mitigating the DoS/DDosS Threat, Radware, 2012 http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452061&lt;br /&gt;
* Modern Web Attacks, Sophos, 2007 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/modern-web-attacks.aspx&lt;br /&gt;
*	ModSecurity Advanced Topic of the Week: Mitigating Slow HTTP DoS Attacks	 https://www.trustwave.com/Resources/SpiderLabs-Blog/(Updated)-ModSecurity-Advanced-Topic-of-the-Week--Mitigating-Slow-HTTP-DoS-Attacks/	&lt;br /&gt;
* Most common attacks on web applications https://ipsec.pl/web-application-security/most-common-attacks-web-applications.html			&lt;br /&gt;
* Multi-dimensional Vulnerability Hierarchies Daniel Miessler  https://danielmiessler.com/study/multi-dimensional-vulnerability-hierarchies/&lt;br /&gt;
*	New Wave of DDoS Attacks Launched	 BankInfoSecurity.com	 Mar 2013	 http://www.bankinfosecurity.com/new-wave-ddos-attacks-launched-a-5584/op-1		&lt;br /&gt;
*	NOMAD: Toward Non-Invasive Moving Target Defense Against Web Bots	 http://faculty.cs.tamu.edu/guofei/paper/NOMAD_CNS13.pdf				&lt;br /&gt;
*	Online Ad Fraud Exposed: Advertisers Losing $6.3 Billion To $10 Billion Per Year	 Sep 2014	 http://www.darkreading.com/analytics/threat-intelligence/online-ad-fraud-exposed-advertisers-losing-$63-billion-to-$10-billion-per-year/d/d-id/1317979			&lt;br /&gt;
* Online Data Companies versus Bots: The Fight is on for Control of Online Data, Distil Networks http://www.distilnetworks.com/online-data-companies-vs-bots-download/&lt;br /&gt;
*	Optimal Airline Ticket Purchasing Using Automated User-Guided Feature Selection	 http://ijcai.org/papers13/Papers/IJCAI13-032.pdf				&lt;br /&gt;
*	Payment Checkout Flaws and Bugs	2014	 https://www.clerkendweller.uk/2014/11/4/Payment-Checkout-Flaws-and-Bugs			&lt;br /&gt;
*	PCI Compliance Report 2015	 Verizon	 http://www.verizonenterprise.com/pcireport/2015/			&lt;br /&gt;
*	Pixel Perfect Timing Attacks with HTML5	2013	 http://www.contextis.com/services/research/white-papers/pixel-perfect-timing-attacks-html5/			&lt;br /&gt;
*	Polymorphism as a Defense for Automated Attack of Websites	 http://link.springer.com/chapter/10.1007%2F978-3-319-07536-5_30				&lt;br /&gt;
*	Preventing Web Scraping: Best Practice 	 https://creativedigitalideas.files.wordpress.com/2014/11/best-practice-to-prevent-web-scraping.pdf				&lt;br /&gt;
*	Profile: Automated Credit Card Fraud	 http://old.honeynet.org/papers/profiles/cc-fraud.pdf				&lt;br /&gt;
* Protecting Against Web Floods, Radware http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452968&lt;br /&gt;
*	Q4 2014 State of the Internet Security Report	 prolexic	 http://www.stateoftheinternet.com/downloads/pdfs/2014-internet-security-report-q4.pdf			&lt;br /&gt;
*	Reflection injection	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf		&lt;br /&gt;
* A Report on taxonomy and evaluation of existing inventories, ENISAhttp://ecrime-project.eu/wp-content/uploads/2015/02/E-Crime-Deliverable-2-1-20141128_FINAL.pdf			&lt;br /&gt;
* Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft, Dept of Justice http://www.justice.gov/criminal/cybercrime/docs/ip-victim-guide-and-checklist-march-2013.pdf&lt;br /&gt;
*	SANS Top 20 Critical Controls	 https://www.sans.org/critical-security-controls/		&lt;br /&gt;
* Securing Websites, Sophos, 2011 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/securing-websites.aspx		&lt;br /&gt;
*	Security Insights: Defending Against Automated Threats	 http://www.securityweek.com/security-insights-defending-against-automated-threats				&lt;br /&gt;
*	Server side DDoS	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/DDOS_Attack_Method_Payload_05182010			&lt;br /&gt;
*	Slow Read Denial of Service attack	 https://code.google.com/p/slowhttptest/wiki/SlowReadTest				&lt;br /&gt;
*	Slow-Read DoS Attack	 https://www.trustwave.com/Resources/SpiderLabs-Blog/ModSecurity-Advanced-Topic-of-the-Week--Mitigation-of--Slow-Read--Denial-of-Service-Attack/				&lt;br /&gt;
*	Slowloris HTTP DoS	 http://ha.ckers.org/slowloris/	 	&lt;br /&gt;
* So what are the &amp;quot;most critical&amp;quot; application flaws? On new OWASP Top 10 https://ipsec.pl/application-security/2013/so-what-are-most-critical-application-flaws-new-owasp-top-10.html		&lt;br /&gt;
*	Social Media Bots Offer Phony Friends and Real Profit	 NY Times	 http://www.nytimes.com/2014/11/20/fashion/social-media-bots-offer-phony-friends-and-real-profit.html?_r=1			&lt;br /&gt;
* Software Vulnerability Analysis, Krsul, 1998 http://www.krsul.org/ivan/articles/main.pdf&lt;br /&gt;
*	Sophos Security Threat Report	 http://blogs.sophos.com/2014/12/11/our-top-10-predictions-for-security-threats-in-2015-and-beyond/&lt;br /&gt;
* SpoofedMe Social Login Attack Discovered by IBM X-Force Researchers http://securityintelligence.com/spoofedme-social-login-attack-discovered-by-ibm-x-force-researchers/#.VSuiEhPSngM				&lt;br /&gt;
* State of Software Security Report, Volume 5, Veracode, 2013 https://info.veracode.com/state-of-software-security-report-volume5.html&lt;br /&gt;
*	Stopping Automated Attack Tools	 http://www.technicalinfo.net/papers/StoppingAutomatedAttackTools.html&lt;br /&gt;
* Taxonomy on Online Game Security http://www.math.snu.ac.kr/~jhcheon/publications/2004/Taxonomy%20on%20online%20game%20security_EL.pdf	&lt;br /&gt;
* A Taxonomy of Computer Program Security Flaws, with Examples, Landwehr https://cwe.mitre.org/documents/sources/ATaxonomyofComputerProgramSecurityFlawswithExamples%5BLandwehr93%5D.pdf&lt;br /&gt;
* A Taxonomy of Security Faults in the UNIX Operating System, Aslam, 1995 https://cwe.mitre.org/documents/sources/ATaxonomyofSecurityFaultsintheUNIXOperatingSystem%5BAslam95%5D.pdf		&lt;br /&gt;
* Testing Guide, v4, OWASP, 2014 https://www.owasp.org/images/5/52/OWASP_Testing_Guide_v4.pdf								&lt;br /&gt;
*	The Bot Baseline: Fraud in Digital Advertising	 https://s3.amazonaws.com/whiteops-public/WO-ANA-Baseline-Study-of-Bot-Fraud.pdf							&lt;br /&gt;
*	The Internet Organised Crime Threat Assessment (iOCTA) 2014	 https://www.europol.europa.eu/content/internet-organised-crime-threat-assesment-iocta				&lt;br /&gt;
*	The Notorious Nine	 Cloud Computing Top Threats in 2013	 CSA	 https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf	&lt;br /&gt;
* The Risks of Content Management Systems, IBM, 2015 https://portal.sec.ibm.com/mss/html/en_US/support_resources/pdf/CMS_Threats_MSS_Threat_Report.pdf	&lt;br /&gt;
* The Spy in the Sandbox – Practical Cache Attacks in Javascript http://iss.oy.ne.ro/SpyInTheSandbox.pdf						&lt;br /&gt;
* Thousands of Hacked Uber Accounts Selling on Dark Web for $1 http://thehackernews.com/2015/03/thousands-of-hacked-uber-accounts_30.html?m=1&lt;br /&gt;
* Threat Intelligence Quarterly, IBM, 1Q 2015 https://www.ibm.com/services/forms/signup.do?source=swg-WW_Security_Organic&amp;amp;S_PKG=ov33510&amp;amp;S_TACT=C327017W&amp;amp;dynform=18101&lt;br /&gt;
* Threat Modeling: Designing for Security, Adam Shostack, Wiley, April 2014 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118809998.html&lt;br /&gt;
*	Threats and Mitigations: A Guide to Multi-Layered Web Security - eBook	 Prolexic	 	 http://www.prolexic.com/knowledge-center/prolexic-download/guide-multi-layered-web-security-ebook.pdf		&lt;br /&gt;
* Trapping Unknown Malware in a Context Web, Sophos http://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/HuqSzabo-VB2013.pdf?la=en.pdf&lt;br /&gt;
*	Trustwave Global Security Report	2014	 https://www2.trustwave.com/GSR2014.html?utm_source=redirect&amp;amp;utm_medium=web&amp;amp;utm_campaign=GSR2014			&lt;br /&gt;
*	TurboTax’s Anti-Fraud Efforts Under Scrutiny	 http://krebsonsecurity.com/2015/02/turbotaxs-anti-fraud-efforts-under-scrutiny/				&lt;br /&gt;
*	Two Security Vulnerabilities in the Spring Framework’s MVC pdf (from 2008)	 http://blog.diniscruz.com/2011/07/two-security-vulnerabilities-in-spring.html&lt;br /&gt;
*	The Underground Economy of Spam: A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns	 http://static.usenix.org/events/leet11/tech/full_papers/Stone-Gross.pdf					&lt;br /&gt;
*	Understanding Web Bots and How They Hurt Your Business	 Encapsula	 http://www.slideshare.net/Incapsula/understanding-web-bots-and-how-they-hurt-your-business		&lt;br /&gt;
* Use of A Taxonomy of Security Faults, Taimur Aslam, Ivan Krsul and Eugene H Spafford, 1996  http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=2304&amp;amp;context=cstech&lt;br /&gt;
*	The WASC Threat Classification v2.0	 http://projects.webappsec.org/w/page/13246978/Threat%20Classification	&lt;br /&gt;
* Warhol Worms: The Potential for Very Fast Internet Plagues http://www.iwar.org.uk/comsec/resources/worms/warhol-worm.htm	&lt;br /&gt;
*	Web Application Attack Report #5	 Imperva	 http://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed5.pdf	&lt;br /&gt;
* Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Ryan Barnett, Wiley, December 2012 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118362187.html		&lt;br /&gt;
*	Web Attacks in the Wild	 Corsaire	 https://www.owasp.org/images/a/a7/Web_attacks_in_the_wild_-_ap.pdf			&lt;br /&gt;
*	Web Automation	 Friend or Foe?	 https://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf			&lt;br /&gt;
*	Web Spambot Detection Based on Web Navigation Behaviour 	 http://pedramhayati.com/papers/Web_Spambot_Detection_Based_on_Web_Usage_Behaviour.pdf		&lt;br /&gt;
* Website Security Statistics Report, 2014 http://info.whitehatsec.com/rs/whitehatsecurity/images/statsreport2014-20140410.pdf		&lt;br /&gt;
*	What is Zeus?	 http://www.sophos.com/medialibrary/pdfs/technical%20papers/sophos%20what%20is%20zeus%20tp.pdf				&lt;br /&gt;
*	When Web 2.0 Attacks! Understanding Ajax	 Flash and other highly interactive web technologies…	 https://www.owasp.org/images/f/fc/When_Web_2.0_Attacks_-_Understanding_Security_Implications_of_Highly_Interactive_Technologies-Rafal_Los.pdf			&lt;br /&gt;
*	Where have all of our Passwords Gone?	 Gartner	2015	 http://blogs.gartner.com/avivah-litan/2015/01/22/where-have-all-our-passwords-gone/		&lt;br /&gt;
*	WS-Attacks.org	 http://www.ws-attacks.org/index.php/Main_Page&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; What do you mean by &amp;quot;web&amp;quot;, &amp;quot;application&amp;quot; and &amp;quot;automated threat&amp;quot;?&lt;br /&gt;
: See the definitions in the project's {{#switchtablink:Project Scope and Definitions|glossary}}.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;ontology&amp;quot;?&lt;br /&gt;
: An ontology is a set of types, properties, and relationship. These together define a subject description language. This particular ontology is meant to represent what automated threats real world owners observe affecting their web applications in usual operations.&lt;br /&gt;
&lt;br /&gt;
; Isn't this another bug (vulnerability) list?&lt;br /&gt;
: No, none of the named automated threat events are implementation bugs - they relate to abuse of functionality using automated means.&lt;br /&gt;
&lt;br /&gt;
; But is it an OWASP Top N List?&lt;br /&gt;
: Again no, it's an ontology which currently contains 21 items but there may be more identified in the future. Also it is not an ordered list (like OWASP Top N lists) - the OAT identification numbers were randomly assigned, so the list is often written in alphabetical order to emphasize this.&lt;br /&gt;
&lt;br /&gt;
; I thought &amp;quot;so and so&amp;quot; already did that?&lt;br /&gt;
: We found that it did not exist. While many threats are mentioned in the sources researched, there was no overall list or definitions. We found the automated threat events tended to all be in a small number of definied items from Mitre CAPEC and WASC Threat Classification. If you know of other automated threat lists/taxonomies/ontologies, please share them.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;oat&amp;quot;?&lt;br /&gt;
: It is our abbreviation for OWASP Automated Threat (OAT).&lt;br /&gt;
&lt;br /&gt;
; I am confused and don't know which OAT my problem is - how do I identify it?&lt;br /&gt;
: In 2017 we created a [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] to help identify the correct OAT, which can then be confirmed by reading the full description in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook]. The short summaries are important explanations of each OAT name.&lt;br /&gt;
&lt;br /&gt;
; How can I help?&lt;br /&gt;
: Please join our mailing list, send ideas, contribute clarifications, corrections and improvement, and let other people know about the project and its handbook.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements and Sponsors =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
* Sumit Agarwal&lt;br /&gt;
* Jason Chan&lt;br /&gt;
* Mark Hall&lt;br /&gt;
* Omri Iluz&lt;br /&gt;
* Andrew van der Stock&lt;br /&gt;
* Roland Weber&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
Additionally other professional colleagues and website owners and operators who provided feedback.&lt;br /&gt;
&lt;br /&gt;
==Reviewers==&lt;br /&gt;
&lt;br /&gt;
* Igor Andriushchenko&lt;br /&gt;
* Gabriel Mendez Justiniano&lt;br /&gt;
* Matt Tesauro&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
All OWASP Projects are run and developed by volunteers and rely on personal donations and sponsorship to continue their development. OWASP does not endorse or recommend commercial products or services, allowing our community to remain vendor neutral with the collective wisdom of the best minds in software security worldwide. This project has received the sponsorship part of their Corporate OWASP membership fees from Verizon Digital Media Services in 2016 and Distil Networks in 2017, which has already contributed to the v1.2 production design costs, and will also be utilised to help promote knowledge of the project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[file:Verizon_Digital_Medial_Logo.jpg|size=150x45px|link=https://www.verizondigitalmedia.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Distil-flat-logo-2.png|link=https://www.distilnetworks.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Can you help? The project is looking for information on the prevalence and types of automated threats seen by web application owners in the real world. This will be used to refine and organise the information gathered from research papers, whitepapers, security reports and industry news. Please use the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/automated_threats_to_web_applications Mailing list]&lt;br /&gt;
&lt;br /&gt;
To share information confidentially, you can email the project leaders directly: [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:colin.watson@owasp.org Colin Watson].&lt;br /&gt;
&lt;br /&gt;
== Completed Outputs==&lt;br /&gt;
&lt;br /&gt;
* {{#switchtablink:Scope and Definitions|Glossary}}&lt;br /&gt;
* {{#switchtablink:Bibliography|Bibligraphy of information sources}}&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automated-threats.pdf summary chart] has been published summarising the information gathered and work to date&lt;br /&gt;
* Identifying automated threats to web applications, and determining the primary name used. This first part of the project intends to produce a consistent vocabulary for discussing the threats before moving onto other aspects&lt;br /&gt;
* The primary terms have now been defined and described for the ontology&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automation-briefing.pdf briefing document] was produced in May 2015&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Automated Threat Handbook] July 2015 [https://www.owasp.org/index.php/File:Owasp-automated-threat-handbook-source-files.zip source files], updated in November 2016&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automation-project-briefing.pdf project overview flyer]  July 2015&lt;br /&gt;
* Release  [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] December 2016&lt;br /&gt;
&lt;br /&gt;
== Roadmap==&lt;br /&gt;
&lt;br /&gt;
The project's roadmap was updated in October 2017.&lt;br /&gt;
&lt;br /&gt;
===Q1 2015===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Feb 2015: Define scope and terminology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Mar 2015: Research prior work and reports about automated threats to web applications to create bibliography&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q2 2015===&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Assess threats/attacks and create ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Application owner interviews and creation of initial project outputs, to refine model&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Publication of outputs and request for review/data&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Summit session and survey at AppSec EU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Write ontology document&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Write 2-page project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Publish project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul 2015: Publish v1.0 ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q3 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul-Sep 2016: Gathering of additional contributions and update handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q4 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Nov 2016: Release updated handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec 2016: Threat identification chart&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q1 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec-Mar 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check against changes to CAPEC v2.9&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q2 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Apr-Jun 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecEU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q3 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Chase up ongoing project review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecUS&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q4 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Release v1.2 &amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q1 2018 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create OAT wiki pages&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Future ===&lt;br /&gt;
* Write executive summary&lt;br /&gt;
* Release executive summary document&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-SR-2]] [[Category:SAMM-TA-1]] [[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=238131</id>
		<title>OWASP Automated Threats to Web Applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=238131"/>
				<updated>2018-02-26T15:46:10Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* In Print */ Updated Lulu link for v1.2&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Automated-threats-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Automated Threats to Web Applications==&lt;br /&gt;
&lt;br /&gt;
The OWASP Automated Threats to Web Applications Project has completed a review of reports, academic and other papers, news stories and vulnerability taxonomies/listings to identify, name and classify these scenarios – automated by software causing a divergence from accepted behavior producing one or more undesirable effects on a web application, but excluding tool-based exploitation of single-issue vulnerabilities. The initial objective was to produce an ontology providing a common language for developers, architects, operators, business owners, security engineers, purchasers and suppliers/ vendors, to facilitate clear communication and help tackle the issues.&lt;br /&gt;
The project also identifies symptoms, mitigations and controls in this problem area. Like all OWASP outputs, everything is free and published using an open source license.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Automation-project-briefing.pdf Two page summary project briefing as a PDF].&lt;br /&gt;
&lt;br /&gt;
== Description==&lt;br /&gt;
&lt;br /&gt;
Web applications are subjected to unwanted automated usage – day in, day out. Often these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is commonly mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the primary intent. Frequently these have sector-specific names. Most of these problems seen regularly by web application owners are not listed in any OWASP Top Ten or other top issue list. Furthermore, they are not enumerated or defined adequately in existing dictionaries. These factors have contributed to inadequate visibility, and an inconsistency in naming such threats, with a consequent lack of clarity in attempts to address the issues.&lt;br /&gt;
&lt;br /&gt;
Without sharing a common language between devops, architects, business owners, security engineers, purchasers and suppliers/vendors, everyone has to make extra effort to communicate clearly. Misunderstandings can be costly. The adverse impacts affect the privacy and security of individuals as well as the security of the applications and related system components.&lt;br /&gt;
&lt;br /&gt;
== Automated Threats ==&lt;br /&gt;
&lt;br /&gt;
The list of threat events, defined more fully in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-020 Account Aggregation]]&lt;br /&gt;
* [[OAT-019 Account Creation]]&lt;br /&gt;
* [[OAT-003 Ad Fraud]]&lt;br /&gt;
* [[OAT-009 CAPTCHA Defeat]]&lt;br /&gt;
* [[OAT-010 Card Cracking]]&lt;br /&gt;
* [[OAT-001 Carding]]&lt;br /&gt;
* [[OAT-012 Cashing Out]]&lt;br /&gt;
* [[OAT-007 Credential Cracking]]&lt;br /&gt;
* [[OAT-008 Credential Stuffing]]&lt;br /&gt;
* [[OAT-021 Denial of Inventory]]&lt;br /&gt;
* [[OAT-015  Denial of Service]]&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-006 Expediting]]&lt;br /&gt;
* [[OAT-004 Fingerprinting]]&lt;br /&gt;
* [[OAT-018 Footprinting]]&lt;br /&gt;
* [[OAT-005 Scalping]]&lt;br /&gt;
* [[OAT-011 Scraping]]&lt;br /&gt;
* [[OAT-016 Skewing]]&lt;br /&gt;
* [[OAT-013 Sniping]]&lt;br /&gt;
* [[OAT-017 Spamming]]&lt;br /&gt;
* [[OAT-002 Token Cracking]]&lt;br /&gt;
* [[OAT-014 Vulnerability Scanning]]&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
Not sure which is which? Use the [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] in conjunction with the full [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
All the materials are free to use. They are licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What Is This? ==&lt;br /&gt;
&lt;br /&gt;
Information and resources to help web application owners defend against [[:Category:Automated Threat|automated threats]]&lt;br /&gt;
&lt;br /&gt;
== What Isn't It? ==&lt;br /&gt;
&lt;br /&gt;
* Another vulnerability list&lt;br /&gt;
* An OWASP Top N List&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Attack trees&lt;br /&gt;
* Non web&lt;br /&gt;
* Non application&lt;br /&gt;
&lt;br /&gt;
==Project Objective==&lt;br /&gt;
&lt;br /&gt;
This project brings together research and analysis of real world automated attacks against web applications, to produce documentation to assist operators defend against these threats. Sector-specific guidance will be available.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Automatedthreats-presentation-small.jpg|link=media:Bots-AppSecUSA2017-Project-Summit.pptx]]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP WASC Web Hacking Incidents Database Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
* [[OWASP AppSensor Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP ModSecurity Core Rule Set Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Download the free handbook as a PDF]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [16 Feb 2018] OAT wiki pages created&lt;br /&gt;
* [15 Feb 2018] v1.2 Handbook published&lt;br /&gt;
* [25 Sep 2017] Promoted to Labs status&lt;br /&gt;
* [19-20 Sep 2017] Working session at the AppSecUSA 2017 Project Summit&lt;br /&gt;
* [15 May 2017] Draft feedback on Top Ten A7 shared&lt;br /&gt;
* [17 Apr 2017] [https://www.owasp.org/index.php/File:BadBots_OWASP_AppSec_CA_2017.pptx Slides] from AppSec California (2017)&lt;br /&gt;
* [20 Dec 2016] Threat identification chart [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf published]&lt;br /&gt;
* [03 Nov 2016] Presentation at [http://lascon.org/ LASCON 2016]&lt;br /&gt;
* [03 Nov 2016] v1.1 Handbook published&lt;br /&gt;
* [11-12 Oct 2016] Working session at the [https://docs.google.com/presentation/d/1iMQHTc-h5qcP7gBBRcPHGmVaTWqx3dpMwNMVlA--rqs/edit#slide=id.p3 AppSecUSA 2017 Project Summit]&lt;br /&gt;
* [04 Aug 2016] Project Q&amp;amp;A at Blackhat USA 2-5pm in the OWASP booth&lt;br /&gt;
* [26 Oct 2015] [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf v1.01 handbook] published&lt;br /&gt;
* [24 Sep 2015] [https://www.owasp.org/index.php/File:Colinwatson-a-new-ontology-of-unwanted-automation.pptx Presentation] at [https://2015.appsecusa.org/c/?page_id=896#a AppSec USA 2015]&lt;br /&gt;
&lt;br /&gt;
==In Print==&lt;br /&gt;
&lt;br /&gt;
[[File:AutomatedThreatHandbook_small.jpg|link=http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22932107.html]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-23540699.html Automated Threat Handbook] can be purchased at cost as a print on demand book.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
    &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Scope and Definitions =&lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The aim was to create a listing of vendor-neutral and technology agnostic terms that describe real-world automated threats to web applications, at a level of abstraction that application owners can relate to. These terms are threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
The focus is on abuse of functionality - misuse of inherent functionality and related design flaws, some of which are also referred to as business logic flaws. There is almost no focus on implementation bugs. It is not that the latter are not the target for attacks, but there is much more knowledge published in that area with a greater agreement on terminology. All the scenarios identified must require the web to exist for the threat to be materialised. Many of the scenarios have impacts upon the organisation that owns or operates web applications, but some scenarios have impacts more focused on individuals or other bodies. An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
==Definitions ==&lt;br /&gt;
&lt;br /&gt;
=== Automated Threats to Web Applications ===&lt;br /&gt;
&lt;br /&gt;
Threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
== Glossary ==&lt;br /&gt;
&lt;br /&gt;
;Action&lt;br /&gt;
: An act taken against an asset by a threat agent. Requires first that contact occurs between the asset and threat agent (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Application&lt;br /&gt;
: Software that performs a business process i.e. not system software&lt;br /&gt;
: A software program hosted by an information system (Ref 2)&lt;br /&gt;
&lt;br /&gt;
; Application layer&lt;br /&gt;
: &amp;quot;Layer 7” in the OSI model (Ref 3) and “application layer” in the TCP/IP model (Ref 4)&lt;br /&gt;
&lt;br /&gt;
;Threat&lt;br /&gt;
: Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events, etc.); malicious actors; errors; failures (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Agent&lt;br /&gt;
: Any agent (e.g., object, substance, human, etc.) that is capable of acting against an asset in a manner that can result in harm (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Event&lt;br /&gt;
: Occurs when a threat agent acts against an asset (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Web&lt;br /&gt;
: The World Wide Web (WWW, or simply Web) is an information space in which the items of interest, referred to as resources, are identified by global identifiers called Uniform Resource Identifiers (URI) (Ref 5)&lt;br /&gt;
: The first three specifications for Web technologies defined URLs, HTTP, and HTML (Ref 6)&lt;br /&gt;
&lt;br /&gt;
; Web application&lt;br /&gt;
: An application delivered over the web&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Glossary references:&lt;br /&gt;
# [http://pubs.opengroup.org/onlinepubs/9699919899/toc.pdf Risk Taxonomy, Technical Standard, The Open Group, 2009]&lt;br /&gt;
# [http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf NISTIR 7298 rev 2, NIST]&lt;br /&gt;
# [http://en.wikipedia.org/wiki/OSI_model OSI model, Wikipedia] &lt;br /&gt;
# [http://en.wikipedia.org/wiki/Internet_protocol_suite TCP/IP model, Wikipedia]&lt;br /&gt;
# [http://www.w3.org/TR/webarch/ Architecture of the World Wide Web, Volume One, W3C]&lt;br /&gt;
# [http://www.w3.org/Help/ Help and FAQ, W3C]&lt;br /&gt;
&lt;br /&gt;
=Use Case Scanarios=&lt;br /&gt;
&lt;br /&gt;
The following scenarios and organisation names are completely fictitious.&lt;br /&gt;
&lt;br /&gt;
==Defining application development security requirements==&lt;br /&gt;
&lt;br /&gt;
Cinnaminta SpA intends to build and launch a new multi-lingual and multi-currency ecommerce website. The development will be outsourced and Cinnaminta has been working on the functional design document. Among many other requirements, the application security specification requires that the website must not include any vulnerabilities identified in PCI DSS v3.1 Requirement 6.5, nor any other vulnerabilities that could affect the protection of payment cardholder data. Cinnaminta specifies that the website's payment functions must not be susceptible to the threat events '''OAT-001 Carding''' or '''OAT-010 Card Cracking''' as defined in the '''OWASP Automated Threat Handbook'''. In addition, the application must interact with the company's existing fraud detection system to counter '''OAT-012 Cashing Out'''. The requirements are specified in terms of these threat events, rather than particular product or service categories. Development houses responding to the call for bids use the ontology to focus their answers to these aspects appropriately.&lt;br /&gt;
&lt;br /&gt;
== Sharing intelligence within a sector==&lt;br /&gt;
&lt;br /&gt;
Unlimited Innovations Inc develops and supports patient-facing software solutions to a range of healthcare providers, many of which participate in the National Health Service Cyber Intelligence Sharing Center (NHS-CISC). Unlimited Innovations already builds continuous monitoring capabilities into its software and decides to provide an optional enhancement so that customers could choose to share their misuse event data with each other, to benefit from the combined threat intelligence. Rather than sharing large quantities of low-level data, Unlimited Innovations aggregates information and broadcasts validated and categorised threat data amongst the participating organisations. Automation attacks are classified according to the threat events defined in the '''OWASP Automated Threat Handbook''' so that each receiving party understands the nature of the threat. Even organisations that do not want to take part in this information sharing can benefit, since their own categorised information is made available to internal business management in the form of an easy-to-comprehend monitoring dashboard. The information gathered can also be fed into their other business information management systems to help improve patient service.&lt;br /&gt;
&lt;br /&gt;
== Exchanging threat data between CERTs==&lt;br /&gt;
&lt;br /&gt;
National Computer Emergency Response Teams (CERTs) recognise that sharing of local information can contribute to worldwide prevention of cyber attacks. Despite advances in cooperation between CERTs, anything to increase continuity and interoperability, such as standards for data exchange, is encouraged. CERT Zog is concerned about the sparsity of application-specific data it receives, and also the classification of that data. It has a particular concern about attacks and breaches that affect sectors defined in Zog's 2015 national cyber security strategy. CERT Zog and its neighbour CERT Tarset agree to tag threat events using the '''OWASP Automated Threat Handbook''' in order to add greater context to existing solutions being used for threat data exchange between them. The programme also collects sector metadata, so that all organisations within these can benefit from the centralised intelligence.&lt;br /&gt;
&lt;br /&gt;
== Enhancing application penetration test findings==&lt;br /&gt;
&lt;br /&gt;
Specialist application security penetration testing firm Cherak Industries Pte Ltd works primarily for financial services companies in the banking and insurance sectors, and is looking to expand its business throughout Asia. Cherak has some innovative pen test result reporting systems which integrate with client software fault and vulnerability tracking systems, and it actively looks for methods to provide additional value to its clients. Cherak has identified that pen test clients would benefit from help to in understanding the effects of combinations of vulnerabilities, especially design flaws, and has decided to utilise the '''OWASP Automated Threat Handbook''' to define and explain the automation-related threats. The individual vulnerabilities were scored as normal using CVSSv2 and v3, the matching CWEs identified, and mitigations in place documented. In addition, Cherak uses the threat events defined in the '''OWASP Automated Threat Handbook''' to help create a new section in the executive summary that explains how combinations of the issues found could lead to automation threats and the possible technical and business impacts. For example, an assessment for one client had identified weaknesses in authentication so that there is a risk of '''OAT-008 Credential Stuffing'''. The defined identifier was provided to the client, so its technical staff could refer to additional information on the OWASP website.&lt;br /&gt;
&lt;br /&gt;
== Specifying service acquisition needs==&lt;br /&gt;
&lt;br /&gt;
Falstone Paradise Inc is concerned about malicious use of their portfolio of hotel and resort websites. The majority of the websites use a shared application platform, but there are some unique applications and a large number of other micro-sites, some of which use generic content management systems such as Wordpress and Drupal. Falstone Paradise has identified that its IT operations team are spending too much time dealing with the effects of automated misuse, such as cleaning up data, resetting customer accounts and providing extra capacity during attacks. Furthermore, the unwanted automation is also causing some instabilities leading to negative feedback from customers. Therefore Falstone Paradise decides to go out to the security marketplace to identify, assess and select products or services that might help address these automation issues for all its websites. Their buying team works with their information technology colleagues to write the detailed requirements in an Invitation to Tender (ITT) document. This describes the types of attacks its web applications are receiving, their frequency of occurrence and their magnitudes. These are defined according to the '''OWASP Automated Threat Handbook''', so that vendors do not misunderstand the requirements, and each vendor's offering can be assessed against the particular automation threat events of concern.&lt;br /&gt;
&lt;br /&gt;
== Characterising vendor services ==&lt;br /&gt;
&lt;br /&gt;
Better Best Ltd has developed an innovative technology to help gaming companies defend against a range of automated threats that can otherwise permit cheating and distortion of the game, leading to disruption for normal players. The solution can be deployed on premises, but is also available in the cloud as a service. But Better Best is finding difficulty explaining its solution in the market place, especially since it does not fit into any conventional product category. Better Best decide to use the terminology and threat events listed in the '''OWASP Automated Threat Handbook''' to define their product's capabilities. They hope this will provide some clarity about their offering, and also demonstrate how their product can be used to replace more than one other conventional security device. Additionally, Better Best writes a white paper describing how their product has been successfully used by one of their reference customers Hollybush Challenge Games to protect against '''OAT-006 Expediting''', '''OAT-005 Scalping''', '''OAT-016 Skewing''' and '''OAT-013 Sniping'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Ontology=&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The A-Z list of [[:Category:Automated Threat|automated threat events]] and summary descriptions, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-020 Account Aggregation]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Use by an intermediary application that collects together multiple accounts and interacts on their behalf.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-019 Account Creation]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Create multiple accounts for subsequent misuse.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-003 Ad Fraud]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
False clicks and fraudulent display of web-placed advertisements.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-009 CAPTCHA Defeat]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Solve anti-automation tests.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-010 Card Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify missing start/expiry dates and security codes for stolen payment card data by trying different values.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-001 Carding]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Multiple payment authorisation attempts used to verify the validity of bulk stolen payment card data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-012 Cashing Out]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Buy goods or obtain cash utilising validated stolen payment card or other user account data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-007 Credential Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify valid login credentials by trying different values for usernames and/or passwords.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-008 Credential Stuffing]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass log in attempts used to verify the validity of stolen username/password pairs.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-021 Denial of Inventory]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Deplete goods or services stock without ever completing the purchase or committing to the transaction.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-015  Denial of Service]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Target resources of the application and database servers, or individual user accounts, to achieve denial of service (DoS).&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-006 Expediting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Perform actions to hasten progress of usually slow, tedious or time-consuming actions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-004 Fingerprinting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Elicit information about the supporting software and framework types and versions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-018 Footprinting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Probe and explore application to identify its constituents and properties.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-005 Scalping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Obtain limited-availability and/or preferred goods/services by unfair methods.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-011 Scraping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Collect application content and/or other data for use elsewhere.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-016 Skewing]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Repeated link clicks, page requests or form submissions intended to alter some metric.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-013 Sniping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Last minute bid or offer for goods or services.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-017 Spamming]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Malicious or questionable information addition that appears in public or private content, databases or user messages.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-002 Token Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass enumeration of coupon numbers, voucher codes, discount tokens, etc.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-014 Vulnerability Scanning]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Crawl and fuzz application to identify weaknesses and possible vulnerabilities.&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Comparison with other dictionaries, taxonomies and lists==&lt;br /&gt;
&lt;br /&gt;
===[https://capec.mitre.org/ Common Attack Pattern Enumeration and Classification] (CAPEC)===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-capec-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
CAPEC is a dictionary and classification taxonomy of known attacks on software. Its primary classification structures are:&lt;br /&gt;
&lt;br /&gt;
* [https://capec.mitre.org/data/definitions/3000.html Domains of attack] (3000) - Social Engineering (403), [https://capec.mitre.org/data/definitions/437.html Supply Chain] (437), Communications (512), [https://capec.mitre.org/data/definitions/513.html Software] (513), Physical Security (514), Hardware (515)&lt;br /&gt;
* Mechanism of Attack (1000) - Gather Information (118), Deplete Resources (119), Injection (152), Deceptive Interactions (156), Manipulate Timing and State (172), Abuse of Functionality (210), Probabilistic Techniques (223), Exploitation of Authentication (225), Exploitation of Authorization (232), Manipulate Data Structures (255), Manipulate Resources (262), Analyze Target (281), Gain Physical Access (436), Malicious Code Execution (525), Alter System Components (526), Manipulate System Users (527)&lt;br /&gt;
&lt;br /&gt;
===[http://projects.webappsec.org/w/page/13246978/Threat%20Classification WASC Threat Classification]===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-wasc-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
The WASC Threat Classification classifies weaknesses and attacks that can lead to the compromise of a website, its data, or its users.&lt;br /&gt;
&lt;br /&gt;
===[[OWASP WASC Web Hacking Incidents Database Project]] (WHID)===&lt;br /&gt;
&lt;br /&gt;
WHID [https://www.google.com/fusiontables/DataSource?snapid=S1536501YnLo classifies] publicly known incidents using:&lt;br /&gt;
&lt;br /&gt;
* attack methods e.g. ARP spoofing, abuse of functionality, account compromise, administration error, automation, backdoor, banking trojan, brute force, clickjacking, code injection, content injection, content spoofing, credential/session prediction, cross site request forgery (CSRF), cross-site scripting (XSS), denial of service, directory traversal, domain hijacking, DNS hijacking, forceful browsing, HTTP response splitting, hidden parameter manipulation, hosting malicious code, information leakage, insufficient authentication, known vulnerability, local file inclusion (LFI), malvertising, malware, malware injection, mass assignment, misconfiguration, OS commanding, parameter manipulation, path traversal, phishing, predictable resource location, process automation, redirection, remote file inclusion (RFI), rogue 3rd party app, scaping, search engine poisoning, shell injection, social engineering, stolen credentials, SQL injection, unintentional information disclosure, weak password recovery validation, worm&lt;br /&gt;
* weakness e.g. abuse of functionality, application misconfiguration, directory indexing, improper filesystem permissions, improper input handling, improper output handling, information leakage, insecure indexing, insufficient anti-automation, insufficient authentication, insufficient authorization, insufficient entropy, insufficient password recovery, insufficient process validation, insufficient session expiration, insufficient transport layer protection, misconfiguration, predictable resource location, weak password&lt;br /&gt;
* outcome account hijacking, account takeover, botnet participation, chaos, credit card leakage, data loss, defacement, DDoS attacks, DNS hijacking, DNS redirection, disinformation, disclosure only, downtime, extortion, fraud, information warfare, leakage of information, link spam, loss of sales, malware distribution,  monetary loss, phishing, planting of malware, service disruption, session hijacking, spam, spam links, stolen credentials, worm&lt;br /&gt;
&lt;br /&gt;
Plus other/various/unknown.&lt;br /&gt;
&lt;br /&gt;
= Bibliography =&lt;br /&gt;
&lt;br /&gt;
The following academic, open source, commercial and news sources were used in the research on automated threats to web applications. OWASP is a worldwide not-for-profit charitable organization focused on improving the security of software.  We operate under a vendor neutral policy and we do not endorse products or services.&lt;br /&gt;
&lt;br /&gt;
* 10 years of Application Security, Denyall http://www.denyall.com/resources/whitepapers/?aliId=3438442&lt;br /&gt;
*	2012 Payment Card Threat Report	 https://www.securitymetrics.com/static/resources/orange/2012%20Payment%20Card%20Threat%20Report%20copy.pdf				&lt;br /&gt;
*	2014 Bot Traffic Report: Just the Droids You were Looking for	 http://www.incapsula.com/blog/bot-traffic-report-2014.html				&lt;br /&gt;
*	3 Types of ‘Return Fraud’ to Monitor this Holiday Season	 http://www.practicalecommerce.com/articles/3168-3-Types-of-%E2%80%98Return-Fraud-to-Monitor-this-Holiday-Season	&lt;br /&gt;
* 7 Ways Bots Hurt Your Website, Distil Networks http://www.distilnetworks.com/7-ways-bots-hurt-website-whitepaper/						&lt;br /&gt;
*	Abusing HTML 5 Structured Client-side Storage	2008	 http://packetstorm.wowhacker.com/papers/general/html5whitepaper.pdf		&lt;br /&gt;
* Acquiring Experience with Ontology and Vocabularies, Walt Melo, Risa Mayan and Jean Stanford, 2011  http://www.omg.org/news/meetings/workshops/SOA-HC/presentations-2011/13_SC-6_Melo_Stanford_Mayan.pdf	&lt;br /&gt;
*	An Anatomy of a SQL Injection Attack	 Hacker Intelligence Initiative	 Imperva	 	 http://www.imperva.com/docs/HII_An_Anatomy_of_a_SQL_Injection_Attack_SQLi.pdf	&lt;br /&gt;
*	The Anatomy of Clickbot.A	 https://www.usenix.org/legacy/event/hotbots07/tech/full_papers/daswani/daswani.pdf				&lt;br /&gt;
*	Anatomy of comment spam	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Anatomy_of_Comment_Spam.pdf		&lt;br /&gt;
*	Anti-Automation Monitoring and Prevention	2015	 https://www.clerkendweller.uk/2015/1/29/AntiAutomation-Monitoring-and-Prevention			&lt;br /&gt;
*	Anti-DDoS Solution for Internet Corporation	 http://www.nsfocus.com/uploadfile/Solution/NSFOCUS%20Anti-DDoS%20Solution%20for%20Internet%20Corporation.pdf				&lt;br /&gt;
*	Anti-Fraud Principles and Proposed Taxonomy	 Sep 2014	 http://www.iab.net/media/file/IAB_Anti_Fraud_Principles_and_Taxonomy.pdf			&lt;br /&gt;
*	Apache Security	 Ivan Ristic	 			&lt;br /&gt;
* Application Security Desk Reference, OWASP https://www.owasp.org/index.php/Category:OWASP_ASDR_Project&lt;br /&gt;
* Application Security Guide For CISOs, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf&lt;br /&gt;
* AppSensor, OWASP https://www.owasp.org/index.php/OWASP_AppSensor_Project&lt;br /&gt;
*	Attack &amp;amp; Defense Labs	 http://www.andlabs.org/html5.html				&lt;br /&gt;
*	Attack categories	 OWASP	 https://www.owasp.org/index.php/Category:Attack	&lt;br /&gt;
* Attack Trees, Schneier, Dr. Dobb's Journal, December 1999 https://www.schneier.com/paper-attacktrees-ddj-ft.html		&lt;br /&gt;
*	Attacking with HTML5	2010	 https://media.blackhat.com/bh-ad-10/Kuppan/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-wp.pdf			&lt;br /&gt;
*	Automated attacks	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Automation_of_Attacks.pdf		&lt;br /&gt;
*	Avoiding the Top 10 Software Security Design Flaws	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf				&lt;br /&gt;
*	Bad Bots On The Rise	 Dec 2014	 http://www.darkreading.com/informationweek-home/bad-bots-on-the-rise/d/d-id/1318276	&lt;br /&gt;
* Banking Botnets Persist Despite Takedowns, Dell SecureWorks, 2015 http://www.secureworks.com/cyber-threat-intelligence/threats/banking-botnets-persist-despite-takedowns/	&lt;br /&gt;
*	The Barracuda Web Application Firewall: XML Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_XML_Firewall.pdf	&lt;br /&gt;
*	Blocking Brute Force Attacks	 http://www.cs.virginia.edu/~csadmin/gen_support/brute_force.php				&lt;br /&gt;
*	Bot Traffic Growing Problem for Digital	 Oct 2014	 http://www.netnewscheck.com/article/36537/bot-traffic-growing-problem-for-digital			&lt;br /&gt;
*	BotoPedia	 Incapsula	 http://www.botopedia.org/			&lt;br /&gt;
*	Boy in the Browser	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/Boy_in_the_Browser	&lt;br /&gt;
* Business Logic Attacks - Bots and BATs, Eldad Chai, 2009 http://www.owasp.org/images/9/96/AppSecEU09_BusinessLogicAttacks_EldadChai.ppt		&lt;br /&gt;
*	Bypassing Client Application Protection Techniques	 http://www.securiteam.com/securityreviews/6S0030ABPE.html&lt;br /&gt;
*	A CAPTCHA in the Rye	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_a_CAPTCHA_in_the_Rye.pdf					&lt;br /&gt;
*	Characterizing Large Scale Click fraud	 http://cseweb.ucsd.edu/~voelker/pubs/za-ccs14.pdf	&lt;br /&gt;
* Charter Addition Proposal: &amp;quot;Trusted Code&amp;quot; for the Web https://lists.w3.org/Archives/Public/public-webappsec/2015Mar/0150.html&lt;br /&gt;
*	A cheesy Apache / IIS DoS vuln (+a question) 	 http://www.securityfocus.com/archive/1/456339/30/0/threaded	&lt;br /&gt;
* China's Man-on-the-Side Attack on GitHub http://www.netresec.com/?page=Blog&amp;amp;month=2015-03&amp;amp;post=China%27s-Man-on-the-Side-Attack-on-GitHub&lt;br /&gt;
* The CISO Survey and Report, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-report-2013-1.0.pdf&lt;br /&gt;
* Common Attack Pattern Enumeration and Classification (CAPEC), Mitre https://capec.mitre.org/			&lt;br /&gt;
*	Common Cyber Attacks: Reducing the Impact	 CERT-UK	 https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/400106/Common_Cyber_Attacks-Reducing_The_Impact.pdf			&lt;br /&gt;
*	Corporate espionage – the internet’s new growth industry	 http://www.itproportal.com/2015/03/19/corporate-espionage-internets-new-growth-industry/				&lt;br /&gt;
*	CSA Top Threats to Cloud Computing	 https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf				&lt;br /&gt;
*	CSRF vulnerability in GMail service	 http://seclists.org/fulldisclosure/2009/Mar/29		&lt;br /&gt;
* CWE/SANS Top 25 Most Dangerous Software Errors, 2011 http://cwe.mitre.org/top25/		&lt;br /&gt;
*	Cyber Fraud - Tactics	 Techniques and Procedures	 http://www.crcpress.com/product/isbn/9781420091274			&lt;br /&gt;
* Cybercrime Report: Q1 2015, ThreatMetrix, 2015 http://info.threatmetrix.com/WP-2015Q1CybercrimeReport_WP-LP.html&lt;br /&gt;
*	Data Breach Investigations Report (DBIR), 2014	 http://www.verizonenterprise.com/DBIR/2014/				&lt;br /&gt;
* Data Breach Investigations Report (DBIR), 2015 http://www.verizonenterprise.com/DBIR/2015/&lt;br /&gt;
*	Data Breaches Fuel Login Attacks	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2014-state-of-the-internet-threat-advisory-public-data-breaches-fuel-login-attacks.pdf		&lt;br /&gt;
*	Data Scraping	 Wikipedia	 http://en.wikipedia.org/wiki/Data_scraping			&lt;br /&gt;
*	DDoS Quick Guide	 https://www.us-cert.gov/sites/default/files/publications/DDoS%20Quick%20Guide.pdf	&lt;br /&gt;
* DDoS Threat Landscape Report, 2013-2014 http://lp.incapsula.com/rs/incapsulainc/images/2013-14_ddos_threat_landscape.pdf	&lt;br /&gt;
* Defending Against an Internet-based Attack on the Physical World http://avirubin.com/scripted.attacks.pdf		&lt;br /&gt;
*	Defending Against Application-Based DDoS Attacks with the Barracuda Web Application Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_Defending%20_Against_%20Application-Based_%20DDoS_%20Attacks.pdf				&lt;br /&gt;
*	Demystifying HTML 5 Attacks	 http://resources.infosecinstitute.com/demystifying-html-5-attacks/				&lt;br /&gt;
*	Denial of Service Attacks: A Comprehensive Guide to Trends	 Techniques	 and Technologies	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Denial_of_Service_Attacks-Trends_Techniques_and_Technologies.pdf&lt;br /&gt;
*	Detecting and Blocking Site Scraping Attacks	 Imperva	 http://www.imperva.com/docs/WP_Detecting_and_Blocking_Site_Scraping_Attacks.pdf			&lt;br /&gt;
*	Detecting Automation of Twitter Accounts: Are you a human	 cyborg	 or a bot?	 http://www.cs.wm.edu/~hnw/paper/tdsc12b.pdf		&lt;br /&gt;
*	Detecting Malice	 Robert &amp;quot;RSnake&amp;quot; Hansen	2009	 http://www.detectmalice.com/		&lt;br /&gt;
*	Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) 	 http://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1414072277428&amp;amp;uri=CELEX:32002L0058				&lt;br /&gt;
*	Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data 	 http://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:31995L0046				&lt;br /&gt;
*	Distributed Denial-of-Service (DDoS) Cyber-Attacks	 Risk Mitigation	 and Additional Resources	 Federal Financial Institutions Examination Council	 http://www.ffiec.gov/press/PDF/FFIEC%20DDoS%20Joint%20Statement.pdf	&lt;br /&gt;
*	Do Evil - The Business of Social Media Bots	 Forbes	 http://www.forbes.com/sites/lutzfinger/2015/02/17/do-evil-the-business-of-social-media-bots/			&lt;br /&gt;
*	DoS and DDoS Glossary of Terms	 prolexic	 http://www.prolexic.com/knowledge-center-dos-and-ddos-glossary.html#layer-7-ddos-attack			&lt;br /&gt;
*	E-commerce Malware	 Trustwave	 https://gsr.trustwave.com/topics/placeholder-topic/e-commerce-malware/	&lt;br /&gt;
* Exploiting Software, G. Hoglund and G. McGraw, Addison-Wesley, 2004&lt;br /&gt;
* Five Trends to Track in E-Commerce Fraud, ThreatMetrix, 2013 http://info.threatmetrix.com/rs/threatmetrix/images/Five_Trends_eCommerce_Fraud_WP.pdf&lt;br /&gt;
* Hacker builds cheatbot for hit app Trivia Crack http://www.theregister.co.uk/2015/03/26/hacker_builds_trivia_crack_cheat_app/	&lt;br /&gt;
* Has Walmart opened itself up to “Denial of inventory” attacks?  https://arstechnica.com/business/2012/05/has-walmart-opened-itself-up-to-denial-of-inventory-attacks/	&lt;br /&gt;
* How Hoarder Bots Steal sales from Online Retailers https://www.internetretailer.com/mobile/2016/12/16/how-hoarder-bots-steal-sales-online-retailers&lt;br /&gt;
*	How to Defend Against DDoS Attacks - Strategies for the Network	 Transport	 and Application Layers	 Prolexic	 http://www.prolexic.com/kcresources/white-paper/strategies-for-the-network-transport-and-application-layers-412/Strategies_for_the_Network_Transport_and_Application_Layers_Prolexic_White_Paper_A4_082412.pdf	&lt;br /&gt;
* How to Defend Online Travel Websites in the Era of Site Scraping, Distil Networks http://www.distilnetworks.com/defend-online-travel-websites-era-site-scraping-download/&lt;br /&gt;
*	How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores	 http://research.microsoft.com/pubs/145858/caas-oakland-final.pdf				&lt;br /&gt;
*	HTML5 Overview	 A look at HTML5 Attack Scenarios	 Trend Micro	2011	 http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt_html5-attack-scenarios.pdf	&lt;br /&gt;
*	HTML5 Top 10 Threats Stealth Attacks and Silent Exploits	2012	 https://media.blackhat.com/bh-eu-12/shah/bh-eu-12-Shah_HTML5_Top_10-WP.pdf			&lt;br /&gt;
*	HTML5 web security	2011	 http://media.hacking-lab.com/hlnews/HTML5_Web_Security_v1.0.pdf			&lt;br /&gt;
*	HTTPPOST - Slow POST	 Wong Onn Chee	 OWASP AppSec DC 2010	 https://www.owasp.org/images/4/43/Layer_7_DDOS.pdf	&lt;br /&gt;
* If you've got @British_Airways account may make sense to change your password. Just had all my Avios cleared out! https://twitter.com/suttonnick/status/581556027948195840/photo/1	&lt;br /&gt;
* Internet Security Threat Report, Volume 19, 2014 http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf&lt;br /&gt;
*	An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks	 http://www.springer.com/gb/book/9788132202769	&lt;br /&gt;
*	Is Your Data Center Ready for Today’s DDoS Threats? DDoS attack types	 protection methods and testing your detection and mitigation defenses	 http://www.fortinet.com/sites/default/files/whitepapers/WP-DDoS-Testing.pdf			&lt;br /&gt;
*	Joomla Reflection DDoS-for-Hire	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2015-state-of-the-internet-threat-advisory-joomla-reflection-attack-ddos-for-hire.pdf		&lt;br /&gt;
*	Layer 7 DDOS – Blocking HTTP Flood Attacks	 http://blog.sucuri.net/2014/02/layer-7-ddos-blocking-http-flood-attacks.html				&lt;br /&gt;
*	Lenovo	 Superfish put smut on my system' – class-action lawsuit	 The Register	 http://www.theregister.co.uk/2015/02/23/lenovo_superfish_class_action_lawsuit/		&lt;br /&gt;
* List of Attack Vectors   Relative Vulnerability Rating TECAPI http://www.tecapi.com/public/relative-vulnerability-rating-gui.jsp#&lt;br /&gt;
*	Man in the Browser	 http://scisweb.ulster.ac.uk/~kevin/IJACI-Vol4No1-maninbrowser.pdf				&lt;br /&gt;
*	Man in the Browser Attack	 https://www.owasp.org/index.php/Man-in-the-browser_attack&lt;br /&gt;
* Mapping and Measuring Cybercrime, Oxford Internet Institute http://www.oii.ox.ac.uk/publications/FD18.pdf				&lt;br /&gt;
*	Massive Changes in the Criminal Landscape	 Europol	2015	 https://www.europol.europa.eu/content/massive-changes-criminal-landscape	&lt;br /&gt;
* Matching Attack Patterns to Security Vulnerabilities in Software-Intensive System Designs http://collaboration.csc.ncsu.edu/laurie/Papers/ICSE_Final_MCG_LW.pdf	&lt;br /&gt;
*	Mitigating DDoS Attacks with F5 Technology	 F5	 https://f5.com/resources/white-papers/mitigating-ddos-attacks-with-f5-technology			&lt;br /&gt;
* Mitigating the DoS/DDosS Threat, Radware, 2012 http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452061&lt;br /&gt;
* Modern Web Attacks, Sophos, 2007 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/modern-web-attacks.aspx&lt;br /&gt;
*	ModSecurity Advanced Topic of the Week: Mitigating Slow HTTP DoS Attacks	 https://www.trustwave.com/Resources/SpiderLabs-Blog/(Updated)-ModSecurity-Advanced-Topic-of-the-Week--Mitigating-Slow-HTTP-DoS-Attacks/	&lt;br /&gt;
* Most common attacks on web applications https://ipsec.pl/web-application-security/most-common-attacks-web-applications.html			&lt;br /&gt;
* Multi-dimensional Vulnerability Hierarchies Daniel Miessler  https://danielmiessler.com/study/multi-dimensional-vulnerability-hierarchies/&lt;br /&gt;
*	New Wave of DDoS Attacks Launched	 BankInfoSecurity.com	 Mar 2013	 http://www.bankinfosecurity.com/new-wave-ddos-attacks-launched-a-5584/op-1		&lt;br /&gt;
*	NOMAD: Toward Non-Invasive Moving Target Defense Against Web Bots	 http://faculty.cs.tamu.edu/guofei/paper/NOMAD_CNS13.pdf				&lt;br /&gt;
*	Online Ad Fraud Exposed: Advertisers Losing $6.3 Billion To $10 Billion Per Year	 Sep 2014	 http://www.darkreading.com/analytics/threat-intelligence/online-ad-fraud-exposed-advertisers-losing-$63-billion-to-$10-billion-per-year/d/d-id/1317979			&lt;br /&gt;
* Online Data Companies versus Bots: The Fight is on for Control of Online Data, Distil Networks http://www.distilnetworks.com/online-data-companies-vs-bots-download/&lt;br /&gt;
*	Optimal Airline Ticket Purchasing Using Automated User-Guided Feature Selection	 http://ijcai.org/papers13/Papers/IJCAI13-032.pdf				&lt;br /&gt;
*	Payment Checkout Flaws and Bugs	2014	 https://www.clerkendweller.uk/2014/11/4/Payment-Checkout-Flaws-and-Bugs			&lt;br /&gt;
*	PCI Compliance Report 2015	 Verizon	 http://www.verizonenterprise.com/pcireport/2015/			&lt;br /&gt;
*	Pixel Perfect Timing Attacks with HTML5	2013	 http://www.contextis.com/services/research/white-papers/pixel-perfect-timing-attacks-html5/			&lt;br /&gt;
*	Polymorphism as a Defense for Automated Attack of Websites	 http://link.springer.com/chapter/10.1007%2F978-3-319-07536-5_30				&lt;br /&gt;
*	Preventing Web Scraping: Best Practice 	 https://creativedigitalideas.files.wordpress.com/2014/11/best-practice-to-prevent-web-scraping.pdf				&lt;br /&gt;
*	Profile: Automated Credit Card Fraud	 http://old.honeynet.org/papers/profiles/cc-fraud.pdf				&lt;br /&gt;
* Protecting Against Web Floods, Radware http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452968&lt;br /&gt;
*	Q4 2014 State of the Internet Security Report	 prolexic	 http://www.stateoftheinternet.com/downloads/pdfs/2014-internet-security-report-q4.pdf			&lt;br /&gt;
*	Reflection injection	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf		&lt;br /&gt;
* A Report on taxonomy and evaluation of existing inventories, ENISAhttp://ecrime-project.eu/wp-content/uploads/2015/02/E-Crime-Deliverable-2-1-20141128_FINAL.pdf			&lt;br /&gt;
* Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft, Dept of Justice http://www.justice.gov/criminal/cybercrime/docs/ip-victim-guide-and-checklist-march-2013.pdf&lt;br /&gt;
*	SANS Top 20 Critical Controls	 https://www.sans.org/critical-security-controls/		&lt;br /&gt;
* Securing Websites, Sophos, 2011 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/securing-websites.aspx		&lt;br /&gt;
*	Security Insights: Defending Against Automated Threats	 http://www.securityweek.com/security-insights-defending-against-automated-threats				&lt;br /&gt;
*	Server side DDoS	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/DDOS_Attack_Method_Payload_05182010			&lt;br /&gt;
*	Slow Read Denial of Service attack	 https://code.google.com/p/slowhttptest/wiki/SlowReadTest				&lt;br /&gt;
*	Slow-Read DoS Attack	 https://www.trustwave.com/Resources/SpiderLabs-Blog/ModSecurity-Advanced-Topic-of-the-Week--Mitigation-of--Slow-Read--Denial-of-Service-Attack/				&lt;br /&gt;
*	Slowloris HTTP DoS	 http://ha.ckers.org/slowloris/	 	&lt;br /&gt;
* So what are the &amp;quot;most critical&amp;quot; application flaws? On new OWASP Top 10 https://ipsec.pl/application-security/2013/so-what-are-most-critical-application-flaws-new-owasp-top-10.html		&lt;br /&gt;
*	Social Media Bots Offer Phony Friends and Real Profit	 NY Times	 http://www.nytimes.com/2014/11/20/fashion/social-media-bots-offer-phony-friends-and-real-profit.html?_r=1			&lt;br /&gt;
* Software Vulnerability Analysis, Krsul, 1998 http://www.krsul.org/ivan/articles/main.pdf&lt;br /&gt;
*	Sophos Security Threat Report	 http://blogs.sophos.com/2014/12/11/our-top-10-predictions-for-security-threats-in-2015-and-beyond/&lt;br /&gt;
* SpoofedMe Social Login Attack Discovered by IBM X-Force Researchers http://securityintelligence.com/spoofedme-social-login-attack-discovered-by-ibm-x-force-researchers/#.VSuiEhPSngM				&lt;br /&gt;
* State of Software Security Report, Volume 5, Veracode, 2013 https://info.veracode.com/state-of-software-security-report-volume5.html&lt;br /&gt;
*	Stopping Automated Attack Tools	 http://www.technicalinfo.net/papers/StoppingAutomatedAttackTools.html&lt;br /&gt;
* Taxonomy on Online Game Security http://www.math.snu.ac.kr/~jhcheon/publications/2004/Taxonomy%20on%20online%20game%20security_EL.pdf	&lt;br /&gt;
* A Taxonomy of Computer Program Security Flaws, with Examples, Landwehr https://cwe.mitre.org/documents/sources/ATaxonomyofComputerProgramSecurityFlawswithExamples%5BLandwehr93%5D.pdf&lt;br /&gt;
* A Taxonomy of Security Faults in the UNIX Operating System, Aslam, 1995 https://cwe.mitre.org/documents/sources/ATaxonomyofSecurityFaultsintheUNIXOperatingSystem%5BAslam95%5D.pdf		&lt;br /&gt;
* Testing Guide, v4, OWASP, 2014 https://www.owasp.org/images/5/52/OWASP_Testing_Guide_v4.pdf								&lt;br /&gt;
*	The Bot Baseline: Fraud in Digital Advertising	 https://s3.amazonaws.com/whiteops-public/WO-ANA-Baseline-Study-of-Bot-Fraud.pdf							&lt;br /&gt;
*	The Internet Organised Crime Threat Assessment (iOCTA) 2014	 https://www.europol.europa.eu/content/internet-organised-crime-threat-assesment-iocta				&lt;br /&gt;
*	The Notorious Nine	 Cloud Computing Top Threats in 2013	 CSA	 https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf	&lt;br /&gt;
* The Risks of Content Management Systems, IBM, 2015 https://portal.sec.ibm.com/mss/html/en_US/support_resources/pdf/CMS_Threats_MSS_Threat_Report.pdf	&lt;br /&gt;
* The Spy in the Sandbox – Practical Cache Attacks in Javascript http://iss.oy.ne.ro/SpyInTheSandbox.pdf						&lt;br /&gt;
* Thousands of Hacked Uber Accounts Selling on Dark Web for $1 http://thehackernews.com/2015/03/thousands-of-hacked-uber-accounts_30.html?m=1&lt;br /&gt;
* Threat Intelligence Quarterly, IBM, 1Q 2015 https://www.ibm.com/services/forms/signup.do?source=swg-WW_Security_Organic&amp;amp;S_PKG=ov33510&amp;amp;S_TACT=C327017W&amp;amp;dynform=18101&lt;br /&gt;
* Threat Modeling: Designing for Security, Adam Shostack, Wiley, April 2014 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118809998.html&lt;br /&gt;
*	Threats and Mitigations: A Guide to Multi-Layered Web Security - eBook	 Prolexic	 	 http://www.prolexic.com/knowledge-center/prolexic-download/guide-multi-layered-web-security-ebook.pdf		&lt;br /&gt;
* Trapping Unknown Malware in a Context Web, Sophos http://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/HuqSzabo-VB2013.pdf?la=en.pdf&lt;br /&gt;
*	Trustwave Global Security Report	2014	 https://www2.trustwave.com/GSR2014.html?utm_source=redirect&amp;amp;utm_medium=web&amp;amp;utm_campaign=GSR2014			&lt;br /&gt;
*	TurboTax’s Anti-Fraud Efforts Under Scrutiny	 http://krebsonsecurity.com/2015/02/turbotaxs-anti-fraud-efforts-under-scrutiny/				&lt;br /&gt;
*	Two Security Vulnerabilities in the Spring Framework’s MVC pdf (from 2008)	 http://blog.diniscruz.com/2011/07/two-security-vulnerabilities-in-spring.html&lt;br /&gt;
*	The Underground Economy of Spam: A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns	 http://static.usenix.org/events/leet11/tech/full_papers/Stone-Gross.pdf					&lt;br /&gt;
*	Understanding Web Bots and How They Hurt Your Business	 Encapsula	 http://www.slideshare.net/Incapsula/understanding-web-bots-and-how-they-hurt-your-business		&lt;br /&gt;
* Use of A Taxonomy of Security Faults, Taimur Aslam, Ivan Krsul and Eugene H Spafford, 1996  http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=2304&amp;amp;context=cstech&lt;br /&gt;
*	The WASC Threat Classification v2.0	 http://projects.webappsec.org/w/page/13246978/Threat%20Classification	&lt;br /&gt;
* Warhol Worms: The Potential for Very Fast Internet Plagues http://www.iwar.org.uk/comsec/resources/worms/warhol-worm.htm	&lt;br /&gt;
*	Web Application Attack Report #5	 Imperva	 http://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed5.pdf	&lt;br /&gt;
* Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Ryan Barnett, Wiley, December 2012 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118362187.html		&lt;br /&gt;
*	Web Attacks in the Wild	 Corsaire	 https://www.owasp.org/images/a/a7/Web_attacks_in_the_wild_-_ap.pdf			&lt;br /&gt;
*	Web Automation	 Friend or Foe?	 https://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf			&lt;br /&gt;
*	Web Spambot Detection Based on Web Navigation Behaviour 	 http://pedramhayati.com/papers/Web_Spambot_Detection_Based_on_Web_Usage_Behaviour.pdf		&lt;br /&gt;
* Website Security Statistics Report, 2014 http://info.whitehatsec.com/rs/whitehatsecurity/images/statsreport2014-20140410.pdf		&lt;br /&gt;
*	What is Zeus?	 http://www.sophos.com/medialibrary/pdfs/technical%20papers/sophos%20what%20is%20zeus%20tp.pdf				&lt;br /&gt;
*	When Web 2.0 Attacks! Understanding Ajax	 Flash and other highly interactive web technologies…	 https://www.owasp.org/images/f/fc/When_Web_2.0_Attacks_-_Understanding_Security_Implications_of_Highly_Interactive_Technologies-Rafal_Los.pdf			&lt;br /&gt;
*	Where have all of our Passwords Gone?	 Gartner	2015	 http://blogs.gartner.com/avivah-litan/2015/01/22/where-have-all-our-passwords-gone/		&lt;br /&gt;
*	WS-Attacks.org	 http://www.ws-attacks.org/index.php/Main_Page&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; What do you mean by &amp;quot;web&amp;quot;, &amp;quot;application&amp;quot; and &amp;quot;automated threat&amp;quot;?&lt;br /&gt;
: See the definitions in the project's {{#switchtablink:Project Scope and Definitions|glossary}}.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;ontology&amp;quot;?&lt;br /&gt;
: An ontology is a set of types, properties, and relationship. These together define a subject description language. This particular ontology is meant to represent what automated threats real world owners observe affecting their web applications in usual operations.&lt;br /&gt;
&lt;br /&gt;
; Isn't this another bug (vulnerability) list?&lt;br /&gt;
: No, none of the named automated threat events are implementation bugs - they relate to abuse of functionality using automated means.&lt;br /&gt;
&lt;br /&gt;
; But is it an OWASP Top N List?&lt;br /&gt;
: Again no, it's an ontology which currently contains 21 items but there may be more identified in the future. Also it is not an ordered list (like OWASP Top N lists) - the OAT identification numbers were randomly assigned, so the list is often written in alphabetical order to emphasize this.&lt;br /&gt;
&lt;br /&gt;
; I thought &amp;quot;so and so&amp;quot; already did that?&lt;br /&gt;
: We found that it did not exist. While many threats are mentioned in the sources researched, there was no overall list or definitions. We found the automated threat events tended to all be in a small number of definied items from Mitre CAPEC and WASC Threat Classification. If you know of other automated threat lists/taxonomies/ontologies, please share them.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;oat&amp;quot;?&lt;br /&gt;
: It is our abbreviation for OWASP Automated Threat (OAT).&lt;br /&gt;
&lt;br /&gt;
; I am confused and don't know which OAT my problem is - how do I identify it?&lt;br /&gt;
: In 2017 we created a [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] to help identify the correct OAT, which can then be confirmed by reading the full description in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook]. The short summaries are important explanations of each OAT name.&lt;br /&gt;
&lt;br /&gt;
; How can I help?&lt;br /&gt;
: Please join our mailing list, send ideas, contribute clarifications, corrections and improvement, and let other people know about the project and its handbook.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements and Sponsors =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
* Sumit Agarwal&lt;br /&gt;
* Jason Chan&lt;br /&gt;
* Mark Hall&lt;br /&gt;
* Omri Iluz&lt;br /&gt;
* Andrew van der Stock&lt;br /&gt;
* Roland Weber&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
Additionally other professional colleagues and website owners and operators who provided feedback.&lt;br /&gt;
&lt;br /&gt;
==Reviewers==&lt;br /&gt;
&lt;br /&gt;
* Igor Andriushchenko&lt;br /&gt;
* Gabriel Mendez Justiniano&lt;br /&gt;
* Matt Tesauro&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
All OWASP Projects are run and developed by volunteers and rely on personal donations and sponsorship to continue their development. OWASP does not endorse or recommend commercial products or services, allowing our community to remain vendor neutral with the collective wisdom of the best minds in software security worldwide. This project has received the sponsorship part of their Corporate OWASP membership fees from Verizon Digital Media Services in 2016 and Distil Networks in 2017, which has already contributed to the v1.2 production design costs, and will also be utilised to help promote knowledge of the project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[file:Verizon_Digital_Medial_Logo.jpg|size=150x45px|link=https://www.verizondigitalmedia.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Distil-flat-logo-2.png|link=https://www.distilnetworks.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Can you help? The project is looking for information on the prevalence and types of automated threats seen by web application owners in the real world. This will be used to refine and organise the information gathered from research papers, whitepapers, security reports and industry news. Please use the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/automated_threats_to_web_applications Mailing list]&lt;br /&gt;
&lt;br /&gt;
To share information confidentially, you can email the project leaders directly: [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:colin.watson@owasp.org Colin Watson].&lt;br /&gt;
&lt;br /&gt;
== Completed Outputs==&lt;br /&gt;
&lt;br /&gt;
* {{#switchtablink:Scope and Definitions|Glossary}}&lt;br /&gt;
* {{#switchtablink:Bibliography|Bibligraphy of information sources}}&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automated-threats.pdf summary chart] has been published summarising the information gathered and work to date&lt;br /&gt;
* Identifying automated threats to web applications, and determining the primary name used. This first part of the project intends to produce a consistent vocabulary for discussing the threats before moving onto other aspects&lt;br /&gt;
* The primary terms have now been defined and described for the ontology&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automation-briefing.pdf briefing document] was produced in May 2015&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Automated Threat Handbook] July 2015 [https://www.owasp.org/index.php/File:Owasp-automated-threat-handbook-source-files.zip source files], updated in November 2016&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automation-project-briefing.pdf project overview flyer]  July 2015&lt;br /&gt;
* Release  [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] December 2016&lt;br /&gt;
&lt;br /&gt;
== Roadmap==&lt;br /&gt;
&lt;br /&gt;
The project's roadmap was updated in October 2017.&lt;br /&gt;
&lt;br /&gt;
===Q1 2015===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Feb 2015: Define scope and terminology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Mar 2015: Research prior work and reports about automated threats to web applications to create bibliography&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q2 2015===&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Assess threats/attacks and create ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Application owner interviews and creation of initial project outputs, to refine model&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Publication of outputs and request for review/data&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Summit session and survey at AppSec EU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Write ontology document&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Write 2-page project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Publish project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul 2015: Publish v1.0 ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q3 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul-Sep 2016: Gathering of additional contributions and update handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q4 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Nov 2016: Release updated handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec 2016: Threat identification chart&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q1 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec-Mar 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check against changes to CAPEC v2.9&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q2 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Apr-Jun 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecEU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q3 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Chase up ongoing project review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecUS&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q4 2017 ===&lt;br /&gt;
* Release v1.2 (now due 15 Feb 2018)&lt;br /&gt;
&lt;br /&gt;
=== Q1 2018 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create OAT wiki pages&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Future ===&lt;br /&gt;
* Write executive summary&lt;br /&gt;
* Release executive summary document&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-SR-2]] [[Category:SAMM-TA-1]] [[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Oat-ontology-decision-chart.pdf&amp;diff=238102</id>
		<title>File:Oat-ontology-decision-chart.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Oat-ontology-decision-chart.pdf&amp;diff=238102"/>
				<updated>2018-02-26T12:12:05Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: Clerkendweller uploaded a new version of File:Oat-ontology-decision-chart.pdf&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP Automated Threats to Web Applications - Threat Event Identification Chart v1.0&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=238101</id>
		<title>OWASP Automated Threats to Web Applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=238101"/>
				<updated>2018-02-26T12:06:18Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: FAQs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Automated-threats-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Automated Threats to Web Applications==&lt;br /&gt;
&lt;br /&gt;
The OWASP Automated Threats to Web Applications Project has completed a review of reports, academic and other papers, news stories and vulnerability taxonomies/listings to identify, name and classify these scenarios – automated by software causing a divergence from accepted behavior producing one or more undesirable effects on a web application, but excluding tool-based exploitation of single-issue vulnerabilities. The initial objective was to produce an ontology providing a common language for developers, architects, operators, business owners, security engineers, purchasers and suppliers/ vendors, to facilitate clear communication and help tackle the issues.&lt;br /&gt;
The project also identifies symptoms, mitigations and controls in this problem area. Like all OWASP outputs, everything is free and published using an open source license.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Automation-project-briefing.pdf Two page summary project briefing as a PDF].&lt;br /&gt;
&lt;br /&gt;
== Description==&lt;br /&gt;
&lt;br /&gt;
Web applications are subjected to unwanted automated usage – day in, day out. Often these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is commonly mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the primary intent. Frequently these have sector-specific names. Most of these problems seen regularly by web application owners are not listed in any OWASP Top Ten or other top issue list. Furthermore, they are not enumerated or defined adequately in existing dictionaries. These factors have contributed to inadequate visibility, and an inconsistency in naming such threats, with a consequent lack of clarity in attempts to address the issues.&lt;br /&gt;
&lt;br /&gt;
Without sharing a common language between devops, architects, business owners, security engineers, purchasers and suppliers/vendors, everyone has to make extra effort to communicate clearly. Misunderstandings can be costly. The adverse impacts affect the privacy and security of individuals as well as the security of the applications and related system components.&lt;br /&gt;
&lt;br /&gt;
== Automated Threats ==&lt;br /&gt;
&lt;br /&gt;
The list of threat events, defined more fully in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-020 Account Aggregation]]&lt;br /&gt;
* [[OAT-019 Account Creation]]&lt;br /&gt;
* [[OAT-003 Ad Fraud]]&lt;br /&gt;
* [[OAT-009 CAPTCHA Defeat]]&lt;br /&gt;
* [[OAT-010 Card Cracking]]&lt;br /&gt;
* [[OAT-001 Carding]]&lt;br /&gt;
* [[OAT-012 Cashing Out]]&lt;br /&gt;
* [[OAT-007 Credential Cracking]]&lt;br /&gt;
* [[OAT-008 Credential Stuffing]]&lt;br /&gt;
* [[OAT-021 Denial of Inventory]]&lt;br /&gt;
* [[OAT-015  Denial of Service]]&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-006 Expediting]]&lt;br /&gt;
* [[OAT-004 Fingerprinting]]&lt;br /&gt;
* [[OAT-018 Footprinting]]&lt;br /&gt;
* [[OAT-005 Scalping]]&lt;br /&gt;
* [[OAT-011 Scraping]]&lt;br /&gt;
* [[OAT-016 Skewing]]&lt;br /&gt;
* [[OAT-013 Sniping]]&lt;br /&gt;
* [[OAT-017 Spamming]]&lt;br /&gt;
* [[OAT-002 Token Cracking]]&lt;br /&gt;
* [[OAT-014 Vulnerability Scanning]]&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
Not sure which is which? Use the [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] in conjunction with the full [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
All the materials are free to use. They are licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What Is This? ==&lt;br /&gt;
&lt;br /&gt;
Information and resources to help web application owners defend against [[:Category:Automated Threat|automated threats]]&lt;br /&gt;
&lt;br /&gt;
== What Isn't It? ==&lt;br /&gt;
&lt;br /&gt;
* Another vulnerability list&lt;br /&gt;
* An OWASP Top N List&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Attack trees&lt;br /&gt;
* Non web&lt;br /&gt;
* Non application&lt;br /&gt;
&lt;br /&gt;
==Project Objective==&lt;br /&gt;
&lt;br /&gt;
This project brings together research and analysis of real world automated attacks against web applications, to produce documentation to assist operators defend against these threats. Sector-specific guidance will be available.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Automatedthreats-presentation-small.jpg|link=media:Bots-AppSecUSA2017-Project-Summit.pptx]]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP WASC Web Hacking Incidents Database Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
* [[OWASP AppSensor Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP ModSecurity Core Rule Set Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Download the free handbook as a PDF]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [16 Feb 2018] OAT wiki pages created&lt;br /&gt;
* [15 Feb 2018] v1.2 Handbook published&lt;br /&gt;
* [25 Sep 2017] Promoted to Labs status&lt;br /&gt;
* [19-20 Sep 2017] Working session at the AppSecUSA 2017 Project Summit&lt;br /&gt;
* [15 May 2017] Draft feedback on Top Ten A7 shared&lt;br /&gt;
* [17 Apr 2017] [https://www.owasp.org/index.php/File:BadBots_OWASP_AppSec_CA_2017.pptx Slides] from AppSec California (2017)&lt;br /&gt;
* [20 Dec 2016] Threat identification chart [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf published]&lt;br /&gt;
* [03 Nov 2016] Presentation at [http://lascon.org/ LASCON 2016]&lt;br /&gt;
* [03 Nov 2016] v1.1 Handbook published&lt;br /&gt;
* [11-12 Oct 2016] Working session at the [https://docs.google.com/presentation/d/1iMQHTc-h5qcP7gBBRcPHGmVaTWqx3dpMwNMVlA--rqs/edit#slide=id.p3 AppSecUSA 2017 Project Summit]&lt;br /&gt;
* [04 Aug 2016] Project Q&amp;amp;A at Blackhat USA 2-5pm in the OWASP booth&lt;br /&gt;
* [26 Oct 2015] [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf v1.01 handbook] published&lt;br /&gt;
* [24 Sep 2015] [https://www.owasp.org/index.php/File:Colinwatson-a-new-ontology-of-unwanted-automation.pptx Presentation] at [https://2015.appsecusa.org/c/?page_id=896#a AppSec USA 2015]&lt;br /&gt;
&lt;br /&gt;
==In Print==&lt;br /&gt;
&lt;br /&gt;
[[File:AutomatedThreatHandbook_small.jpg|link=http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22932107.html]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22932107.html Automated Threat Handbook] can be purchased at cost as a print on demand book.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
    &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Scope and Definitions =&lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The aim was to create a listing of vendor-neutral and technology agnostic terms that describe real-world automated threats to web applications, at a level of abstraction that application owners can relate to. These terms are threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
The focus is on abuse of functionality - misuse of inherent functionality and related design flaws, some of which are also referred to as business logic flaws. There is almost no focus on implementation bugs. It is not that the latter are not the target for attacks, but there is much more knowledge published in that area with a greater agreement on terminology. All the scenarios identified must require the web to exist for the threat to be materialised. Many of the scenarios have impacts upon the organisation that owns or operates web applications, but some scenarios have impacts more focused on individuals or other bodies. An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
==Definitions ==&lt;br /&gt;
&lt;br /&gt;
=== Automated Threats to Web Applications ===&lt;br /&gt;
&lt;br /&gt;
Threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
== Glossary ==&lt;br /&gt;
&lt;br /&gt;
;Action&lt;br /&gt;
: An act taken against an asset by a threat agent. Requires first that contact occurs between the asset and threat agent (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Application&lt;br /&gt;
: Software that performs a business process i.e. not system software&lt;br /&gt;
: A software program hosted by an information system (Ref 2)&lt;br /&gt;
&lt;br /&gt;
; Application layer&lt;br /&gt;
: &amp;quot;Layer 7” in the OSI model (Ref 3) and “application layer” in the TCP/IP model (Ref 4)&lt;br /&gt;
&lt;br /&gt;
;Threat&lt;br /&gt;
: Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events, etc.); malicious actors; errors; failures (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Agent&lt;br /&gt;
: Any agent (e.g., object, substance, human, etc.) that is capable of acting against an asset in a manner that can result in harm (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Event&lt;br /&gt;
: Occurs when a threat agent acts against an asset (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Web&lt;br /&gt;
: The World Wide Web (WWW, or simply Web) is an information space in which the items of interest, referred to as resources, are identified by global identifiers called Uniform Resource Identifiers (URI) (Ref 5)&lt;br /&gt;
: The first three specifications for Web technologies defined URLs, HTTP, and HTML (Ref 6)&lt;br /&gt;
&lt;br /&gt;
; Web application&lt;br /&gt;
: An application delivered over the web&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Glossary references:&lt;br /&gt;
# [http://pubs.opengroup.org/onlinepubs/9699919899/toc.pdf Risk Taxonomy, Technical Standard, The Open Group, 2009]&lt;br /&gt;
# [http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf NISTIR 7298 rev 2, NIST]&lt;br /&gt;
# [http://en.wikipedia.org/wiki/OSI_model OSI model, Wikipedia] &lt;br /&gt;
# [http://en.wikipedia.org/wiki/Internet_protocol_suite TCP/IP model, Wikipedia]&lt;br /&gt;
# [http://www.w3.org/TR/webarch/ Architecture of the World Wide Web, Volume One, W3C]&lt;br /&gt;
# [http://www.w3.org/Help/ Help and FAQ, W3C]&lt;br /&gt;
&lt;br /&gt;
=Use Case Scanarios=&lt;br /&gt;
&lt;br /&gt;
The following scenarios and organisation names are completely fictitious.&lt;br /&gt;
&lt;br /&gt;
==Defining application development security requirements==&lt;br /&gt;
&lt;br /&gt;
Cinnaminta SpA intends to build and launch a new multi-lingual and multi-currency ecommerce website. The development will be outsourced and Cinnaminta has been working on the functional design document. Among many other requirements, the application security specification requires that the website must not include any vulnerabilities identified in PCI DSS v3.1 Requirement 6.5, nor any other vulnerabilities that could affect the protection of payment cardholder data. Cinnaminta specifies that the website's payment functions must not be susceptible to the threat events '''OAT-001 Carding''' or '''OAT-010 Card Cracking''' as defined in the '''OWASP Automated Threat Handbook'''. In addition, the application must interact with the company's existing fraud detection system to counter '''OAT-012 Cashing Out'''. The requirements are specified in terms of these threat events, rather than particular product or service categories. Development houses responding to the call for bids use the ontology to focus their answers to these aspects appropriately.&lt;br /&gt;
&lt;br /&gt;
== Sharing intelligence within a sector==&lt;br /&gt;
&lt;br /&gt;
Unlimited Innovations Inc develops and supports patient-facing software solutions to a range of healthcare providers, many of which participate in the National Health Service Cyber Intelligence Sharing Center (NHS-CISC). Unlimited Innovations already builds continuous monitoring capabilities into its software and decides to provide an optional enhancement so that customers could choose to share their misuse event data with each other, to benefit from the combined threat intelligence. Rather than sharing large quantities of low-level data, Unlimited Innovations aggregates information and broadcasts validated and categorised threat data amongst the participating organisations. Automation attacks are classified according to the threat events defined in the '''OWASP Automated Threat Handbook''' so that each receiving party understands the nature of the threat. Even organisations that do not want to take part in this information sharing can benefit, since their own categorised information is made available to internal business management in the form of an easy-to-comprehend monitoring dashboard. The information gathered can also be fed into their other business information management systems to help improve patient service.&lt;br /&gt;
&lt;br /&gt;
== Exchanging threat data between CERTs==&lt;br /&gt;
&lt;br /&gt;
National Computer Emergency Response Teams (CERTs) recognise that sharing of local information can contribute to worldwide prevention of cyber attacks. Despite advances in cooperation between CERTs, anything to increase continuity and interoperability, such as standards for data exchange, is encouraged. CERT Zog is concerned about the sparsity of application-specific data it receives, and also the classification of that data. It has a particular concern about attacks and breaches that affect sectors defined in Zog's 2015 national cyber security strategy. CERT Zog and its neighbour CERT Tarset agree to tag threat events using the '''OWASP Automated Threat Handbook''' in order to add greater context to existing solutions being used for threat data exchange between them. The programme also collects sector metadata, so that all organisations within these can benefit from the centralised intelligence.&lt;br /&gt;
&lt;br /&gt;
== Enhancing application penetration test findings==&lt;br /&gt;
&lt;br /&gt;
Specialist application security penetration testing firm Cherak Industries Pte Ltd works primarily for financial services companies in the banking and insurance sectors, and is looking to expand its business throughout Asia. Cherak has some innovative pen test result reporting systems which integrate with client software fault and vulnerability tracking systems, and it actively looks for methods to provide additional value to its clients. Cherak has identified that pen test clients would benefit from help to in understanding the effects of combinations of vulnerabilities, especially design flaws, and has decided to utilise the '''OWASP Automated Threat Handbook''' to define and explain the automation-related threats. The individual vulnerabilities were scored as normal using CVSSv2 and v3, the matching CWEs identified, and mitigations in place documented. In addition, Cherak uses the threat events defined in the '''OWASP Automated Threat Handbook''' to help create a new section in the executive summary that explains how combinations of the issues found could lead to automation threats and the possible technical and business impacts. For example, an assessment for one client had identified weaknesses in authentication so that there is a risk of '''OAT-008 Credential Stuffing'''. The defined identifier was provided to the client, so its technical staff could refer to additional information on the OWASP website.&lt;br /&gt;
&lt;br /&gt;
== Specifying service acquisition needs==&lt;br /&gt;
&lt;br /&gt;
Falstone Paradise Inc is concerned about malicious use of their portfolio of hotel and resort websites. The majority of the websites use a shared application platform, but there are some unique applications and a large number of other micro-sites, some of which use generic content management systems such as Wordpress and Drupal. Falstone Paradise has identified that its IT operations team are spending too much time dealing with the effects of automated misuse, such as cleaning up data, resetting customer accounts and providing extra capacity during attacks. Furthermore, the unwanted automation is also causing some instabilities leading to negative feedback from customers. Therefore Falstone Paradise decides to go out to the security marketplace to identify, assess and select products or services that might help address these automation issues for all its websites. Their buying team works with their information technology colleagues to write the detailed requirements in an Invitation to Tender (ITT) document. This describes the types of attacks its web applications are receiving, their frequency of occurrence and their magnitudes. These are defined according to the '''OWASP Automated Threat Handbook''', so that vendors do not misunderstand the requirements, and each vendor's offering can be assessed against the particular automation threat events of concern.&lt;br /&gt;
&lt;br /&gt;
== Characterising vendor services ==&lt;br /&gt;
&lt;br /&gt;
Better Best Ltd has developed an innovative technology to help gaming companies defend against a range of automated threats that can otherwise permit cheating and distortion of the game, leading to disruption for normal players. The solution can be deployed on premises, but is also available in the cloud as a service. But Better Best is finding difficulty explaining its solution in the market place, especially since it does not fit into any conventional product category. Better Best decide to use the terminology and threat events listed in the '''OWASP Automated Threat Handbook''' to define their product's capabilities. They hope this will provide some clarity about their offering, and also demonstrate how their product can be used to replace more than one other conventional security device. Additionally, Better Best writes a white paper describing how their product has been successfully used by one of their reference customers Hollybush Challenge Games to protect against '''OAT-006 Expediting''', '''OAT-005 Scalping''', '''OAT-016 Skewing''' and '''OAT-013 Sniping'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Ontology=&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The A-Z list of [[:Category:Automated Threat|automated threat events]] and summary descriptions, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-020 Account Aggregation]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Use by an intermediary application that collects together multiple accounts and interacts on their behalf.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-019 Account Creation]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Create multiple accounts for subsequent misuse.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-003 Ad Fraud]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
False clicks and fraudulent display of web-placed advertisements.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-009 CAPTCHA Defeat]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Solve anti-automation tests.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-010 Card Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify missing start/expiry dates and security codes for stolen payment card data by trying different values.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-001 Carding]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Multiple payment authorisation attempts used to verify the validity of bulk stolen payment card data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-012 Cashing Out]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Buy goods or obtain cash utilising validated stolen payment card or other user account data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-007 Credential Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify valid login credentials by trying different values for usernames and/or passwords.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-008 Credential Stuffing]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass log in attempts used to verify the validity of stolen username/password pairs.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-021 Denial of Inventory]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Deplete goods or services stock without ever completing the purchase or committing to the transaction.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-015  Denial of Service]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Target resources of the application and database servers, or individual user accounts, to achieve denial of service (DoS).&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-006 Expediting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Perform actions to hasten progress of usually slow, tedious or time-consuming actions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-004 Fingerprinting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Elicit information about the supporting software and framework types and versions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-018 Footprinting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Probe and explore application to identify its constituents and properties.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-005 Scalping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Obtain limited-availability and/or preferred goods/services by unfair methods.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-011 Scraping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Collect application content and/or other data for use elsewhere.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-016 Skewing]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Repeated link clicks, page requests or form submissions intended to alter some metric.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-013 Sniping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Last minute bid or offer for goods or services.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-017 Spamming]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Malicious or questionable information addition that appears in public or private content, databases or user messages.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-002 Token Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass enumeration of coupon numbers, voucher codes, discount tokens, etc.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-014 Vulnerability Scanning]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Crawl and fuzz application to identify weaknesses and possible vulnerabilities.&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Comparison with other dictionaries, taxonomies and lists==&lt;br /&gt;
&lt;br /&gt;
===[https://capec.mitre.org/ Common Attack Pattern Enumeration and Classification] (CAPEC)===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-capec-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
CAPEC is a dictionary and classification taxonomy of known attacks on software. Its primary classification structures are:&lt;br /&gt;
&lt;br /&gt;
* [https://capec.mitre.org/data/definitions/3000.html Domains of attack] (3000) - Social Engineering (403), [https://capec.mitre.org/data/definitions/437.html Supply Chain] (437), Communications (512), [https://capec.mitre.org/data/definitions/513.html Software] (513), Physical Security (514), Hardware (515)&lt;br /&gt;
* Mechanism of Attack (1000) - Gather Information (118), Deplete Resources (119), Injection (152), Deceptive Interactions (156), Manipulate Timing and State (172), Abuse of Functionality (210), Probabilistic Techniques (223), Exploitation of Authentication (225), Exploitation of Authorization (232), Manipulate Data Structures (255), Manipulate Resources (262), Analyze Target (281), Gain Physical Access (436), Malicious Code Execution (525), Alter System Components (526), Manipulate System Users (527)&lt;br /&gt;
&lt;br /&gt;
===[http://projects.webappsec.org/w/page/13246978/Threat%20Classification WASC Threat Classification]===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-wasc-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
The WASC Threat Classification classifies weaknesses and attacks that can lead to the compromise of a website, its data, or its users.&lt;br /&gt;
&lt;br /&gt;
===[[OWASP WASC Web Hacking Incidents Database Project]] (WHID)===&lt;br /&gt;
&lt;br /&gt;
WHID [https://www.google.com/fusiontables/DataSource?snapid=S1536501YnLo classifies] publicly known incidents using:&lt;br /&gt;
&lt;br /&gt;
* attack methods e.g. ARP spoofing, abuse of functionality, account compromise, administration error, automation, backdoor, banking trojan, brute force, clickjacking, code injection, content injection, content spoofing, credential/session prediction, cross site request forgery (CSRF), cross-site scripting (XSS), denial of service, directory traversal, domain hijacking, DNS hijacking, forceful browsing, HTTP response splitting, hidden parameter manipulation, hosting malicious code, information leakage, insufficient authentication, known vulnerability, local file inclusion (LFI), malvertising, malware, malware injection, mass assignment, misconfiguration, OS commanding, parameter manipulation, path traversal, phishing, predictable resource location, process automation, redirection, remote file inclusion (RFI), rogue 3rd party app, scaping, search engine poisoning, shell injection, social engineering, stolen credentials, SQL injection, unintentional information disclosure, weak password recovery validation, worm&lt;br /&gt;
* weakness e.g. abuse of functionality, application misconfiguration, directory indexing, improper filesystem permissions, improper input handling, improper output handling, information leakage, insecure indexing, insufficient anti-automation, insufficient authentication, insufficient authorization, insufficient entropy, insufficient password recovery, insufficient process validation, insufficient session expiration, insufficient transport layer protection, misconfiguration, predictable resource location, weak password&lt;br /&gt;
* outcome account hijacking, account takeover, botnet participation, chaos, credit card leakage, data loss, defacement, DDoS attacks, DNS hijacking, DNS redirection, disinformation, disclosure only, downtime, extortion, fraud, information warfare, leakage of information, link spam, loss of sales, malware distribution,  monetary loss, phishing, planting of malware, service disruption, session hijacking, spam, spam links, stolen credentials, worm&lt;br /&gt;
&lt;br /&gt;
Plus other/various/unknown.&lt;br /&gt;
&lt;br /&gt;
= Bibliography =&lt;br /&gt;
&lt;br /&gt;
The following academic, open source, commercial and news sources were used in the research on automated threats to web applications. OWASP is a worldwide not-for-profit charitable organization focused on improving the security of software.  We operate under a vendor neutral policy and we do not endorse products or services.&lt;br /&gt;
&lt;br /&gt;
* 10 years of Application Security, Denyall http://www.denyall.com/resources/whitepapers/?aliId=3438442&lt;br /&gt;
*	2012 Payment Card Threat Report	 https://www.securitymetrics.com/static/resources/orange/2012%20Payment%20Card%20Threat%20Report%20copy.pdf				&lt;br /&gt;
*	2014 Bot Traffic Report: Just the Droids You were Looking for	 http://www.incapsula.com/blog/bot-traffic-report-2014.html				&lt;br /&gt;
*	3 Types of ‘Return Fraud’ to Monitor this Holiday Season	 http://www.practicalecommerce.com/articles/3168-3-Types-of-%E2%80%98Return-Fraud-to-Monitor-this-Holiday-Season	&lt;br /&gt;
* 7 Ways Bots Hurt Your Website, Distil Networks http://www.distilnetworks.com/7-ways-bots-hurt-website-whitepaper/						&lt;br /&gt;
*	Abusing HTML 5 Structured Client-side Storage	2008	 http://packetstorm.wowhacker.com/papers/general/html5whitepaper.pdf		&lt;br /&gt;
* Acquiring Experience with Ontology and Vocabularies, Walt Melo, Risa Mayan and Jean Stanford, 2011  http://www.omg.org/news/meetings/workshops/SOA-HC/presentations-2011/13_SC-6_Melo_Stanford_Mayan.pdf	&lt;br /&gt;
*	An Anatomy of a SQL Injection Attack	 Hacker Intelligence Initiative	 Imperva	 	 http://www.imperva.com/docs/HII_An_Anatomy_of_a_SQL_Injection_Attack_SQLi.pdf	&lt;br /&gt;
*	The Anatomy of Clickbot.A	 https://www.usenix.org/legacy/event/hotbots07/tech/full_papers/daswani/daswani.pdf				&lt;br /&gt;
*	Anatomy of comment spam	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Anatomy_of_Comment_Spam.pdf		&lt;br /&gt;
*	Anti-Automation Monitoring and Prevention	2015	 https://www.clerkendweller.uk/2015/1/29/AntiAutomation-Monitoring-and-Prevention			&lt;br /&gt;
*	Anti-DDoS Solution for Internet Corporation	 http://www.nsfocus.com/uploadfile/Solution/NSFOCUS%20Anti-DDoS%20Solution%20for%20Internet%20Corporation.pdf				&lt;br /&gt;
*	Anti-Fraud Principles and Proposed Taxonomy	 Sep 2014	 http://www.iab.net/media/file/IAB_Anti_Fraud_Principles_and_Taxonomy.pdf			&lt;br /&gt;
*	Apache Security	 Ivan Ristic	 			&lt;br /&gt;
* Application Security Desk Reference, OWASP https://www.owasp.org/index.php/Category:OWASP_ASDR_Project&lt;br /&gt;
* Application Security Guide For CISOs, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf&lt;br /&gt;
* AppSensor, OWASP https://www.owasp.org/index.php/OWASP_AppSensor_Project&lt;br /&gt;
*	Attack &amp;amp; Defense Labs	 http://www.andlabs.org/html5.html				&lt;br /&gt;
*	Attack categories	 OWASP	 https://www.owasp.org/index.php/Category:Attack	&lt;br /&gt;
* Attack Trees, Schneier, Dr. Dobb's Journal, December 1999 https://www.schneier.com/paper-attacktrees-ddj-ft.html		&lt;br /&gt;
*	Attacking with HTML5	2010	 https://media.blackhat.com/bh-ad-10/Kuppan/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-wp.pdf			&lt;br /&gt;
*	Automated attacks	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Automation_of_Attacks.pdf		&lt;br /&gt;
*	Avoiding the Top 10 Software Security Design Flaws	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf				&lt;br /&gt;
*	Bad Bots On The Rise	 Dec 2014	 http://www.darkreading.com/informationweek-home/bad-bots-on-the-rise/d/d-id/1318276	&lt;br /&gt;
* Banking Botnets Persist Despite Takedowns, Dell SecureWorks, 2015 http://www.secureworks.com/cyber-threat-intelligence/threats/banking-botnets-persist-despite-takedowns/	&lt;br /&gt;
*	The Barracuda Web Application Firewall: XML Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_XML_Firewall.pdf	&lt;br /&gt;
*	Blocking Brute Force Attacks	 http://www.cs.virginia.edu/~csadmin/gen_support/brute_force.php				&lt;br /&gt;
*	Bot Traffic Growing Problem for Digital	 Oct 2014	 http://www.netnewscheck.com/article/36537/bot-traffic-growing-problem-for-digital			&lt;br /&gt;
*	BotoPedia	 Incapsula	 http://www.botopedia.org/			&lt;br /&gt;
*	Boy in the Browser	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/Boy_in_the_Browser	&lt;br /&gt;
* Business Logic Attacks - Bots and BATs, Eldad Chai, 2009 http://www.owasp.org/images/9/96/AppSecEU09_BusinessLogicAttacks_EldadChai.ppt		&lt;br /&gt;
*	Bypassing Client Application Protection Techniques	 http://www.securiteam.com/securityreviews/6S0030ABPE.html&lt;br /&gt;
*	A CAPTCHA in the Rye	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_a_CAPTCHA_in_the_Rye.pdf					&lt;br /&gt;
*	Characterizing Large Scale Click fraud	 http://cseweb.ucsd.edu/~voelker/pubs/za-ccs14.pdf	&lt;br /&gt;
* Charter Addition Proposal: &amp;quot;Trusted Code&amp;quot; for the Web https://lists.w3.org/Archives/Public/public-webappsec/2015Mar/0150.html&lt;br /&gt;
*	A cheesy Apache / IIS DoS vuln (+a question) 	 http://www.securityfocus.com/archive/1/456339/30/0/threaded	&lt;br /&gt;
* China's Man-on-the-Side Attack on GitHub http://www.netresec.com/?page=Blog&amp;amp;month=2015-03&amp;amp;post=China%27s-Man-on-the-Side-Attack-on-GitHub&lt;br /&gt;
* The CISO Survey and Report, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-report-2013-1.0.pdf&lt;br /&gt;
* Common Attack Pattern Enumeration and Classification (CAPEC), Mitre https://capec.mitre.org/			&lt;br /&gt;
*	Common Cyber Attacks: Reducing the Impact	 CERT-UK	 https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/400106/Common_Cyber_Attacks-Reducing_The_Impact.pdf			&lt;br /&gt;
*	Corporate espionage – the internet’s new growth industry	 http://www.itproportal.com/2015/03/19/corporate-espionage-internets-new-growth-industry/				&lt;br /&gt;
*	CSA Top Threats to Cloud Computing	 https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf				&lt;br /&gt;
*	CSRF vulnerability in GMail service	 http://seclists.org/fulldisclosure/2009/Mar/29		&lt;br /&gt;
* CWE/SANS Top 25 Most Dangerous Software Errors, 2011 http://cwe.mitre.org/top25/		&lt;br /&gt;
*	Cyber Fraud - Tactics	 Techniques and Procedures	 http://www.crcpress.com/product/isbn/9781420091274			&lt;br /&gt;
* Cybercrime Report: Q1 2015, ThreatMetrix, 2015 http://info.threatmetrix.com/WP-2015Q1CybercrimeReport_WP-LP.html&lt;br /&gt;
*	Data Breach Investigations Report (DBIR), 2014	 http://www.verizonenterprise.com/DBIR/2014/				&lt;br /&gt;
* Data Breach Investigations Report (DBIR), 2015 http://www.verizonenterprise.com/DBIR/2015/&lt;br /&gt;
*	Data Breaches Fuel Login Attacks	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2014-state-of-the-internet-threat-advisory-public-data-breaches-fuel-login-attacks.pdf		&lt;br /&gt;
*	Data Scraping	 Wikipedia	 http://en.wikipedia.org/wiki/Data_scraping			&lt;br /&gt;
*	DDoS Quick Guide	 https://www.us-cert.gov/sites/default/files/publications/DDoS%20Quick%20Guide.pdf	&lt;br /&gt;
* DDoS Threat Landscape Report, 2013-2014 http://lp.incapsula.com/rs/incapsulainc/images/2013-14_ddos_threat_landscape.pdf	&lt;br /&gt;
* Defending Against an Internet-based Attack on the Physical World http://avirubin.com/scripted.attacks.pdf		&lt;br /&gt;
*	Defending Against Application-Based DDoS Attacks with the Barracuda Web Application Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_Defending%20_Against_%20Application-Based_%20DDoS_%20Attacks.pdf				&lt;br /&gt;
*	Demystifying HTML 5 Attacks	 http://resources.infosecinstitute.com/demystifying-html-5-attacks/				&lt;br /&gt;
*	Denial of Service Attacks: A Comprehensive Guide to Trends	 Techniques	 and Technologies	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Denial_of_Service_Attacks-Trends_Techniques_and_Technologies.pdf&lt;br /&gt;
*	Detecting and Blocking Site Scraping Attacks	 Imperva	 http://www.imperva.com/docs/WP_Detecting_and_Blocking_Site_Scraping_Attacks.pdf			&lt;br /&gt;
*	Detecting Automation of Twitter Accounts: Are you a human	 cyborg	 or a bot?	 http://www.cs.wm.edu/~hnw/paper/tdsc12b.pdf		&lt;br /&gt;
*	Detecting Malice	 Robert &amp;quot;RSnake&amp;quot; Hansen	2009	 http://www.detectmalice.com/		&lt;br /&gt;
*	Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) 	 http://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1414072277428&amp;amp;uri=CELEX:32002L0058				&lt;br /&gt;
*	Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data 	 http://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:31995L0046				&lt;br /&gt;
*	Distributed Denial-of-Service (DDoS) Cyber-Attacks	 Risk Mitigation	 and Additional Resources	 Federal Financial Institutions Examination Council	 http://www.ffiec.gov/press/PDF/FFIEC%20DDoS%20Joint%20Statement.pdf	&lt;br /&gt;
*	Do Evil - The Business of Social Media Bots	 Forbes	 http://www.forbes.com/sites/lutzfinger/2015/02/17/do-evil-the-business-of-social-media-bots/			&lt;br /&gt;
*	DoS and DDoS Glossary of Terms	 prolexic	 http://www.prolexic.com/knowledge-center-dos-and-ddos-glossary.html#layer-7-ddos-attack			&lt;br /&gt;
*	E-commerce Malware	 Trustwave	 https://gsr.trustwave.com/topics/placeholder-topic/e-commerce-malware/	&lt;br /&gt;
* Exploiting Software, G. Hoglund and G. McGraw, Addison-Wesley, 2004&lt;br /&gt;
* Five Trends to Track in E-Commerce Fraud, ThreatMetrix, 2013 http://info.threatmetrix.com/rs/threatmetrix/images/Five_Trends_eCommerce_Fraud_WP.pdf&lt;br /&gt;
* Hacker builds cheatbot for hit app Trivia Crack http://www.theregister.co.uk/2015/03/26/hacker_builds_trivia_crack_cheat_app/	&lt;br /&gt;
* Has Walmart opened itself up to “Denial of inventory” attacks?  https://arstechnica.com/business/2012/05/has-walmart-opened-itself-up-to-denial-of-inventory-attacks/	&lt;br /&gt;
* How Hoarder Bots Steal sales from Online Retailers https://www.internetretailer.com/mobile/2016/12/16/how-hoarder-bots-steal-sales-online-retailers&lt;br /&gt;
*	How to Defend Against DDoS Attacks - Strategies for the Network	 Transport	 and Application Layers	 Prolexic	 http://www.prolexic.com/kcresources/white-paper/strategies-for-the-network-transport-and-application-layers-412/Strategies_for_the_Network_Transport_and_Application_Layers_Prolexic_White_Paper_A4_082412.pdf	&lt;br /&gt;
* How to Defend Online Travel Websites in the Era of Site Scraping, Distil Networks http://www.distilnetworks.com/defend-online-travel-websites-era-site-scraping-download/&lt;br /&gt;
*	How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores	 http://research.microsoft.com/pubs/145858/caas-oakland-final.pdf				&lt;br /&gt;
*	HTML5 Overview	 A look at HTML5 Attack Scenarios	 Trend Micro	2011	 http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt_html5-attack-scenarios.pdf	&lt;br /&gt;
*	HTML5 Top 10 Threats Stealth Attacks and Silent Exploits	2012	 https://media.blackhat.com/bh-eu-12/shah/bh-eu-12-Shah_HTML5_Top_10-WP.pdf			&lt;br /&gt;
*	HTML5 web security	2011	 http://media.hacking-lab.com/hlnews/HTML5_Web_Security_v1.0.pdf			&lt;br /&gt;
*	HTTPPOST - Slow POST	 Wong Onn Chee	 OWASP AppSec DC 2010	 https://www.owasp.org/images/4/43/Layer_7_DDOS.pdf	&lt;br /&gt;
* If you've got @British_Airways account may make sense to change your password. Just had all my Avios cleared out! https://twitter.com/suttonnick/status/581556027948195840/photo/1	&lt;br /&gt;
* Internet Security Threat Report, Volume 19, 2014 http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf&lt;br /&gt;
*	An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks	 http://www.springer.com/gb/book/9788132202769	&lt;br /&gt;
*	Is Your Data Center Ready for Today’s DDoS Threats? DDoS attack types	 protection methods and testing your detection and mitigation defenses	 http://www.fortinet.com/sites/default/files/whitepapers/WP-DDoS-Testing.pdf			&lt;br /&gt;
*	Joomla Reflection DDoS-for-Hire	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2015-state-of-the-internet-threat-advisory-joomla-reflection-attack-ddos-for-hire.pdf		&lt;br /&gt;
*	Layer 7 DDOS – Blocking HTTP Flood Attacks	 http://blog.sucuri.net/2014/02/layer-7-ddos-blocking-http-flood-attacks.html				&lt;br /&gt;
*	Lenovo	 Superfish put smut on my system' – class-action lawsuit	 The Register	 http://www.theregister.co.uk/2015/02/23/lenovo_superfish_class_action_lawsuit/		&lt;br /&gt;
* List of Attack Vectors   Relative Vulnerability Rating TECAPI http://www.tecapi.com/public/relative-vulnerability-rating-gui.jsp#&lt;br /&gt;
*	Man in the Browser	 http://scisweb.ulster.ac.uk/~kevin/IJACI-Vol4No1-maninbrowser.pdf				&lt;br /&gt;
*	Man in the Browser Attack	 https://www.owasp.org/index.php/Man-in-the-browser_attack&lt;br /&gt;
* Mapping and Measuring Cybercrime, Oxford Internet Institute http://www.oii.ox.ac.uk/publications/FD18.pdf				&lt;br /&gt;
*	Massive Changes in the Criminal Landscape	 Europol	2015	 https://www.europol.europa.eu/content/massive-changes-criminal-landscape	&lt;br /&gt;
* Matching Attack Patterns to Security Vulnerabilities in Software-Intensive System Designs http://collaboration.csc.ncsu.edu/laurie/Papers/ICSE_Final_MCG_LW.pdf	&lt;br /&gt;
*	Mitigating DDoS Attacks with F5 Technology	 F5	 https://f5.com/resources/white-papers/mitigating-ddos-attacks-with-f5-technology			&lt;br /&gt;
* Mitigating the DoS/DDosS Threat, Radware, 2012 http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452061&lt;br /&gt;
* Modern Web Attacks, Sophos, 2007 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/modern-web-attacks.aspx&lt;br /&gt;
*	ModSecurity Advanced Topic of the Week: Mitigating Slow HTTP DoS Attacks	 https://www.trustwave.com/Resources/SpiderLabs-Blog/(Updated)-ModSecurity-Advanced-Topic-of-the-Week--Mitigating-Slow-HTTP-DoS-Attacks/	&lt;br /&gt;
* Most common attacks on web applications https://ipsec.pl/web-application-security/most-common-attacks-web-applications.html			&lt;br /&gt;
* Multi-dimensional Vulnerability Hierarchies Daniel Miessler  https://danielmiessler.com/study/multi-dimensional-vulnerability-hierarchies/&lt;br /&gt;
*	New Wave of DDoS Attacks Launched	 BankInfoSecurity.com	 Mar 2013	 http://www.bankinfosecurity.com/new-wave-ddos-attacks-launched-a-5584/op-1		&lt;br /&gt;
*	NOMAD: Toward Non-Invasive Moving Target Defense Against Web Bots	 http://faculty.cs.tamu.edu/guofei/paper/NOMAD_CNS13.pdf				&lt;br /&gt;
*	Online Ad Fraud Exposed: Advertisers Losing $6.3 Billion To $10 Billion Per Year	 Sep 2014	 http://www.darkreading.com/analytics/threat-intelligence/online-ad-fraud-exposed-advertisers-losing-$63-billion-to-$10-billion-per-year/d/d-id/1317979			&lt;br /&gt;
* Online Data Companies versus Bots: The Fight is on for Control of Online Data, Distil Networks http://www.distilnetworks.com/online-data-companies-vs-bots-download/&lt;br /&gt;
*	Optimal Airline Ticket Purchasing Using Automated User-Guided Feature Selection	 http://ijcai.org/papers13/Papers/IJCAI13-032.pdf				&lt;br /&gt;
*	Payment Checkout Flaws and Bugs	2014	 https://www.clerkendweller.uk/2014/11/4/Payment-Checkout-Flaws-and-Bugs			&lt;br /&gt;
*	PCI Compliance Report 2015	 Verizon	 http://www.verizonenterprise.com/pcireport/2015/			&lt;br /&gt;
*	Pixel Perfect Timing Attacks with HTML5	2013	 http://www.contextis.com/services/research/white-papers/pixel-perfect-timing-attacks-html5/			&lt;br /&gt;
*	Polymorphism as a Defense for Automated Attack of Websites	 http://link.springer.com/chapter/10.1007%2F978-3-319-07536-5_30				&lt;br /&gt;
*	Preventing Web Scraping: Best Practice 	 https://creativedigitalideas.files.wordpress.com/2014/11/best-practice-to-prevent-web-scraping.pdf				&lt;br /&gt;
*	Profile: Automated Credit Card Fraud	 http://old.honeynet.org/papers/profiles/cc-fraud.pdf				&lt;br /&gt;
* Protecting Against Web Floods, Radware http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452968&lt;br /&gt;
*	Q4 2014 State of the Internet Security Report	 prolexic	 http://www.stateoftheinternet.com/downloads/pdfs/2014-internet-security-report-q4.pdf			&lt;br /&gt;
*	Reflection injection	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf		&lt;br /&gt;
* A Report on taxonomy and evaluation of existing inventories, ENISAhttp://ecrime-project.eu/wp-content/uploads/2015/02/E-Crime-Deliverable-2-1-20141128_FINAL.pdf			&lt;br /&gt;
* Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft, Dept of Justice http://www.justice.gov/criminal/cybercrime/docs/ip-victim-guide-and-checklist-march-2013.pdf&lt;br /&gt;
*	SANS Top 20 Critical Controls	 https://www.sans.org/critical-security-controls/		&lt;br /&gt;
* Securing Websites, Sophos, 2011 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/securing-websites.aspx		&lt;br /&gt;
*	Security Insights: Defending Against Automated Threats	 http://www.securityweek.com/security-insights-defending-against-automated-threats				&lt;br /&gt;
*	Server side DDoS	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/DDOS_Attack_Method_Payload_05182010			&lt;br /&gt;
*	Slow Read Denial of Service attack	 https://code.google.com/p/slowhttptest/wiki/SlowReadTest				&lt;br /&gt;
*	Slow-Read DoS Attack	 https://www.trustwave.com/Resources/SpiderLabs-Blog/ModSecurity-Advanced-Topic-of-the-Week--Mitigation-of--Slow-Read--Denial-of-Service-Attack/				&lt;br /&gt;
*	Slowloris HTTP DoS	 http://ha.ckers.org/slowloris/	 	&lt;br /&gt;
* So what are the &amp;quot;most critical&amp;quot; application flaws? On new OWASP Top 10 https://ipsec.pl/application-security/2013/so-what-are-most-critical-application-flaws-new-owasp-top-10.html		&lt;br /&gt;
*	Social Media Bots Offer Phony Friends and Real Profit	 NY Times	 http://www.nytimes.com/2014/11/20/fashion/social-media-bots-offer-phony-friends-and-real-profit.html?_r=1			&lt;br /&gt;
* Software Vulnerability Analysis, Krsul, 1998 http://www.krsul.org/ivan/articles/main.pdf&lt;br /&gt;
*	Sophos Security Threat Report	 http://blogs.sophos.com/2014/12/11/our-top-10-predictions-for-security-threats-in-2015-and-beyond/&lt;br /&gt;
* SpoofedMe Social Login Attack Discovered by IBM X-Force Researchers http://securityintelligence.com/spoofedme-social-login-attack-discovered-by-ibm-x-force-researchers/#.VSuiEhPSngM				&lt;br /&gt;
* State of Software Security Report, Volume 5, Veracode, 2013 https://info.veracode.com/state-of-software-security-report-volume5.html&lt;br /&gt;
*	Stopping Automated Attack Tools	 http://www.technicalinfo.net/papers/StoppingAutomatedAttackTools.html&lt;br /&gt;
* Taxonomy on Online Game Security http://www.math.snu.ac.kr/~jhcheon/publications/2004/Taxonomy%20on%20online%20game%20security_EL.pdf	&lt;br /&gt;
* A Taxonomy of Computer Program Security Flaws, with Examples, Landwehr https://cwe.mitre.org/documents/sources/ATaxonomyofComputerProgramSecurityFlawswithExamples%5BLandwehr93%5D.pdf&lt;br /&gt;
* A Taxonomy of Security Faults in the UNIX Operating System, Aslam, 1995 https://cwe.mitre.org/documents/sources/ATaxonomyofSecurityFaultsintheUNIXOperatingSystem%5BAslam95%5D.pdf		&lt;br /&gt;
* Testing Guide, v4, OWASP, 2014 https://www.owasp.org/images/5/52/OWASP_Testing_Guide_v4.pdf								&lt;br /&gt;
*	The Bot Baseline: Fraud in Digital Advertising	 https://s3.amazonaws.com/whiteops-public/WO-ANA-Baseline-Study-of-Bot-Fraud.pdf							&lt;br /&gt;
*	The Internet Organised Crime Threat Assessment (iOCTA) 2014	 https://www.europol.europa.eu/content/internet-organised-crime-threat-assesment-iocta				&lt;br /&gt;
*	The Notorious Nine	 Cloud Computing Top Threats in 2013	 CSA	 https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf	&lt;br /&gt;
* The Risks of Content Management Systems, IBM, 2015 https://portal.sec.ibm.com/mss/html/en_US/support_resources/pdf/CMS_Threats_MSS_Threat_Report.pdf	&lt;br /&gt;
* The Spy in the Sandbox – Practical Cache Attacks in Javascript http://iss.oy.ne.ro/SpyInTheSandbox.pdf						&lt;br /&gt;
* Thousands of Hacked Uber Accounts Selling on Dark Web for $1 http://thehackernews.com/2015/03/thousands-of-hacked-uber-accounts_30.html?m=1&lt;br /&gt;
* Threat Intelligence Quarterly, IBM, 1Q 2015 https://www.ibm.com/services/forms/signup.do?source=swg-WW_Security_Organic&amp;amp;S_PKG=ov33510&amp;amp;S_TACT=C327017W&amp;amp;dynform=18101&lt;br /&gt;
* Threat Modeling: Designing for Security, Adam Shostack, Wiley, April 2014 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118809998.html&lt;br /&gt;
*	Threats and Mitigations: A Guide to Multi-Layered Web Security - eBook	 Prolexic	 	 http://www.prolexic.com/knowledge-center/prolexic-download/guide-multi-layered-web-security-ebook.pdf		&lt;br /&gt;
* Trapping Unknown Malware in a Context Web, Sophos http://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/HuqSzabo-VB2013.pdf?la=en.pdf&lt;br /&gt;
*	Trustwave Global Security Report	2014	 https://www2.trustwave.com/GSR2014.html?utm_source=redirect&amp;amp;utm_medium=web&amp;amp;utm_campaign=GSR2014			&lt;br /&gt;
*	TurboTax’s Anti-Fraud Efforts Under Scrutiny	 http://krebsonsecurity.com/2015/02/turbotaxs-anti-fraud-efforts-under-scrutiny/				&lt;br /&gt;
*	Two Security Vulnerabilities in the Spring Framework’s MVC pdf (from 2008)	 http://blog.diniscruz.com/2011/07/two-security-vulnerabilities-in-spring.html&lt;br /&gt;
*	The Underground Economy of Spam: A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns	 http://static.usenix.org/events/leet11/tech/full_papers/Stone-Gross.pdf					&lt;br /&gt;
*	Understanding Web Bots and How They Hurt Your Business	 Encapsula	 http://www.slideshare.net/Incapsula/understanding-web-bots-and-how-they-hurt-your-business		&lt;br /&gt;
* Use of A Taxonomy of Security Faults, Taimur Aslam, Ivan Krsul and Eugene H Spafford, 1996  http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=2304&amp;amp;context=cstech&lt;br /&gt;
*	The WASC Threat Classification v2.0	 http://projects.webappsec.org/w/page/13246978/Threat%20Classification	&lt;br /&gt;
* Warhol Worms: The Potential for Very Fast Internet Plagues http://www.iwar.org.uk/comsec/resources/worms/warhol-worm.htm	&lt;br /&gt;
*	Web Application Attack Report #5	 Imperva	 http://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed5.pdf	&lt;br /&gt;
* Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Ryan Barnett, Wiley, December 2012 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118362187.html		&lt;br /&gt;
*	Web Attacks in the Wild	 Corsaire	 https://www.owasp.org/images/a/a7/Web_attacks_in_the_wild_-_ap.pdf			&lt;br /&gt;
*	Web Automation	 Friend or Foe?	 https://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf			&lt;br /&gt;
*	Web Spambot Detection Based on Web Navigation Behaviour 	 http://pedramhayati.com/papers/Web_Spambot_Detection_Based_on_Web_Usage_Behaviour.pdf		&lt;br /&gt;
* Website Security Statistics Report, 2014 http://info.whitehatsec.com/rs/whitehatsecurity/images/statsreport2014-20140410.pdf		&lt;br /&gt;
*	What is Zeus?	 http://www.sophos.com/medialibrary/pdfs/technical%20papers/sophos%20what%20is%20zeus%20tp.pdf				&lt;br /&gt;
*	When Web 2.0 Attacks! Understanding Ajax	 Flash and other highly interactive web technologies…	 https://www.owasp.org/images/f/fc/When_Web_2.0_Attacks_-_Understanding_Security_Implications_of_Highly_Interactive_Technologies-Rafal_Los.pdf			&lt;br /&gt;
*	Where have all of our Passwords Gone?	 Gartner	2015	 http://blogs.gartner.com/avivah-litan/2015/01/22/where-have-all-our-passwords-gone/		&lt;br /&gt;
*	WS-Attacks.org	 http://www.ws-attacks.org/index.php/Main_Page&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; What do you mean by &amp;quot;web&amp;quot;, &amp;quot;application&amp;quot; and &amp;quot;automated threat&amp;quot;?&lt;br /&gt;
: See the definitions in the project's {{#switchtablink:Project Scope and Definitions|glossary}}.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;ontology&amp;quot;?&lt;br /&gt;
: An ontology is a set of types, properties, and relationship. These together define a subject description language. This particular ontology is meant to represent what automated threats real world owners observe affecting their web applications in usual operations.&lt;br /&gt;
&lt;br /&gt;
; Isn't this another bug (vulnerability) list?&lt;br /&gt;
: No, none of the named automated threat events are implementation bugs - they relate to abuse of functionality using automated means.&lt;br /&gt;
&lt;br /&gt;
; But is it an OWASP Top N List?&lt;br /&gt;
: Again no, it's an ontology which currently contains 21 items but there may be more identified in the future. Also it is not an ordered list (like OWASP Top N lists) - the OAT identification numbers were randomly assigned, so the list is often written in alphabetical order to emphasize this.&lt;br /&gt;
&lt;br /&gt;
; I thought &amp;quot;so and so&amp;quot; already did that?&lt;br /&gt;
: We found that it did not exist. While many threats are mentioned in the sources researched, there was no overall list or definitions. We found the automated threat events tended to all be in a small number of definied items from Mitre CAPEC and WASC Threat Classification. If you know of other automated threat lists/taxonomies/ontologies, please share them.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;oat&amp;quot;?&lt;br /&gt;
: It is our abbreviation for OWASP Automated Threat (OAT).&lt;br /&gt;
&lt;br /&gt;
; I am confused and don't know which OAT my problem is - how do I identify it?&lt;br /&gt;
: In 2017 we created a [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] to help identify the correct OAT, which can then be confirmed by reading the full description in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook]. The short summaries are important explanations of each OAT name.&lt;br /&gt;
&lt;br /&gt;
; How can I help?&lt;br /&gt;
: Please join our mailing list, send ideas, contribute clarifications, corrections and improvement, and let other people know about the project and its handbook.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements and Sponsors =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
* Sumit Agarwal&lt;br /&gt;
* Jason Chan&lt;br /&gt;
* Mark Hall&lt;br /&gt;
* Omri Iluz&lt;br /&gt;
* Andrew van der Stock&lt;br /&gt;
* Roland Weber&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
Additionally other professional colleagues and website owners and operators who provided feedback.&lt;br /&gt;
&lt;br /&gt;
==Reviewers==&lt;br /&gt;
&lt;br /&gt;
* Igor Andriushchenko&lt;br /&gt;
* Gabriel Mendez Justiniano&lt;br /&gt;
* Matt Tesauro&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
All OWASP Projects are run and developed by volunteers and rely on personal donations and sponsorship to continue their development. OWASP does not endorse or recommend commercial products or services, allowing our community to remain vendor neutral with the collective wisdom of the best minds in software security worldwide. This project has received the sponsorship part of their Corporate OWASP membership fees from Verizon Digital Media Services in 2016 and Distil Networks in 2017, which has already contributed to the v1.2 production design costs, and will also be utilised to help promote knowledge of the project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[file:Verizon_Digital_Medial_Logo.jpg|size=150x45px|link=https://www.verizondigitalmedia.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Distil-flat-logo-2.png|link=https://www.distilnetworks.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Can you help? The project is looking for information on the prevalence and types of automated threats seen by web application owners in the real world. This will be used to refine and organise the information gathered from research papers, whitepapers, security reports and industry news. Please use the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/automated_threats_to_web_applications Mailing list]&lt;br /&gt;
&lt;br /&gt;
To share information confidentially, you can email the project leaders directly: [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:colin.watson@owasp.org Colin Watson].&lt;br /&gt;
&lt;br /&gt;
== Completed Outputs==&lt;br /&gt;
&lt;br /&gt;
* {{#switchtablink:Scope and Definitions|Glossary}}&lt;br /&gt;
* {{#switchtablink:Bibliography|Bibligraphy of information sources}}&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automated-threats.pdf summary chart] has been published summarising the information gathered and work to date&lt;br /&gt;
* Identifying automated threats to web applications, and determining the primary name used. This first part of the project intends to produce a consistent vocabulary for discussing the threats before moving onto other aspects&lt;br /&gt;
* The primary terms have now been defined and described for the ontology&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automation-briefing.pdf briefing document] was produced in May 2015&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Automated Threat Handbook] July 2015 [https://www.owasp.org/index.php/File:Owasp-automated-threat-handbook-source-files.zip source files], updated in November 2016&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automation-project-briefing.pdf project overview flyer]  July 2015&lt;br /&gt;
* Release  [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] December 2016&lt;br /&gt;
&lt;br /&gt;
== Roadmap==&lt;br /&gt;
&lt;br /&gt;
The project's roadmap was updated in October 2017.&lt;br /&gt;
&lt;br /&gt;
===Q1 2015===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Feb 2015: Define scope and terminology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Mar 2015: Research prior work and reports about automated threats to web applications to create bibliography&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q2 2015===&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Assess threats/attacks and create ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Application owner interviews and creation of initial project outputs, to refine model&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Publication of outputs and request for review/data&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Summit session and survey at AppSec EU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Write ontology document&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Write 2-page project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Publish project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul 2015: Publish v1.0 ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q3 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul-Sep 2016: Gathering of additional contributions and update handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q4 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Nov 2016: Release updated handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec 2016: Threat identification chart&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q1 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec-Mar 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check against changes to CAPEC v2.9&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q2 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Apr-Jun 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecEU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q3 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Chase up ongoing project review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecUS&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q4 2017 ===&lt;br /&gt;
* Release v1.2 (now due 15 Feb 2018)&lt;br /&gt;
&lt;br /&gt;
=== Q1 2018 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create OAT wiki pages&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Future ===&lt;br /&gt;
* Write executive summary&lt;br /&gt;
* Release executive summary document&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-SR-2]] [[Category:SAMM-TA-1]] [[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=238098</id>
		<title>OWASP Automated Threats to Web Applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=238098"/>
				<updated>2018-02-26T12:02:16Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Introduction */ Links to OAT wiki pages&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Automated-threats-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Automated Threats to Web Applications==&lt;br /&gt;
&lt;br /&gt;
The OWASP Automated Threats to Web Applications Project has completed a review of reports, academic and other papers, news stories and vulnerability taxonomies/listings to identify, name and classify these scenarios – automated by software causing a divergence from accepted behavior producing one or more undesirable effects on a web application, but excluding tool-based exploitation of single-issue vulnerabilities. The initial objective was to produce an ontology providing a common language for developers, architects, operators, business owners, security engineers, purchasers and suppliers/ vendors, to facilitate clear communication and help tackle the issues.&lt;br /&gt;
The project also identifies symptoms, mitigations and controls in this problem area. Like all OWASP outputs, everything is free and published using an open source license.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Automation-project-briefing.pdf Two page summary project briefing as a PDF].&lt;br /&gt;
&lt;br /&gt;
== Description==&lt;br /&gt;
&lt;br /&gt;
Web applications are subjected to unwanted automated usage – day in, day out. Often these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is commonly mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the primary intent. Frequently these have sector-specific names. Most of these problems seen regularly by web application owners are not listed in any OWASP Top Ten or other top issue list. Furthermore, they are not enumerated or defined adequately in existing dictionaries. These factors have contributed to inadequate visibility, and an inconsistency in naming such threats, with a consequent lack of clarity in attempts to address the issues.&lt;br /&gt;
&lt;br /&gt;
Without sharing a common language between devops, architects, business owners, security engineers, purchasers and suppliers/vendors, everyone has to make extra effort to communicate clearly. Misunderstandings can be costly. The adverse impacts affect the privacy and security of individuals as well as the security of the applications and related system components.&lt;br /&gt;
&lt;br /&gt;
== Automated Threats ==&lt;br /&gt;
&lt;br /&gt;
The list of threat events, defined more fully in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-020 Account Aggregation]]&lt;br /&gt;
* [[OAT-019 Account Creation]]&lt;br /&gt;
* [[OAT-003 Ad Fraud]]&lt;br /&gt;
* [[OAT-009 CAPTCHA Defeat]]&lt;br /&gt;
* [[OAT-010 Card Cracking]]&lt;br /&gt;
* [[OAT-001 Carding]]&lt;br /&gt;
* [[OAT-012 Cashing Out]]&lt;br /&gt;
* [[OAT-007 Credential Cracking]]&lt;br /&gt;
* [[OAT-008 Credential Stuffing]]&lt;br /&gt;
* [[OAT-021 Denial of Inventory]]&lt;br /&gt;
* [[OAT-015  Denial of Service]]&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-006 Expediting]]&lt;br /&gt;
* [[OAT-004 Fingerprinting]]&lt;br /&gt;
* [[OAT-018 Footprinting]]&lt;br /&gt;
* [[OAT-005 Scalping]]&lt;br /&gt;
* [[OAT-011 Scraping]]&lt;br /&gt;
* [[OAT-016 Skewing]]&lt;br /&gt;
* [[OAT-013 Sniping]]&lt;br /&gt;
* [[OAT-017 Spamming]]&lt;br /&gt;
* [[OAT-002 Token Cracking]]&lt;br /&gt;
* [[OAT-014 Vulnerability Scanning]]&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
Not sure which is which? Use the [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] in conjunction with the full [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
All the materials are free to use. They are licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What Is This? ==&lt;br /&gt;
&lt;br /&gt;
Information and resources to help web application owners defend against [[:Category:Automated Threat|automated threats]]&lt;br /&gt;
&lt;br /&gt;
== What Isn't It? ==&lt;br /&gt;
&lt;br /&gt;
* Another vulnerability list&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Attack trees&lt;br /&gt;
* Non web&lt;br /&gt;
* Non application&lt;br /&gt;
&lt;br /&gt;
==Project Objective==&lt;br /&gt;
&lt;br /&gt;
This project brings together research and analysis of real world automated attacks against web applications, to produce documentation to assist operators defend against these threats. Sector-specific guidance will be available.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Automatedthreats-presentation-small.jpg|link=media:Bots-AppSecUSA2017-Project-Summit.pptx]]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP WASC Web Hacking Incidents Database Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
* [[OWASP AppSensor Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP ModSecurity Core Rule Set Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Download the free handbook as a PDF]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [16 Feb 2018] OAT wiki pages created&lt;br /&gt;
* [15 Feb 2018] v1.2 Handbook published&lt;br /&gt;
* [25 Sep 2017] Promoted to Labs status&lt;br /&gt;
* [19-20 Sep 2017] Working session at the AppSecUSA 2017 Project Summit&lt;br /&gt;
* [15 May 2017] Draft feedback on Top Ten A7 shared&lt;br /&gt;
* [17 Apr 2017] [https://www.owasp.org/index.php/File:BadBots_OWASP_AppSec_CA_2017.pptx Slides] from AppSec California (2017)&lt;br /&gt;
* [20 Dec 2016] Threat identification chart [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf published]&lt;br /&gt;
* [03 Nov 2016] Presentation at [http://lascon.org/ LASCON 2016]&lt;br /&gt;
* [03 Nov 2016] v1.1 Handbook published&lt;br /&gt;
* [11-12 Oct 2016] Working session at the [https://docs.google.com/presentation/d/1iMQHTc-h5qcP7gBBRcPHGmVaTWqx3dpMwNMVlA--rqs/edit#slide=id.p3 AppSecUSA 2017 Project Summit]&lt;br /&gt;
* [04 Aug 2016] Project Q&amp;amp;A at Blackhat USA 2-5pm in the OWASP booth&lt;br /&gt;
* [26 Oct 2015] [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf v1.01 handbook] published&lt;br /&gt;
* [24 Sep 2015] [https://www.owasp.org/index.php/File:Colinwatson-a-new-ontology-of-unwanted-automation.pptx Presentation] at [https://2015.appsecusa.org/c/?page_id=896#a AppSec USA 2015]&lt;br /&gt;
&lt;br /&gt;
==In Print==&lt;br /&gt;
&lt;br /&gt;
[[File:AutomatedThreatHandbook_small.jpg|link=http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22932107.html]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22932107.html Automated Threat Handbook] can be purchased at cost as a print on demand book.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
    &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Scope and Definitions =&lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The aim was to create a listing of vendor-neutral and technology agnostic terms that describe real-world automated threats to web applications, at a level of abstraction that application owners can relate to. These terms are threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
The focus is on abuse of functionality - misuse of inherent functionality and related design flaws, some of which are also referred to as business logic flaws. There is almost no focus on implementation bugs. It is not that the latter are not the target for attacks, but there is much more knowledge published in that area with a greater agreement on terminology. All the scenarios identified must require the web to exist for the threat to be materialised. Many of the scenarios have impacts upon the organisation that owns or operates web applications, but some scenarios have impacts more focused on individuals or other bodies. An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
==Definitions ==&lt;br /&gt;
&lt;br /&gt;
=== Automated Threats to Web Applications ===&lt;br /&gt;
&lt;br /&gt;
Threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
== Glossary ==&lt;br /&gt;
&lt;br /&gt;
;Action&lt;br /&gt;
: An act taken against an asset by a threat agent. Requires first that contact occurs between the asset and threat agent (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Application&lt;br /&gt;
: Software that performs a business process i.e. not system software&lt;br /&gt;
: A software program hosted by an information system (Ref 2)&lt;br /&gt;
&lt;br /&gt;
; Application layer&lt;br /&gt;
: &amp;quot;Layer 7” in the OSI model (Ref 3) and “application layer” in the TCP/IP model (Ref 4)&lt;br /&gt;
&lt;br /&gt;
;Threat&lt;br /&gt;
: Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events, etc.); malicious actors; errors; failures (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Agent&lt;br /&gt;
: Any agent (e.g., object, substance, human, etc.) that is capable of acting against an asset in a manner that can result in harm (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Event&lt;br /&gt;
: Occurs when a threat agent acts against an asset (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Web&lt;br /&gt;
: The World Wide Web (WWW, or simply Web) is an information space in which the items of interest, referred to as resources, are identified by global identifiers called Uniform Resource Identifiers (URI) (Ref 5)&lt;br /&gt;
: The first three specifications for Web technologies defined URLs, HTTP, and HTML (Ref 6)&lt;br /&gt;
&lt;br /&gt;
; Web application&lt;br /&gt;
: An application delivered over the web&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Glossary references:&lt;br /&gt;
# [http://pubs.opengroup.org/onlinepubs/9699919899/toc.pdf Risk Taxonomy, Technical Standard, The Open Group, 2009]&lt;br /&gt;
# [http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf NISTIR 7298 rev 2, NIST]&lt;br /&gt;
# [http://en.wikipedia.org/wiki/OSI_model OSI model, Wikipedia] &lt;br /&gt;
# [http://en.wikipedia.org/wiki/Internet_protocol_suite TCP/IP model, Wikipedia]&lt;br /&gt;
# [http://www.w3.org/TR/webarch/ Architecture of the World Wide Web, Volume One, W3C]&lt;br /&gt;
# [http://www.w3.org/Help/ Help and FAQ, W3C]&lt;br /&gt;
&lt;br /&gt;
=Use Case Scanarios=&lt;br /&gt;
&lt;br /&gt;
The following scenarios and organisation names are completely fictitious.&lt;br /&gt;
&lt;br /&gt;
==Defining application development security requirements==&lt;br /&gt;
&lt;br /&gt;
Cinnaminta SpA intends to build and launch a new multi-lingual and multi-currency ecommerce website. The development will be outsourced and Cinnaminta has been working on the functional design document. Among many other requirements, the application security specification requires that the website must not include any vulnerabilities identified in PCI DSS v3.1 Requirement 6.5, nor any other vulnerabilities that could affect the protection of payment cardholder data. Cinnaminta specifies that the website's payment functions must not be susceptible to the threat events '''OAT-001 Carding''' or '''OAT-010 Card Cracking''' as defined in the '''OWASP Automated Threat Handbook'''. In addition, the application must interact with the company's existing fraud detection system to counter '''OAT-012 Cashing Out'''. The requirements are specified in terms of these threat events, rather than particular product or service categories. Development houses responding to the call for bids use the ontology to focus their answers to these aspects appropriately.&lt;br /&gt;
&lt;br /&gt;
== Sharing intelligence within a sector==&lt;br /&gt;
&lt;br /&gt;
Unlimited Innovations Inc develops and supports patient-facing software solutions to a range of healthcare providers, many of which participate in the National Health Service Cyber Intelligence Sharing Center (NHS-CISC). Unlimited Innovations already builds continuous monitoring capabilities into its software and decides to provide an optional enhancement so that customers could choose to share their misuse event data with each other, to benefit from the combined threat intelligence. Rather than sharing large quantities of low-level data, Unlimited Innovations aggregates information and broadcasts validated and categorised threat data amongst the participating organisations. Automation attacks are classified according to the threat events defined in the '''OWASP Automated Threat Handbook''' so that each receiving party understands the nature of the threat. Even organisations that do not want to take part in this information sharing can benefit, since their own categorised information is made available to internal business management in the form of an easy-to-comprehend monitoring dashboard. The information gathered can also be fed into their other business information management systems to help improve patient service.&lt;br /&gt;
&lt;br /&gt;
== Exchanging threat data between CERTs==&lt;br /&gt;
&lt;br /&gt;
National Computer Emergency Response Teams (CERTs) recognise that sharing of local information can contribute to worldwide prevention of cyber attacks. Despite advances in cooperation between CERTs, anything to increase continuity and interoperability, such as standards for data exchange, is encouraged. CERT Zog is concerned about the sparsity of application-specific data it receives, and also the classification of that data. It has a particular concern about attacks and breaches that affect sectors defined in Zog's 2015 national cyber security strategy. CERT Zog and its neighbour CERT Tarset agree to tag threat events using the '''OWASP Automated Threat Handbook''' in order to add greater context to existing solutions being used for threat data exchange between them. The programme also collects sector metadata, so that all organisations within these can benefit from the centralised intelligence.&lt;br /&gt;
&lt;br /&gt;
== Enhancing application penetration test findings==&lt;br /&gt;
&lt;br /&gt;
Specialist application security penetration testing firm Cherak Industries Pte Ltd works primarily for financial services companies in the banking and insurance sectors, and is looking to expand its business throughout Asia. Cherak has some innovative pen test result reporting systems which integrate with client software fault and vulnerability tracking systems, and it actively looks for methods to provide additional value to its clients. Cherak has identified that pen test clients would benefit from help to in understanding the effects of combinations of vulnerabilities, especially design flaws, and has decided to utilise the '''OWASP Automated Threat Handbook''' to define and explain the automation-related threats. The individual vulnerabilities were scored as normal using CVSSv2 and v3, the matching CWEs identified, and mitigations in place documented. In addition, Cherak uses the threat events defined in the '''OWASP Automated Threat Handbook''' to help create a new section in the executive summary that explains how combinations of the issues found could lead to automation threats and the possible technical and business impacts. For example, an assessment for one client had identified weaknesses in authentication so that there is a risk of '''OAT-008 Credential Stuffing'''. The defined identifier was provided to the client, so its technical staff could refer to additional information on the OWASP website.&lt;br /&gt;
&lt;br /&gt;
== Specifying service acquisition needs==&lt;br /&gt;
&lt;br /&gt;
Falstone Paradise Inc is concerned about malicious use of their portfolio of hotel and resort websites. The majority of the websites use a shared application platform, but there are some unique applications and a large number of other micro-sites, some of which use generic content management systems such as Wordpress and Drupal. Falstone Paradise has identified that its IT operations team are spending too much time dealing with the effects of automated misuse, such as cleaning up data, resetting customer accounts and providing extra capacity during attacks. Furthermore, the unwanted automation is also causing some instabilities leading to negative feedback from customers. Therefore Falstone Paradise decides to go out to the security marketplace to identify, assess and select products or services that might help address these automation issues for all its websites. Their buying team works with their information technology colleagues to write the detailed requirements in an Invitation to Tender (ITT) document. This describes the types of attacks its web applications are receiving, their frequency of occurrence and their magnitudes. These are defined according to the '''OWASP Automated Threat Handbook''', so that vendors do not misunderstand the requirements, and each vendor's offering can be assessed against the particular automation threat events of concern.&lt;br /&gt;
&lt;br /&gt;
== Characterising vendor services ==&lt;br /&gt;
&lt;br /&gt;
Better Best Ltd has developed an innovative technology to help gaming companies defend against a range of automated threats that can otherwise permit cheating and distortion of the game, leading to disruption for normal players. The solution can be deployed on premises, but is also available in the cloud as a service. But Better Best is finding difficulty explaining its solution in the market place, especially since it does not fit into any conventional product category. Better Best decide to use the terminology and threat events listed in the '''OWASP Automated Threat Handbook''' to define their product's capabilities. They hope this will provide some clarity about their offering, and also demonstrate how their product can be used to replace more than one other conventional security device. Additionally, Better Best writes a white paper describing how their product has been successfully used by one of their reference customers Hollybush Challenge Games to protect against '''OAT-006 Expediting''', '''OAT-005 Scalping''', '''OAT-016 Skewing''' and '''OAT-013 Sniping'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Ontology=&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The A-Z list of [[:Category:Automated Threat|automated threat events]] and summary descriptions, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-020 Account Aggregation]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Use by an intermediary application that collects together multiple accounts and interacts on their behalf.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-019 Account Creation]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Create multiple accounts for subsequent misuse.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-003 Ad Fraud]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
False clicks and fraudulent display of web-placed advertisements.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-009 CAPTCHA Defeat]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Solve anti-automation tests.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-010 Card Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify missing start/expiry dates and security codes for stolen payment card data by trying different values.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-001 Carding]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Multiple payment authorisation attempts used to verify the validity of bulk stolen payment card data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-012 Cashing Out]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Buy goods or obtain cash utilising validated stolen payment card or other user account data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-007 Credential Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify valid login credentials by trying different values for usernames and/or passwords.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-008 Credential Stuffing]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass log in attempts used to verify the validity of stolen username/password pairs.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-021 Denial of Inventory]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Deplete goods or services stock without ever completing the purchase or committing to the transaction.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-015  Denial of Service]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Target resources of the application and database servers, or individual user accounts, to achieve denial of service (DoS).&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-006 Expediting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Perform actions to hasten progress of usually slow, tedious or time-consuming actions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-004 Fingerprinting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Elicit information about the supporting software and framework types and versions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-018 Footprinting]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Probe and explore application to identify its constituents and properties.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-005 Scalping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Obtain limited-availability and/or preferred goods/services by unfair methods.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-011 Scraping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Collect application content and/or other data for use elsewhere.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-016 Skewing]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Repeated link clicks, page requests or form submissions intended to alter some metric.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-013 Sniping]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Last minute bid or offer for goods or services.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-017 Spamming]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Malicious or questionable information addition that appears in public or private content, databases or user messages.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-002 Token Cracking]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass enumeration of coupon numbers, voucher codes, discount tokens, etc.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
[[OAT-014 Vulnerability Scanning]]&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Crawl and fuzz application to identify weaknesses and possible vulnerabilities.&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Comparison with other dictionaries, taxonomies and lists==&lt;br /&gt;
&lt;br /&gt;
===[https://capec.mitre.org/ Common Attack Pattern Enumeration and Classification] (CAPEC)===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-capec-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
CAPEC is a dictionary and classification taxonomy of known attacks on software. Its primary classification structures are:&lt;br /&gt;
&lt;br /&gt;
* [https://capec.mitre.org/data/definitions/3000.html Domains of attack] (3000) - Social Engineering (403), [https://capec.mitre.org/data/definitions/437.html Supply Chain] (437), Communications (512), [https://capec.mitre.org/data/definitions/513.html Software] (513), Physical Security (514), Hardware (515)&lt;br /&gt;
* Mechanism of Attack (1000) - Gather Information (118), Deplete Resources (119), Injection (152), Deceptive Interactions (156), Manipulate Timing and State (172), Abuse of Functionality (210), Probabilistic Techniques (223), Exploitation of Authentication (225), Exploitation of Authorization (232), Manipulate Data Structures (255), Manipulate Resources (262), Analyze Target (281), Gain Physical Access (436), Malicious Code Execution (525), Alter System Components (526), Manipulate System Users (527)&lt;br /&gt;
&lt;br /&gt;
===[http://projects.webappsec.org/w/page/13246978/Threat%20Classification WASC Threat Classification]===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-wasc-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
The WASC Threat Classification classifies weaknesses and attacks that can lead to the compromise of a website, its data, or its users.&lt;br /&gt;
&lt;br /&gt;
===[[OWASP WASC Web Hacking Incidents Database Project]] (WHID)===&lt;br /&gt;
&lt;br /&gt;
WHID [https://www.google.com/fusiontables/DataSource?snapid=S1536501YnLo classifies] publicly known incidents using:&lt;br /&gt;
&lt;br /&gt;
* attack methods e.g. ARP spoofing, abuse of functionality, account compromise, administration error, automation, backdoor, banking trojan, brute force, clickjacking, code injection, content injection, content spoofing, credential/session prediction, cross site request forgery (CSRF), cross-site scripting (XSS), denial of service, directory traversal, domain hijacking, DNS hijacking, forceful browsing, HTTP response splitting, hidden parameter manipulation, hosting malicious code, information leakage, insufficient authentication, known vulnerability, local file inclusion (LFI), malvertising, malware, malware injection, mass assignment, misconfiguration, OS commanding, parameter manipulation, path traversal, phishing, predictable resource location, process automation, redirection, remote file inclusion (RFI), rogue 3rd party app, scaping, search engine poisoning, shell injection, social engineering, stolen credentials, SQL injection, unintentional information disclosure, weak password recovery validation, worm&lt;br /&gt;
* weakness e.g. abuse of functionality, application misconfiguration, directory indexing, improper filesystem permissions, improper input handling, improper output handling, information leakage, insecure indexing, insufficient anti-automation, insufficient authentication, insufficient authorization, insufficient entropy, insufficient password recovery, insufficient process validation, insufficient session expiration, insufficient transport layer protection, misconfiguration, predictable resource location, weak password&lt;br /&gt;
* outcome account hijacking, account takeover, botnet participation, chaos, credit card leakage, data loss, defacement, DDoS attacks, DNS hijacking, DNS redirection, disinformation, disclosure only, downtime, extortion, fraud, information warfare, leakage of information, link spam, loss of sales, malware distribution,  monetary loss, phishing, planting of malware, service disruption, session hijacking, spam, spam links, stolen credentials, worm&lt;br /&gt;
&lt;br /&gt;
Plus other/various/unknown.&lt;br /&gt;
&lt;br /&gt;
= Bibliography =&lt;br /&gt;
&lt;br /&gt;
The following academic, open source, commercial and news sources were used in the research on automated threats to web applications. OWASP is a worldwide not-for-profit charitable organization focused on improving the security of software.  We operate under a vendor neutral policy and we do not endorse products or services.&lt;br /&gt;
&lt;br /&gt;
* 10 years of Application Security, Denyall http://www.denyall.com/resources/whitepapers/?aliId=3438442&lt;br /&gt;
*	2012 Payment Card Threat Report	 https://www.securitymetrics.com/static/resources/orange/2012%20Payment%20Card%20Threat%20Report%20copy.pdf				&lt;br /&gt;
*	2014 Bot Traffic Report: Just the Droids You were Looking for	 http://www.incapsula.com/blog/bot-traffic-report-2014.html				&lt;br /&gt;
*	3 Types of ‘Return Fraud’ to Monitor this Holiday Season	 http://www.practicalecommerce.com/articles/3168-3-Types-of-%E2%80%98Return-Fraud-to-Monitor-this-Holiday-Season	&lt;br /&gt;
* 7 Ways Bots Hurt Your Website, Distil Networks http://www.distilnetworks.com/7-ways-bots-hurt-website-whitepaper/						&lt;br /&gt;
*	Abusing HTML 5 Structured Client-side Storage	2008	 http://packetstorm.wowhacker.com/papers/general/html5whitepaper.pdf		&lt;br /&gt;
* Acquiring Experience with Ontology and Vocabularies, Walt Melo, Risa Mayan and Jean Stanford, 2011  http://www.omg.org/news/meetings/workshops/SOA-HC/presentations-2011/13_SC-6_Melo_Stanford_Mayan.pdf	&lt;br /&gt;
*	An Anatomy of a SQL Injection Attack	 Hacker Intelligence Initiative	 Imperva	 	 http://www.imperva.com/docs/HII_An_Anatomy_of_a_SQL_Injection_Attack_SQLi.pdf	&lt;br /&gt;
*	The Anatomy of Clickbot.A	 https://www.usenix.org/legacy/event/hotbots07/tech/full_papers/daswani/daswani.pdf				&lt;br /&gt;
*	Anatomy of comment spam	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Anatomy_of_Comment_Spam.pdf		&lt;br /&gt;
*	Anti-Automation Monitoring and Prevention	2015	 https://www.clerkendweller.uk/2015/1/29/AntiAutomation-Monitoring-and-Prevention			&lt;br /&gt;
*	Anti-DDoS Solution for Internet Corporation	 http://www.nsfocus.com/uploadfile/Solution/NSFOCUS%20Anti-DDoS%20Solution%20for%20Internet%20Corporation.pdf				&lt;br /&gt;
*	Anti-Fraud Principles and Proposed Taxonomy	 Sep 2014	 http://www.iab.net/media/file/IAB_Anti_Fraud_Principles_and_Taxonomy.pdf			&lt;br /&gt;
*	Apache Security	 Ivan Ristic	 			&lt;br /&gt;
* Application Security Desk Reference, OWASP https://www.owasp.org/index.php/Category:OWASP_ASDR_Project&lt;br /&gt;
* Application Security Guide For CISOs, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf&lt;br /&gt;
* AppSensor, OWASP https://www.owasp.org/index.php/OWASP_AppSensor_Project&lt;br /&gt;
*	Attack &amp;amp; Defense Labs	 http://www.andlabs.org/html5.html				&lt;br /&gt;
*	Attack categories	 OWASP	 https://www.owasp.org/index.php/Category:Attack	&lt;br /&gt;
* Attack Trees, Schneier, Dr. Dobb's Journal, December 1999 https://www.schneier.com/paper-attacktrees-ddj-ft.html		&lt;br /&gt;
*	Attacking with HTML5	2010	 https://media.blackhat.com/bh-ad-10/Kuppan/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-wp.pdf			&lt;br /&gt;
*	Automated attacks	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Automation_of_Attacks.pdf		&lt;br /&gt;
*	Avoiding the Top 10 Software Security Design Flaws	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf				&lt;br /&gt;
*	Bad Bots On The Rise	 Dec 2014	 http://www.darkreading.com/informationweek-home/bad-bots-on-the-rise/d/d-id/1318276	&lt;br /&gt;
* Banking Botnets Persist Despite Takedowns, Dell SecureWorks, 2015 http://www.secureworks.com/cyber-threat-intelligence/threats/banking-botnets-persist-despite-takedowns/	&lt;br /&gt;
*	The Barracuda Web Application Firewall: XML Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_XML_Firewall.pdf	&lt;br /&gt;
*	Blocking Brute Force Attacks	 http://www.cs.virginia.edu/~csadmin/gen_support/brute_force.php				&lt;br /&gt;
*	Bot Traffic Growing Problem for Digital	 Oct 2014	 http://www.netnewscheck.com/article/36537/bot-traffic-growing-problem-for-digital			&lt;br /&gt;
*	BotoPedia	 Incapsula	 http://www.botopedia.org/			&lt;br /&gt;
*	Boy in the Browser	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/Boy_in_the_Browser	&lt;br /&gt;
* Business Logic Attacks - Bots and BATs, Eldad Chai, 2009 http://www.owasp.org/images/9/96/AppSecEU09_BusinessLogicAttacks_EldadChai.ppt		&lt;br /&gt;
*	Bypassing Client Application Protection Techniques	 http://www.securiteam.com/securityreviews/6S0030ABPE.html&lt;br /&gt;
*	A CAPTCHA in the Rye	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_a_CAPTCHA_in_the_Rye.pdf					&lt;br /&gt;
*	Characterizing Large Scale Click fraud	 http://cseweb.ucsd.edu/~voelker/pubs/za-ccs14.pdf	&lt;br /&gt;
* Charter Addition Proposal: &amp;quot;Trusted Code&amp;quot; for the Web https://lists.w3.org/Archives/Public/public-webappsec/2015Mar/0150.html&lt;br /&gt;
*	A cheesy Apache / IIS DoS vuln (+a question) 	 http://www.securityfocus.com/archive/1/456339/30/0/threaded	&lt;br /&gt;
* China's Man-on-the-Side Attack on GitHub http://www.netresec.com/?page=Blog&amp;amp;month=2015-03&amp;amp;post=China%27s-Man-on-the-Side-Attack-on-GitHub&lt;br /&gt;
* The CISO Survey and Report, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-report-2013-1.0.pdf&lt;br /&gt;
* Common Attack Pattern Enumeration and Classification (CAPEC), Mitre https://capec.mitre.org/			&lt;br /&gt;
*	Common Cyber Attacks: Reducing the Impact	 CERT-UK	 https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/400106/Common_Cyber_Attacks-Reducing_The_Impact.pdf			&lt;br /&gt;
*	Corporate espionage – the internet’s new growth industry	 http://www.itproportal.com/2015/03/19/corporate-espionage-internets-new-growth-industry/				&lt;br /&gt;
*	CSA Top Threats to Cloud Computing	 https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf				&lt;br /&gt;
*	CSRF vulnerability in GMail service	 http://seclists.org/fulldisclosure/2009/Mar/29		&lt;br /&gt;
* CWE/SANS Top 25 Most Dangerous Software Errors, 2011 http://cwe.mitre.org/top25/		&lt;br /&gt;
*	Cyber Fraud - Tactics	 Techniques and Procedures	 http://www.crcpress.com/product/isbn/9781420091274			&lt;br /&gt;
* Cybercrime Report: Q1 2015, ThreatMetrix, 2015 http://info.threatmetrix.com/WP-2015Q1CybercrimeReport_WP-LP.html&lt;br /&gt;
*	Data Breach Investigations Report (DBIR), 2014	 http://www.verizonenterprise.com/DBIR/2014/				&lt;br /&gt;
* Data Breach Investigations Report (DBIR), 2015 http://www.verizonenterprise.com/DBIR/2015/&lt;br /&gt;
*	Data Breaches Fuel Login Attacks	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2014-state-of-the-internet-threat-advisory-public-data-breaches-fuel-login-attacks.pdf		&lt;br /&gt;
*	Data Scraping	 Wikipedia	 http://en.wikipedia.org/wiki/Data_scraping			&lt;br /&gt;
*	DDoS Quick Guide	 https://www.us-cert.gov/sites/default/files/publications/DDoS%20Quick%20Guide.pdf	&lt;br /&gt;
* DDoS Threat Landscape Report, 2013-2014 http://lp.incapsula.com/rs/incapsulainc/images/2013-14_ddos_threat_landscape.pdf	&lt;br /&gt;
* Defending Against an Internet-based Attack on the Physical World http://avirubin.com/scripted.attacks.pdf		&lt;br /&gt;
*	Defending Against Application-Based DDoS Attacks with the Barracuda Web Application Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_Defending%20_Against_%20Application-Based_%20DDoS_%20Attacks.pdf				&lt;br /&gt;
*	Demystifying HTML 5 Attacks	 http://resources.infosecinstitute.com/demystifying-html-5-attacks/				&lt;br /&gt;
*	Denial of Service Attacks: A Comprehensive Guide to Trends	 Techniques	 and Technologies	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Denial_of_Service_Attacks-Trends_Techniques_and_Technologies.pdf&lt;br /&gt;
*	Detecting and Blocking Site Scraping Attacks	 Imperva	 http://www.imperva.com/docs/WP_Detecting_and_Blocking_Site_Scraping_Attacks.pdf			&lt;br /&gt;
*	Detecting Automation of Twitter Accounts: Are you a human	 cyborg	 or a bot?	 http://www.cs.wm.edu/~hnw/paper/tdsc12b.pdf		&lt;br /&gt;
*	Detecting Malice	 Robert &amp;quot;RSnake&amp;quot; Hansen	2009	 http://www.detectmalice.com/		&lt;br /&gt;
*	Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) 	 http://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1414072277428&amp;amp;uri=CELEX:32002L0058				&lt;br /&gt;
*	Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data 	 http://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:31995L0046				&lt;br /&gt;
*	Distributed Denial-of-Service (DDoS) Cyber-Attacks	 Risk Mitigation	 and Additional Resources	 Federal Financial Institutions Examination Council	 http://www.ffiec.gov/press/PDF/FFIEC%20DDoS%20Joint%20Statement.pdf	&lt;br /&gt;
*	Do Evil - The Business of Social Media Bots	 Forbes	 http://www.forbes.com/sites/lutzfinger/2015/02/17/do-evil-the-business-of-social-media-bots/			&lt;br /&gt;
*	DoS and DDoS Glossary of Terms	 prolexic	 http://www.prolexic.com/knowledge-center-dos-and-ddos-glossary.html#layer-7-ddos-attack			&lt;br /&gt;
*	E-commerce Malware	 Trustwave	 https://gsr.trustwave.com/topics/placeholder-topic/e-commerce-malware/	&lt;br /&gt;
* Exploiting Software, G. Hoglund and G. McGraw, Addison-Wesley, 2004&lt;br /&gt;
* Five Trends to Track in E-Commerce Fraud, ThreatMetrix, 2013 http://info.threatmetrix.com/rs/threatmetrix/images/Five_Trends_eCommerce_Fraud_WP.pdf&lt;br /&gt;
* Hacker builds cheatbot for hit app Trivia Crack http://www.theregister.co.uk/2015/03/26/hacker_builds_trivia_crack_cheat_app/	&lt;br /&gt;
* Has Walmart opened itself up to “Denial of inventory” attacks?  https://arstechnica.com/business/2012/05/has-walmart-opened-itself-up-to-denial-of-inventory-attacks/	&lt;br /&gt;
* How Hoarder Bots Steal sales from Online Retailers https://www.internetretailer.com/mobile/2016/12/16/how-hoarder-bots-steal-sales-online-retailers&lt;br /&gt;
*	How to Defend Against DDoS Attacks - Strategies for the Network	 Transport	 and Application Layers	 Prolexic	 http://www.prolexic.com/kcresources/white-paper/strategies-for-the-network-transport-and-application-layers-412/Strategies_for_the_Network_Transport_and_Application_Layers_Prolexic_White_Paper_A4_082412.pdf	&lt;br /&gt;
* How to Defend Online Travel Websites in the Era of Site Scraping, Distil Networks http://www.distilnetworks.com/defend-online-travel-websites-era-site-scraping-download/&lt;br /&gt;
*	How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores	 http://research.microsoft.com/pubs/145858/caas-oakland-final.pdf				&lt;br /&gt;
*	HTML5 Overview	 A look at HTML5 Attack Scenarios	 Trend Micro	2011	 http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt_html5-attack-scenarios.pdf	&lt;br /&gt;
*	HTML5 Top 10 Threats Stealth Attacks and Silent Exploits	2012	 https://media.blackhat.com/bh-eu-12/shah/bh-eu-12-Shah_HTML5_Top_10-WP.pdf			&lt;br /&gt;
*	HTML5 web security	2011	 http://media.hacking-lab.com/hlnews/HTML5_Web_Security_v1.0.pdf			&lt;br /&gt;
*	HTTPPOST - Slow POST	 Wong Onn Chee	 OWASP AppSec DC 2010	 https://www.owasp.org/images/4/43/Layer_7_DDOS.pdf	&lt;br /&gt;
* If you've got @British_Airways account may make sense to change your password. Just had all my Avios cleared out! https://twitter.com/suttonnick/status/581556027948195840/photo/1	&lt;br /&gt;
* Internet Security Threat Report, Volume 19, 2014 http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf&lt;br /&gt;
*	An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks	 http://www.springer.com/gb/book/9788132202769	&lt;br /&gt;
*	Is Your Data Center Ready for Today’s DDoS Threats? DDoS attack types	 protection methods and testing your detection and mitigation defenses	 http://www.fortinet.com/sites/default/files/whitepapers/WP-DDoS-Testing.pdf			&lt;br /&gt;
*	Joomla Reflection DDoS-for-Hire	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2015-state-of-the-internet-threat-advisory-joomla-reflection-attack-ddos-for-hire.pdf		&lt;br /&gt;
*	Layer 7 DDOS – Blocking HTTP Flood Attacks	 http://blog.sucuri.net/2014/02/layer-7-ddos-blocking-http-flood-attacks.html				&lt;br /&gt;
*	Lenovo	 Superfish put smut on my system' – class-action lawsuit	 The Register	 http://www.theregister.co.uk/2015/02/23/lenovo_superfish_class_action_lawsuit/		&lt;br /&gt;
* List of Attack Vectors   Relative Vulnerability Rating TECAPI http://www.tecapi.com/public/relative-vulnerability-rating-gui.jsp#&lt;br /&gt;
*	Man in the Browser	 http://scisweb.ulster.ac.uk/~kevin/IJACI-Vol4No1-maninbrowser.pdf				&lt;br /&gt;
*	Man in the Browser Attack	 https://www.owasp.org/index.php/Man-in-the-browser_attack&lt;br /&gt;
* Mapping and Measuring Cybercrime, Oxford Internet Institute http://www.oii.ox.ac.uk/publications/FD18.pdf				&lt;br /&gt;
*	Massive Changes in the Criminal Landscape	 Europol	2015	 https://www.europol.europa.eu/content/massive-changes-criminal-landscape	&lt;br /&gt;
* Matching Attack Patterns to Security Vulnerabilities in Software-Intensive System Designs http://collaboration.csc.ncsu.edu/laurie/Papers/ICSE_Final_MCG_LW.pdf	&lt;br /&gt;
*	Mitigating DDoS Attacks with F5 Technology	 F5	 https://f5.com/resources/white-papers/mitigating-ddos-attacks-with-f5-technology			&lt;br /&gt;
* Mitigating the DoS/DDosS Threat, Radware, 2012 http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452061&lt;br /&gt;
* Modern Web Attacks, Sophos, 2007 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/modern-web-attacks.aspx&lt;br /&gt;
*	ModSecurity Advanced Topic of the Week: Mitigating Slow HTTP DoS Attacks	 https://www.trustwave.com/Resources/SpiderLabs-Blog/(Updated)-ModSecurity-Advanced-Topic-of-the-Week--Mitigating-Slow-HTTP-DoS-Attacks/	&lt;br /&gt;
* Most common attacks on web applications https://ipsec.pl/web-application-security/most-common-attacks-web-applications.html			&lt;br /&gt;
* Multi-dimensional Vulnerability Hierarchies Daniel Miessler  https://danielmiessler.com/study/multi-dimensional-vulnerability-hierarchies/&lt;br /&gt;
*	New Wave of DDoS Attacks Launched	 BankInfoSecurity.com	 Mar 2013	 http://www.bankinfosecurity.com/new-wave-ddos-attacks-launched-a-5584/op-1		&lt;br /&gt;
*	NOMAD: Toward Non-Invasive Moving Target Defense Against Web Bots	 http://faculty.cs.tamu.edu/guofei/paper/NOMAD_CNS13.pdf				&lt;br /&gt;
*	Online Ad Fraud Exposed: Advertisers Losing $6.3 Billion To $10 Billion Per Year	 Sep 2014	 http://www.darkreading.com/analytics/threat-intelligence/online-ad-fraud-exposed-advertisers-losing-$63-billion-to-$10-billion-per-year/d/d-id/1317979			&lt;br /&gt;
* Online Data Companies versus Bots: The Fight is on for Control of Online Data, Distil Networks http://www.distilnetworks.com/online-data-companies-vs-bots-download/&lt;br /&gt;
*	Optimal Airline Ticket Purchasing Using Automated User-Guided Feature Selection	 http://ijcai.org/papers13/Papers/IJCAI13-032.pdf				&lt;br /&gt;
*	Payment Checkout Flaws and Bugs	2014	 https://www.clerkendweller.uk/2014/11/4/Payment-Checkout-Flaws-and-Bugs			&lt;br /&gt;
*	PCI Compliance Report 2015	 Verizon	 http://www.verizonenterprise.com/pcireport/2015/			&lt;br /&gt;
*	Pixel Perfect Timing Attacks with HTML5	2013	 http://www.contextis.com/services/research/white-papers/pixel-perfect-timing-attacks-html5/			&lt;br /&gt;
*	Polymorphism as a Defense for Automated Attack of Websites	 http://link.springer.com/chapter/10.1007%2F978-3-319-07536-5_30				&lt;br /&gt;
*	Preventing Web Scraping: Best Practice 	 https://creativedigitalideas.files.wordpress.com/2014/11/best-practice-to-prevent-web-scraping.pdf				&lt;br /&gt;
*	Profile: Automated Credit Card Fraud	 http://old.honeynet.org/papers/profiles/cc-fraud.pdf				&lt;br /&gt;
* Protecting Against Web Floods, Radware http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452968&lt;br /&gt;
*	Q4 2014 State of the Internet Security Report	 prolexic	 http://www.stateoftheinternet.com/downloads/pdfs/2014-internet-security-report-q4.pdf			&lt;br /&gt;
*	Reflection injection	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf		&lt;br /&gt;
* A Report on taxonomy and evaluation of existing inventories, ENISAhttp://ecrime-project.eu/wp-content/uploads/2015/02/E-Crime-Deliverable-2-1-20141128_FINAL.pdf			&lt;br /&gt;
* Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft, Dept of Justice http://www.justice.gov/criminal/cybercrime/docs/ip-victim-guide-and-checklist-march-2013.pdf&lt;br /&gt;
*	SANS Top 20 Critical Controls	 https://www.sans.org/critical-security-controls/		&lt;br /&gt;
* Securing Websites, Sophos, 2011 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/securing-websites.aspx		&lt;br /&gt;
*	Security Insights: Defending Against Automated Threats	 http://www.securityweek.com/security-insights-defending-against-automated-threats				&lt;br /&gt;
*	Server side DDoS	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/DDOS_Attack_Method_Payload_05182010			&lt;br /&gt;
*	Slow Read Denial of Service attack	 https://code.google.com/p/slowhttptest/wiki/SlowReadTest				&lt;br /&gt;
*	Slow-Read DoS Attack	 https://www.trustwave.com/Resources/SpiderLabs-Blog/ModSecurity-Advanced-Topic-of-the-Week--Mitigation-of--Slow-Read--Denial-of-Service-Attack/				&lt;br /&gt;
*	Slowloris HTTP DoS	 http://ha.ckers.org/slowloris/	 	&lt;br /&gt;
* So what are the &amp;quot;most critical&amp;quot; application flaws? On new OWASP Top 10 https://ipsec.pl/application-security/2013/so-what-are-most-critical-application-flaws-new-owasp-top-10.html		&lt;br /&gt;
*	Social Media Bots Offer Phony Friends and Real Profit	 NY Times	 http://www.nytimes.com/2014/11/20/fashion/social-media-bots-offer-phony-friends-and-real-profit.html?_r=1			&lt;br /&gt;
* Software Vulnerability Analysis, Krsul, 1998 http://www.krsul.org/ivan/articles/main.pdf&lt;br /&gt;
*	Sophos Security Threat Report	 http://blogs.sophos.com/2014/12/11/our-top-10-predictions-for-security-threats-in-2015-and-beyond/&lt;br /&gt;
* SpoofedMe Social Login Attack Discovered by IBM X-Force Researchers http://securityintelligence.com/spoofedme-social-login-attack-discovered-by-ibm-x-force-researchers/#.VSuiEhPSngM				&lt;br /&gt;
* State of Software Security Report, Volume 5, Veracode, 2013 https://info.veracode.com/state-of-software-security-report-volume5.html&lt;br /&gt;
*	Stopping Automated Attack Tools	 http://www.technicalinfo.net/papers/StoppingAutomatedAttackTools.html&lt;br /&gt;
* Taxonomy on Online Game Security http://www.math.snu.ac.kr/~jhcheon/publications/2004/Taxonomy%20on%20online%20game%20security_EL.pdf	&lt;br /&gt;
* A Taxonomy of Computer Program Security Flaws, with Examples, Landwehr https://cwe.mitre.org/documents/sources/ATaxonomyofComputerProgramSecurityFlawswithExamples%5BLandwehr93%5D.pdf&lt;br /&gt;
* A Taxonomy of Security Faults in the UNIX Operating System, Aslam, 1995 https://cwe.mitre.org/documents/sources/ATaxonomyofSecurityFaultsintheUNIXOperatingSystem%5BAslam95%5D.pdf		&lt;br /&gt;
* Testing Guide, v4, OWASP, 2014 https://www.owasp.org/images/5/52/OWASP_Testing_Guide_v4.pdf								&lt;br /&gt;
*	The Bot Baseline: Fraud in Digital Advertising	 https://s3.amazonaws.com/whiteops-public/WO-ANA-Baseline-Study-of-Bot-Fraud.pdf							&lt;br /&gt;
*	The Internet Organised Crime Threat Assessment (iOCTA) 2014	 https://www.europol.europa.eu/content/internet-organised-crime-threat-assesment-iocta				&lt;br /&gt;
*	The Notorious Nine	 Cloud Computing Top Threats in 2013	 CSA	 https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf	&lt;br /&gt;
* The Risks of Content Management Systems, IBM, 2015 https://portal.sec.ibm.com/mss/html/en_US/support_resources/pdf/CMS_Threats_MSS_Threat_Report.pdf	&lt;br /&gt;
* The Spy in the Sandbox – Practical Cache Attacks in Javascript http://iss.oy.ne.ro/SpyInTheSandbox.pdf						&lt;br /&gt;
* Thousands of Hacked Uber Accounts Selling on Dark Web for $1 http://thehackernews.com/2015/03/thousands-of-hacked-uber-accounts_30.html?m=1&lt;br /&gt;
* Threat Intelligence Quarterly, IBM, 1Q 2015 https://www.ibm.com/services/forms/signup.do?source=swg-WW_Security_Organic&amp;amp;S_PKG=ov33510&amp;amp;S_TACT=C327017W&amp;amp;dynform=18101&lt;br /&gt;
* Threat Modeling: Designing for Security, Adam Shostack, Wiley, April 2014 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118809998.html&lt;br /&gt;
*	Threats and Mitigations: A Guide to Multi-Layered Web Security - eBook	 Prolexic	 	 http://www.prolexic.com/knowledge-center/prolexic-download/guide-multi-layered-web-security-ebook.pdf		&lt;br /&gt;
* Trapping Unknown Malware in a Context Web, Sophos http://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/HuqSzabo-VB2013.pdf?la=en.pdf&lt;br /&gt;
*	Trustwave Global Security Report	2014	 https://www2.trustwave.com/GSR2014.html?utm_source=redirect&amp;amp;utm_medium=web&amp;amp;utm_campaign=GSR2014			&lt;br /&gt;
*	TurboTax’s Anti-Fraud Efforts Under Scrutiny	 http://krebsonsecurity.com/2015/02/turbotaxs-anti-fraud-efforts-under-scrutiny/				&lt;br /&gt;
*	Two Security Vulnerabilities in the Spring Framework’s MVC pdf (from 2008)	 http://blog.diniscruz.com/2011/07/two-security-vulnerabilities-in-spring.html&lt;br /&gt;
*	The Underground Economy of Spam: A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns	 http://static.usenix.org/events/leet11/tech/full_papers/Stone-Gross.pdf					&lt;br /&gt;
*	Understanding Web Bots and How They Hurt Your Business	 Encapsula	 http://www.slideshare.net/Incapsula/understanding-web-bots-and-how-they-hurt-your-business		&lt;br /&gt;
* Use of A Taxonomy of Security Faults, Taimur Aslam, Ivan Krsul and Eugene H Spafford, 1996  http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=2304&amp;amp;context=cstech&lt;br /&gt;
*	The WASC Threat Classification v2.0	 http://projects.webappsec.org/w/page/13246978/Threat%20Classification	&lt;br /&gt;
* Warhol Worms: The Potential for Very Fast Internet Plagues http://www.iwar.org.uk/comsec/resources/worms/warhol-worm.htm	&lt;br /&gt;
*	Web Application Attack Report #5	 Imperva	 http://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed5.pdf	&lt;br /&gt;
* Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Ryan Barnett, Wiley, December 2012 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118362187.html		&lt;br /&gt;
*	Web Attacks in the Wild	 Corsaire	 https://www.owasp.org/images/a/a7/Web_attacks_in_the_wild_-_ap.pdf			&lt;br /&gt;
*	Web Automation	 Friend or Foe?	 https://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf			&lt;br /&gt;
*	Web Spambot Detection Based on Web Navigation Behaviour 	 http://pedramhayati.com/papers/Web_Spambot_Detection_Based_on_Web_Usage_Behaviour.pdf		&lt;br /&gt;
* Website Security Statistics Report, 2014 http://info.whitehatsec.com/rs/whitehatsecurity/images/statsreport2014-20140410.pdf		&lt;br /&gt;
*	What is Zeus?	 http://www.sophos.com/medialibrary/pdfs/technical%20papers/sophos%20what%20is%20zeus%20tp.pdf				&lt;br /&gt;
*	When Web 2.0 Attacks! Understanding Ajax	 Flash and other highly interactive web technologies…	 https://www.owasp.org/images/f/fc/When_Web_2.0_Attacks_-_Understanding_Security_Implications_of_Highly_Interactive_Technologies-Rafal_Los.pdf			&lt;br /&gt;
*	Where have all of our Passwords Gone?	 Gartner	2015	 http://blogs.gartner.com/avivah-litan/2015/01/22/where-have-all-our-passwords-gone/		&lt;br /&gt;
*	WS-Attacks.org	 http://www.ws-attacks.org/index.php/Main_Page&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; What do you mean by &amp;quot;web&amp;quot;, &amp;quot;application&amp;quot; and &amp;quot;automated threat&amp;quot;?&lt;br /&gt;
: See the definitions in the project's {{#switchtablink:Project Scope and Definitions|glossary}}.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;ontology&amp;quot;?&lt;br /&gt;
: An ontology is a set of types, properties, and relationship. These together define a subject description language. This particular ontology is meant to represent what automated threats real world owners observe affecting their web applications in usual operations.&lt;br /&gt;
&lt;br /&gt;
; Isn't this another bug (vulnerability) list?&lt;br /&gt;
: No, none of the named automated threat events are implementation bugs - they relate to abuse of functionality using automated means.&lt;br /&gt;
&lt;br /&gt;
; I thought &amp;quot;so and so&amp;quot; already did that?&lt;br /&gt;
: We found that it did not exist. While many threats are mentioned in the sources researched, there was no overall list or definitions. We found the automated threat events tended to all be in a small number of definied items from Mitre CAPEC and WASC Threat Classification. If you know of other automated threat lists/taxonomies/ontologies, please share them.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;oat&amp;quot;?&lt;br /&gt;
: It is our abbreviation for OWASP Automated Threat (OAT).&lt;br /&gt;
&lt;br /&gt;
; I am confused and don't know which OAT my problem is - how do I identify it?&lt;br /&gt;
: In 2017 we created a [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] to help identify the correct OAT, which can then be confirmed by reading the full description in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook]. The short summaries are important explanations of each OAT name.&lt;br /&gt;
&lt;br /&gt;
; How can I help?&lt;br /&gt;
: Please join our mailing list, send ideas, contribute clarifications, corrections and improvement, and let other people know about the project and its handbook.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements and Sponsors =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
* Sumit Agarwal&lt;br /&gt;
* Jason Chan&lt;br /&gt;
* Mark Hall&lt;br /&gt;
* Omri Iluz&lt;br /&gt;
* Andrew van der Stock&lt;br /&gt;
* Roland Weber&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
Additionally other professional colleagues and website owners and operators who provided feedback.&lt;br /&gt;
&lt;br /&gt;
==Reviewers==&lt;br /&gt;
&lt;br /&gt;
* Igor Andriushchenko&lt;br /&gt;
* Gabriel Mendez Justiniano&lt;br /&gt;
* Matt Tesauro&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
All OWASP Projects are run and developed by volunteers and rely on personal donations and sponsorship to continue their development. OWASP does not endorse or recommend commercial products or services, allowing our community to remain vendor neutral with the collective wisdom of the best minds in software security worldwide. This project has received the sponsorship part of their Corporate OWASP membership fees from Verizon Digital Media Services in 2016 and Distil Networks in 2017, which has already contributed to the v1.2 production design costs, and will also be utilised to help promote knowledge of the project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[file:Verizon_Digital_Medial_Logo.jpg|size=150x45px|link=https://www.verizondigitalmedia.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Distil-flat-logo-2.png|link=https://www.distilnetworks.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Can you help? The project is looking for information on the prevalence and types of automated threats seen by web application owners in the real world. This will be used to refine and organise the information gathered from research papers, whitepapers, security reports and industry news. Please use the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/automated_threats_to_web_applications Mailing list]&lt;br /&gt;
&lt;br /&gt;
To share information confidentially, you can email the project leaders directly: [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:colin.watson@owasp.org Colin Watson].&lt;br /&gt;
&lt;br /&gt;
== Completed Outputs==&lt;br /&gt;
&lt;br /&gt;
* {{#switchtablink:Scope and Definitions|Glossary}}&lt;br /&gt;
* {{#switchtablink:Bibliography|Bibligraphy of information sources}}&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automated-threats.pdf summary chart] has been published summarising the information gathered and work to date&lt;br /&gt;
* Identifying automated threats to web applications, and determining the primary name used. This first part of the project intends to produce a consistent vocabulary for discussing the threats before moving onto other aspects&lt;br /&gt;
* The primary terms have now been defined and described for the ontology&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automation-briefing.pdf briefing document] was produced in May 2015&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Automated Threat Handbook] July 2015 [https://www.owasp.org/index.php/File:Owasp-automated-threat-handbook-source-files.zip source files], updated in November 2016&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automation-project-briefing.pdf project overview flyer]  July 2015&lt;br /&gt;
* Release  [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] December 2016&lt;br /&gt;
&lt;br /&gt;
== Roadmap==&lt;br /&gt;
&lt;br /&gt;
The project's roadmap was updated in October 2017.&lt;br /&gt;
&lt;br /&gt;
===Q1 2015===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Feb 2015: Define scope and terminology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Mar 2015: Research prior work and reports about automated threats to web applications to create bibliography&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q2 2015===&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Assess threats/attacks and create ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Application owner interviews and creation of initial project outputs, to refine model&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Publication of outputs and request for review/data&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Summit session and survey at AppSec EU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Write ontology document&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Write 2-page project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Publish project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul 2015: Publish v1.0 ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q3 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul-Sep 2016: Gathering of additional contributions and update handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q4 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Nov 2016: Release updated handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec 2016: Threat identification chart&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q1 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec-Mar 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check against changes to CAPEC v2.9&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q2 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Apr-Jun 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecEU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q3 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Chase up ongoing project review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecUS&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q4 2017 ===&lt;br /&gt;
* Release v1.2 (now due 15 Feb 2018)&lt;br /&gt;
&lt;br /&gt;
=== Q1 2018 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create OAT wiki pages&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Future ===&lt;br /&gt;
* Write executive summary&lt;br /&gt;
* Release executive summary document&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-SR-2]] [[Category:SAMM-TA-1]] [[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=237953</id>
		<title>OWASP Automated Threats to Web Applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=237953"/>
				<updated>2018-02-21T18:36:48Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Automated Threats */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Automated-threats-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Automated Threats to Web Applications==&lt;br /&gt;
&lt;br /&gt;
The OWASP Automated Threats to Web Applications Project has completed a review of reports, academic and other papers, news stories and vulnerability taxonomies/listings to identify, name and classify these scenarios – automated by software causing a divergence from accepted behavior producing one or more undesirable effects on a web application, but excluding tool-based exploitation of single-issue vulnerabilities. The initial objective was to produce an ontology providing a common language for developers, architects, operators, business owners, security engineers, purchasers and suppliers/ vendors, to facilitate clear communication and help tackle the issues.&lt;br /&gt;
The project also identifies symptoms, mitigations and controls in this problem area. Like all OWASP outputs, everything is free and published using an open source license.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Automation-project-briefing.pdf Two page summary project briefing as a PDF].&lt;br /&gt;
&lt;br /&gt;
== Description==&lt;br /&gt;
&lt;br /&gt;
Web applications are subjected to unwanted automated usage – day in, day out. Often these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is commonly mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the primary intent. Frequently these have sector-specific names. Most of these problems seen regularly by web application owners are not listed in any OWASP Top Ten or other top issue list. Furthermore, they are not enumerated or defined adequately in existing dictionaries. These factors have contributed to inadequate visibility, and an inconsistency in naming such threats, with a consequent lack of clarity in attempts to address the issues.&lt;br /&gt;
&lt;br /&gt;
Without sharing a common language between devops, architects, business owners, security engineers, purchasers and suppliers/vendors, everyone has to make extra effort to communicate clearly. Misunderstandings can be costly. The adverse impacts affect the privacy and security of individuals as well as the security of the applications and related system components.&lt;br /&gt;
&lt;br /&gt;
== Automated Threats ==&lt;br /&gt;
&lt;br /&gt;
The list of threat events, defined more fully in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-020 Account Aggregation]]&lt;br /&gt;
* [[OAT-019 Account Creation]]&lt;br /&gt;
* [[OAT-003 Ad Fraud]]&lt;br /&gt;
* [[OAT-009 CAPTCHA Defeat]]&lt;br /&gt;
* [[OAT-010 Card Cracking]]&lt;br /&gt;
* [[OAT-001 Carding]]&lt;br /&gt;
* [[OAT-012 Cashing Out]]&lt;br /&gt;
* [[OAT-007 Credential Cracking]]&lt;br /&gt;
* [[OAT-008 Credential Stuffing]]&lt;br /&gt;
* [[OAT-021 Denial of Inventory]]&lt;br /&gt;
* [[OAT-015  Denial of Service]]&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-006 Expediting]]&lt;br /&gt;
* [[OAT-004 Fingerprinting]]&lt;br /&gt;
* [[OAT-018 Footprinting]]&lt;br /&gt;
* [[OAT-005 Scalping]]&lt;br /&gt;
* [[OAT-011 Scraping]]&lt;br /&gt;
* [[OAT-016 Skewing]]&lt;br /&gt;
* [[OAT-013 Sniping]]&lt;br /&gt;
* [[OAT-017 Spamming]]&lt;br /&gt;
* [[OAT-002 Token Cracking]]&lt;br /&gt;
* [[OAT-014 Vulnerability Scanning]]&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
Not sure which is which? Use the [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] in conjunction with the full [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
All the materials are free to use. They are licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What Is This? ==&lt;br /&gt;
&lt;br /&gt;
Information and resources to help web application owners defend against [[:Category:Automated Threat|automated threats]]&lt;br /&gt;
&lt;br /&gt;
== What Isn't It? ==&lt;br /&gt;
&lt;br /&gt;
* Another vulnerability list&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Attack trees&lt;br /&gt;
* Non web&lt;br /&gt;
* Non application&lt;br /&gt;
&lt;br /&gt;
==Project Objective==&lt;br /&gt;
&lt;br /&gt;
This project brings together research and analysis of real world automated attacks against web applications, to produce documentation to assist operators defend against these threats. Sector-specific guidance will be available.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Automatedthreats-presentation-small.jpg|link=media:Bots-AppSecUSA2017-Project-Summit.pptx]]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP WASC Web Hacking Incidents Database Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
* [[OWASP AppSensor Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP ModSecurity Core Rule Set Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Download the free handbook as a PDF]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [16 Feb 2018] OAT wiki pages created&lt;br /&gt;
* [15 Feb 2018] v1.2 Handbook published&lt;br /&gt;
* [25 Sep 2017] Promoted to Labs status&lt;br /&gt;
* [19-20 Sep 2017] Working session at the AppSecUSA 2017 Project Summit&lt;br /&gt;
* [15 May 2017] Draft feedback on Top Ten A7 shared&lt;br /&gt;
* [17 Apr 2017] [https://www.owasp.org/index.php/File:BadBots_OWASP_AppSec_CA_2017.pptx Slides] from AppSec California (2017)&lt;br /&gt;
* [20 Dec 2016] Threat identification chart [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf published]&lt;br /&gt;
* [03 Nov 2016] Presentation at [http://lascon.org/ LASCON 2016]&lt;br /&gt;
* [03 Nov 2016] v1.1 Handbook published&lt;br /&gt;
* [11-12 Oct 2016] Working session at the [https://docs.google.com/presentation/d/1iMQHTc-h5qcP7gBBRcPHGmVaTWqx3dpMwNMVlA--rqs/edit#slide=id.p3 AppSecUSA 2017 Project Summit]&lt;br /&gt;
* [04 Aug 2016] Project Q&amp;amp;A at Blackhat USA 2-5pm in the OWASP booth&lt;br /&gt;
* [26 Oct 2015] [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf v1.01 handbook] published&lt;br /&gt;
* [24 Sep 2015] [https://www.owasp.org/index.php/File:Colinwatson-a-new-ontology-of-unwanted-automation.pptx Presentation] at [https://2015.appsecusa.org/c/?page_id=896#a AppSec USA 2015]&lt;br /&gt;
&lt;br /&gt;
==In Print==&lt;br /&gt;
&lt;br /&gt;
[[File:AutomatedThreatHandbook_small.jpg|link=http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22932107.html]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22932107.html Automated Threat Handbook] can be purchased at cost as a print on demand book.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
    &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Scope and Definitions =&lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The aim was to create a listing of vendor-neutral and technology agnostic terms that describe real-world automated threats to web applications, at a level of abstraction that application owners can relate to. These terms are threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
The focus is on abuse of functionality - misuse of inherent functionality and related design flaws, some of which are also referred to as business logic flaws. There is almost no focus on implementation bugs. It is not that the latter are not the target for attacks, but there is much more knowledge published in that area with a greater agreement on terminology. All the scenarios identified must require the web to exist for the threat to be materialised. Many of the scenarios have impacts upon the organisation that owns or operates web applications, but some scenarios have impacts more focused on individuals or other bodies. An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
==Definitions ==&lt;br /&gt;
&lt;br /&gt;
=== Automated Threats to Web Applications ===&lt;br /&gt;
&lt;br /&gt;
Threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
== Glossary ==&lt;br /&gt;
&lt;br /&gt;
;Action&lt;br /&gt;
: An act taken against an asset by a threat agent. Requires first that contact occurs between the asset and threat agent (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Application&lt;br /&gt;
: Software that performs a business process i.e. not system software&lt;br /&gt;
: A software program hosted by an information system (Ref 2)&lt;br /&gt;
&lt;br /&gt;
; Application layer&lt;br /&gt;
: &amp;quot;Layer 7” in the OSI model (Ref 3) and “application layer” in the TCP/IP model (Ref 4)&lt;br /&gt;
&lt;br /&gt;
;Threat&lt;br /&gt;
: Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events, etc.); malicious actors; errors; failures (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Agent&lt;br /&gt;
: Any agent (e.g., object, substance, human, etc.) that is capable of acting against an asset in a manner that can result in harm (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Event&lt;br /&gt;
: Occurs when a threat agent acts against an asset (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Web&lt;br /&gt;
: The World Wide Web (WWW, or simply Web) is an information space in which the items of interest, referred to as resources, are identified by global identifiers called Uniform Resource Identifiers (URI) (Ref 5)&lt;br /&gt;
: The first three specifications for Web technologies defined URLs, HTTP, and HTML (Ref 6)&lt;br /&gt;
&lt;br /&gt;
; Web application&lt;br /&gt;
: An application delivered over the web&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Glossary references:&lt;br /&gt;
# [http://pubs.opengroup.org/onlinepubs/9699919899/toc.pdf Risk Taxonomy, Technical Standard, The Open Group, 2009]&lt;br /&gt;
# [http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf NISTIR 7298 rev 2, NIST]&lt;br /&gt;
# [http://en.wikipedia.org/wiki/OSI_model OSI model, Wikipedia] &lt;br /&gt;
# [http://en.wikipedia.org/wiki/Internet_protocol_suite TCP/IP model, Wikipedia]&lt;br /&gt;
# [http://www.w3.org/TR/webarch/ Architecture of the World Wide Web, Volume One, W3C]&lt;br /&gt;
# [http://www.w3.org/Help/ Help and FAQ, W3C]&lt;br /&gt;
&lt;br /&gt;
=Use Case Scanarios=&lt;br /&gt;
&lt;br /&gt;
The following scenarios and organisation names are completely fictitious.&lt;br /&gt;
&lt;br /&gt;
==Defining application development security requirements==&lt;br /&gt;
&lt;br /&gt;
Cinnaminta SpA intends to build and launch a new multi-lingual and multi-currency ecommerce website. The development will be outsourced and Cinnaminta has been working on the functional design document. Among many other requirements, the application security specification requires that the website must not include any vulnerabilities identified in PCI DSS v3.1 Requirement 6.5, nor any other vulnerabilities that could affect the protection of payment cardholder data. Cinnaminta specifies that the website's payment functions must not be susceptible to the threat events '''OAT-001 Carding''' or '''OAT-010 Card Cracking''' as defined in the '''OWASP Automated Threat Handbook'''. In addition, the application must interact with the company's existing fraud detection system to counter '''OAT-012 Cashing Out'''. The requirements are specified in terms of these threat events, rather than particular product or service categories. Development houses responding to the call for bids use the ontology to focus their answers to these aspects appropriately.&lt;br /&gt;
&lt;br /&gt;
== Sharing intelligence within a sector==&lt;br /&gt;
&lt;br /&gt;
Unlimited Innovations Inc develops and supports patient-facing software solutions to a range of healthcare providers, many of which participate in the National Health Service Cyber Intelligence Sharing Center (NHS-CISC). Unlimited Innovations already builds continuous monitoring capabilities into its software and decides to provide an optional enhancement so that customers could choose to share their misuse event data with each other, to benefit from the combined threat intelligence. Rather than sharing large quantities of low-level data, Unlimited Innovations aggregates information and broadcasts validated and categorised threat data amongst the participating organisations. Automation attacks are classified according to the threat events defined in the '''OWASP Automated Threat Handbook''' so that each receiving party understands the nature of the threat. Even organisations that do not want to take part in this information sharing can benefit, since their own categorised information is made available to internal business management in the form of an easy-to-comprehend monitoring dashboard. The information gathered can also be fed into their other business information management systems to help improve patient service.&lt;br /&gt;
&lt;br /&gt;
== Exchanging threat data between CERTs==&lt;br /&gt;
&lt;br /&gt;
National Computer Emergency Response Teams (CERTs) recognise that sharing of local information can contribute to worldwide prevention of cyber attacks. Despite advances in cooperation between CERTs, anything to increase continuity and interoperability, such as standards for data exchange, is encouraged. CERT Zog is concerned about the sparsity of application-specific data it receives, and also the classification of that data. It has a particular concern about attacks and breaches that affect sectors defined in Zog's 2015 national cyber security strategy. CERT Zog and its neighbour CERT Tarset agree to tag threat events using the '''OWASP Automated Threat Handbook''' in order to add greater context to existing solutions being used for threat data exchange between them. The programme also collects sector metadata, so that all organisations within these can benefit from the centralised intelligence.&lt;br /&gt;
&lt;br /&gt;
== Enhancing application penetration test findings==&lt;br /&gt;
&lt;br /&gt;
Specialist application security penetration testing firm Cherak Industries Pte Ltd works primarily for financial services companies in the banking and insurance sectors, and is looking to expand its business throughout Asia. Cherak has some innovative pen test result reporting systems which integrate with client software fault and vulnerability tracking systems, and it actively looks for methods to provide additional value to its clients. Cherak has identified that pen test clients would benefit from help to in understanding the effects of combinations of vulnerabilities, especially design flaws, and has decided to utilise the '''OWASP Automated Threat Handbook''' to define and explain the automation-related threats. The individual vulnerabilities were scored as normal using CVSSv2 and v3, the matching CWEs identified, and mitigations in place documented. In addition, Cherak uses the threat events defined in the '''OWASP Automated Threat Handbook''' to help create a new section in the executive summary that explains how combinations of the issues found could lead to automation threats and the possible technical and business impacts. For example, an assessment for one client had identified weaknesses in authentication so that there is a risk of '''OAT-008 Credential Stuffing'''. The defined identifier was provided to the client, so its technical staff could refer to additional information on the OWASP website.&lt;br /&gt;
&lt;br /&gt;
== Specifying service acquisition needs==&lt;br /&gt;
&lt;br /&gt;
Falstone Paradise Inc is concerned about malicious use of their portfolio of hotel and resort websites. The majority of the websites use a shared application platform, but there are some unique applications and a large number of other micro-sites, some of which use generic content management systems such as Wordpress and Drupal. Falstone Paradise has identified that its IT operations team are spending too much time dealing with the effects of automated misuse, such as cleaning up data, resetting customer accounts and providing extra capacity during attacks. Furthermore, the unwanted automation is also causing some instabilities leading to negative feedback from customers. Therefore Falstone Paradise decides to go out to the security marketplace to identify, assess and select products or services that might help address these automation issues for all its websites. Their buying team works with their information technology colleagues to write the detailed requirements in an Invitation to Tender (ITT) document. This describes the types of attacks its web applications are receiving, their frequency of occurrence and their magnitudes. These are defined according to the '''OWASP Automated Threat Handbook''', so that vendors do not misunderstand the requirements, and each vendor's offering can be assessed against the particular automation threat events of concern.&lt;br /&gt;
&lt;br /&gt;
== Characterising vendor services ==&lt;br /&gt;
&lt;br /&gt;
Better Best Ltd has developed an innovative technology to help gaming companies defend against a range of automated threats that can otherwise permit cheating and distortion of the game, leading to disruption for normal players. The solution can be deployed on premises, but is also available in the cloud as a service. But Better Best is finding difficulty explaining its solution in the market place, especially since it does not fit into any conventional product category. Better Best decide to use the terminology and threat events listed in the '''OWASP Automated Threat Handbook''' to define their product's capabilities. They hope this will provide some clarity about their offering, and also demonstrate how their product can be used to replace more than one other conventional security device. Additionally, Better Best writes a white paper describing how their product has been successfully used by one of their reference customers Hollybush Challenge Games to protect against '''OAT-006 Expediting''', '''OAT-005 Scalping''', '''OAT-016 Skewing''' and '''OAT-013 Sniping'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Ontology=&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The list of [[:Category:Automated Threat|automated threat events]] and summary descriptions, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-020'''	  Account Aggregation&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Use by an intermediary application that collects together multiple accounts and interacts on their behalf.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-019'''	  Account Creation&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Create multiple accounts for subsequent misuse.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-003'''	  Ad Fraud&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
False clicks and fraudulent display of web-placed advertisements.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-009'''	  CAPTCHA Defeat&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Solve anti-automation tests.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-010'''	  Card Cracking&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify missing start/expiry dates and security codes for stolen payment card data by trying different values.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-001'''	  Carding&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Multiple payment authorisation attempts used to verify the validity of bulk stolen payment card data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-012'''	  Cashing Out&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Buy goods or obtain cash utilising validated stolen payment card or other user account data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-007'''	  Credential Cracking&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify valid login credentials by trying different values for usernames and/or passwords.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-008'''	  Credential Stuffing&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass log in attempts used to verify the validity of stolen username/password pairs.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-021'''	  Denial of Inventory&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Deplete goods or services stock without ever completing the purchase or committing to the transaction.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-015'''	  Denial of Service&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Target resources of the application and database servers, or individual user accounts, to achieve denial of service (DoS).&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-006'''	  Expediting&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Perform actions to hasten progress of usually slow, tedious or time-consuming actions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-004'''	  Fingerprinting&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Elicit information about the supporting software and framework types and versions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-018'''	  Footprinting&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Probe and explore application to identify its constituents and properties.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-005'''	  Scalping&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Obtain limited-availability and/or preferred goods/services by unfair methods.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-011'''	  Scraping&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Collect application content and/or other data for use elsewhere.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-016'''	  Skewing&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Repeated link clicks, page requests or form submissions intended to alter some metric.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-013'''	  Sniping&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Last minute bid or offer for goods or services.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-017'''	  Spamming&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Malicious or questionable information addition that appears in public or private content, databases or user messages.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-002'''	  Token Cracking&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass enumeration of coupon numbers, voucher codes, discount tokens, etc.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-014'''	  Vulnerability Scanning&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Crawl and fuzz application to identify weaknesses and possible vulnerabilities.&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Comparison with other dictionaries, taxonomies and lists==&lt;br /&gt;
&lt;br /&gt;
===[https://capec.mitre.org/ Common Attack Pattern Enumeration and Classification] (CAPEC)===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-capec-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
CAPEC is a dictionary and classification taxonomy of known attacks on software. Its primary classification structures are:&lt;br /&gt;
&lt;br /&gt;
* [https://capec.mitre.org/data/definitions/3000.html Domains of attack] (3000) - Social Engineering (403), [https://capec.mitre.org/data/definitions/437.html Supply Chain] (437), Communications (512), [https://capec.mitre.org/data/definitions/513.html Software] (513), Physical Security (514), Hardware (515)&lt;br /&gt;
* Mechanism of Attack (1000) - Gather Information (118), Deplete Resources (119), Injection (152), Deceptive Interactions (156), Manipulate Timing and State (172), Abuse of Functionality (210), Probabilistic Techniques (223), Exploitation of Authentication (225), Exploitation of Authorization (232), Manipulate Data Structures (255), Manipulate Resources (262), Analyze Target (281), Gain Physical Access (436), Malicious Code Execution (525), Alter System Components (526), Manipulate System Users (527)&lt;br /&gt;
&lt;br /&gt;
===[http://projects.webappsec.org/w/page/13246978/Threat%20Classification WASC Threat Classification]===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-wasc-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
The WASC Threat Classification classifies weaknesses and attacks that can lead to the compromise of a website, its data, or its users.&lt;br /&gt;
&lt;br /&gt;
===[[OWASP WASC Web Hacking Incidents Database Project]] (WHID)===&lt;br /&gt;
&lt;br /&gt;
WHID [https://www.google.com/fusiontables/DataSource?snapid=S1536501YnLo classifies] publicly known incidents using:&lt;br /&gt;
&lt;br /&gt;
* attack methods e.g. ARP spoofing, abuse of functionality, account compromise, administration error, automation, backdoor, banking trojan, brute force, clickjacking, code injection, content injection, content spoofing, credential/session prediction, cross site request forgery (CSRF), cross-site scripting (XSS), denial of service, directory traversal, domain hijacking, DNS hijacking, forceful browsing, HTTP response splitting, hidden parameter manipulation, hosting malicious code, information leakage, insufficient authentication, known vulnerability, local file inclusion (LFI), malvertising, malware, malware injection, mass assignment, misconfiguration, OS commanding, parameter manipulation, path traversal, phishing, predictable resource location, process automation, redirection, remote file inclusion (RFI), rogue 3rd party app, scaping, search engine poisoning, shell injection, social engineering, stolen credentials, SQL injection, unintentional information disclosure, weak password recovery validation, worm&lt;br /&gt;
* weakness e.g. abuse of functionality, application misconfiguration, directory indexing, improper filesystem permissions, improper input handling, improper output handling, information leakage, insecure indexing, insufficient anti-automation, insufficient authentication, insufficient authorization, insufficient entropy, insufficient password recovery, insufficient process validation, insufficient session expiration, insufficient transport layer protection, misconfiguration, predictable resource location, weak password&lt;br /&gt;
* outcome account hijacking, account takeover, botnet participation, chaos, credit card leakage, data loss, defacement, DDoS attacks, DNS hijacking, DNS redirection, disinformation, disclosure only, downtime, extortion, fraud, information warfare, leakage of information, link spam, loss of sales, malware distribution,  monetary loss, phishing, planting of malware, service disruption, session hijacking, spam, spam links, stolen credentials, worm&lt;br /&gt;
&lt;br /&gt;
Plus other/various/unknown.&lt;br /&gt;
&lt;br /&gt;
= Bibliography =&lt;br /&gt;
&lt;br /&gt;
The following academic, open source, commercial and news sources were used in the research on automated threats to web applications. OWASP is a worldwide not-for-profit charitable organization focused on improving the security of software.  We operate under a vendor neutral policy and we do not endorse products or services.&lt;br /&gt;
&lt;br /&gt;
* 10 years of Application Security, Denyall http://www.denyall.com/resources/whitepapers/?aliId=3438442&lt;br /&gt;
*	2012 Payment Card Threat Report	 https://www.securitymetrics.com/static/resources/orange/2012%20Payment%20Card%20Threat%20Report%20copy.pdf				&lt;br /&gt;
*	2014 Bot Traffic Report: Just the Droids You were Looking for	 http://www.incapsula.com/blog/bot-traffic-report-2014.html				&lt;br /&gt;
*	3 Types of ‘Return Fraud’ to Monitor this Holiday Season	 http://www.practicalecommerce.com/articles/3168-3-Types-of-%E2%80%98Return-Fraud-to-Monitor-this-Holiday-Season	&lt;br /&gt;
* 7 Ways Bots Hurt Your Website, Distil Networks http://www.distilnetworks.com/7-ways-bots-hurt-website-whitepaper/						&lt;br /&gt;
*	Abusing HTML 5 Structured Client-side Storage	2008	 http://packetstorm.wowhacker.com/papers/general/html5whitepaper.pdf		&lt;br /&gt;
* Acquiring Experience with Ontology and Vocabularies, Walt Melo, Risa Mayan and Jean Stanford, 2011  http://www.omg.org/news/meetings/workshops/SOA-HC/presentations-2011/13_SC-6_Melo_Stanford_Mayan.pdf	&lt;br /&gt;
*	An Anatomy of a SQL Injection Attack	 Hacker Intelligence Initiative	 Imperva	 	 http://www.imperva.com/docs/HII_An_Anatomy_of_a_SQL_Injection_Attack_SQLi.pdf	&lt;br /&gt;
*	The Anatomy of Clickbot.A	 https://www.usenix.org/legacy/event/hotbots07/tech/full_papers/daswani/daswani.pdf				&lt;br /&gt;
*	Anatomy of comment spam	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Anatomy_of_Comment_Spam.pdf		&lt;br /&gt;
*	Anti-Automation Monitoring and Prevention	2015	 https://www.clerkendweller.uk/2015/1/29/AntiAutomation-Monitoring-and-Prevention			&lt;br /&gt;
*	Anti-DDoS Solution for Internet Corporation	 http://www.nsfocus.com/uploadfile/Solution/NSFOCUS%20Anti-DDoS%20Solution%20for%20Internet%20Corporation.pdf				&lt;br /&gt;
*	Anti-Fraud Principles and Proposed Taxonomy	 Sep 2014	 http://www.iab.net/media/file/IAB_Anti_Fraud_Principles_and_Taxonomy.pdf			&lt;br /&gt;
*	Apache Security	 Ivan Ristic	 			&lt;br /&gt;
* Application Security Desk Reference, OWASP https://www.owasp.org/index.php/Category:OWASP_ASDR_Project&lt;br /&gt;
* Application Security Guide For CISOs, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf&lt;br /&gt;
* AppSensor, OWASP https://www.owasp.org/index.php/OWASP_AppSensor_Project&lt;br /&gt;
*	Attack &amp;amp; Defense Labs	 http://www.andlabs.org/html5.html				&lt;br /&gt;
*	Attack categories	 OWASP	 https://www.owasp.org/index.php/Category:Attack	&lt;br /&gt;
* Attack Trees, Schneier, Dr. Dobb's Journal, December 1999 https://www.schneier.com/paper-attacktrees-ddj-ft.html		&lt;br /&gt;
*	Attacking with HTML5	2010	 https://media.blackhat.com/bh-ad-10/Kuppan/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-wp.pdf			&lt;br /&gt;
*	Automated attacks	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Automation_of_Attacks.pdf		&lt;br /&gt;
*	Avoiding the Top 10 Software Security Design Flaws	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf				&lt;br /&gt;
*	Bad Bots On The Rise	 Dec 2014	 http://www.darkreading.com/informationweek-home/bad-bots-on-the-rise/d/d-id/1318276	&lt;br /&gt;
* Banking Botnets Persist Despite Takedowns, Dell SecureWorks, 2015 http://www.secureworks.com/cyber-threat-intelligence/threats/banking-botnets-persist-despite-takedowns/	&lt;br /&gt;
*	The Barracuda Web Application Firewall: XML Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_XML_Firewall.pdf	&lt;br /&gt;
*	Blocking Brute Force Attacks	 http://www.cs.virginia.edu/~csadmin/gen_support/brute_force.php				&lt;br /&gt;
*	Bot Traffic Growing Problem for Digital	 Oct 2014	 http://www.netnewscheck.com/article/36537/bot-traffic-growing-problem-for-digital			&lt;br /&gt;
*	BotoPedia	 Incapsula	 http://www.botopedia.org/			&lt;br /&gt;
*	Boy in the Browser	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/Boy_in_the_Browser	&lt;br /&gt;
* Business Logic Attacks - Bots and BATs, Eldad Chai, 2009 http://www.owasp.org/images/9/96/AppSecEU09_BusinessLogicAttacks_EldadChai.ppt		&lt;br /&gt;
*	Bypassing Client Application Protection Techniques	 http://www.securiteam.com/securityreviews/6S0030ABPE.html&lt;br /&gt;
*	A CAPTCHA in the Rye	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_a_CAPTCHA_in_the_Rye.pdf					&lt;br /&gt;
*	Characterizing Large Scale Click fraud	 http://cseweb.ucsd.edu/~voelker/pubs/za-ccs14.pdf	&lt;br /&gt;
* Charter Addition Proposal: &amp;quot;Trusted Code&amp;quot; for the Web https://lists.w3.org/Archives/Public/public-webappsec/2015Mar/0150.html&lt;br /&gt;
*	A cheesy Apache / IIS DoS vuln (+a question) 	 http://www.securityfocus.com/archive/1/456339/30/0/threaded	&lt;br /&gt;
* China's Man-on-the-Side Attack on GitHub http://www.netresec.com/?page=Blog&amp;amp;month=2015-03&amp;amp;post=China%27s-Man-on-the-Side-Attack-on-GitHub&lt;br /&gt;
* The CISO Survey and Report, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-report-2013-1.0.pdf&lt;br /&gt;
* Common Attack Pattern Enumeration and Classification (CAPEC), Mitre https://capec.mitre.org/			&lt;br /&gt;
*	Common Cyber Attacks: Reducing the Impact	 CERT-UK	 https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/400106/Common_Cyber_Attacks-Reducing_The_Impact.pdf			&lt;br /&gt;
*	Corporate espionage – the internet’s new growth industry	 http://www.itproportal.com/2015/03/19/corporate-espionage-internets-new-growth-industry/				&lt;br /&gt;
*	CSA Top Threats to Cloud Computing	 https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf				&lt;br /&gt;
*	CSRF vulnerability in GMail service	 http://seclists.org/fulldisclosure/2009/Mar/29		&lt;br /&gt;
* CWE/SANS Top 25 Most Dangerous Software Errors, 2011 http://cwe.mitre.org/top25/		&lt;br /&gt;
*	Cyber Fraud - Tactics	 Techniques and Procedures	 http://www.crcpress.com/product/isbn/9781420091274			&lt;br /&gt;
* Cybercrime Report: Q1 2015, ThreatMetrix, 2015 http://info.threatmetrix.com/WP-2015Q1CybercrimeReport_WP-LP.html&lt;br /&gt;
*	Data Breach Investigations Report (DBIR), 2014	 http://www.verizonenterprise.com/DBIR/2014/				&lt;br /&gt;
* Data Breach Investigations Report (DBIR), 2015 http://www.verizonenterprise.com/DBIR/2015/&lt;br /&gt;
*	Data Breaches Fuel Login Attacks	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2014-state-of-the-internet-threat-advisory-public-data-breaches-fuel-login-attacks.pdf		&lt;br /&gt;
*	Data Scraping	 Wikipedia	 http://en.wikipedia.org/wiki/Data_scraping			&lt;br /&gt;
*	DDoS Quick Guide	 https://www.us-cert.gov/sites/default/files/publications/DDoS%20Quick%20Guide.pdf	&lt;br /&gt;
* DDoS Threat Landscape Report, 2013-2014 http://lp.incapsula.com/rs/incapsulainc/images/2013-14_ddos_threat_landscape.pdf	&lt;br /&gt;
* Defending Against an Internet-based Attack on the Physical World http://avirubin.com/scripted.attacks.pdf		&lt;br /&gt;
*	Defending Against Application-Based DDoS Attacks with the Barracuda Web Application Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_Defending%20_Against_%20Application-Based_%20DDoS_%20Attacks.pdf				&lt;br /&gt;
*	Demystifying HTML 5 Attacks	 http://resources.infosecinstitute.com/demystifying-html-5-attacks/				&lt;br /&gt;
*	Denial of Service Attacks: A Comprehensive Guide to Trends	 Techniques	 and Technologies	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Denial_of_Service_Attacks-Trends_Techniques_and_Technologies.pdf&lt;br /&gt;
*	Detecting and Blocking Site Scraping Attacks	 Imperva	 http://www.imperva.com/docs/WP_Detecting_and_Blocking_Site_Scraping_Attacks.pdf			&lt;br /&gt;
*	Detecting Automation of Twitter Accounts: Are you a human	 cyborg	 or a bot?	 http://www.cs.wm.edu/~hnw/paper/tdsc12b.pdf		&lt;br /&gt;
*	Detecting Malice	 Robert &amp;quot;RSnake&amp;quot; Hansen	2009	 http://www.detectmalice.com/		&lt;br /&gt;
*	Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) 	 http://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1414072277428&amp;amp;uri=CELEX:32002L0058				&lt;br /&gt;
*	Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data 	 http://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:31995L0046				&lt;br /&gt;
*	Distributed Denial-of-Service (DDoS) Cyber-Attacks	 Risk Mitigation	 and Additional Resources	 Federal Financial Institutions Examination Council	 http://www.ffiec.gov/press/PDF/FFIEC%20DDoS%20Joint%20Statement.pdf	&lt;br /&gt;
*	Do Evil - The Business of Social Media Bots	 Forbes	 http://www.forbes.com/sites/lutzfinger/2015/02/17/do-evil-the-business-of-social-media-bots/			&lt;br /&gt;
*	DoS and DDoS Glossary of Terms	 prolexic	 http://www.prolexic.com/knowledge-center-dos-and-ddos-glossary.html#layer-7-ddos-attack			&lt;br /&gt;
*	E-commerce Malware	 Trustwave	 https://gsr.trustwave.com/topics/placeholder-topic/e-commerce-malware/	&lt;br /&gt;
* Exploiting Software, G. Hoglund and G. McGraw, Addison-Wesley, 2004&lt;br /&gt;
* Five Trends to Track in E-Commerce Fraud, ThreatMetrix, 2013 http://info.threatmetrix.com/rs/threatmetrix/images/Five_Trends_eCommerce_Fraud_WP.pdf&lt;br /&gt;
* Hacker builds cheatbot for hit app Trivia Crack http://www.theregister.co.uk/2015/03/26/hacker_builds_trivia_crack_cheat_app/	&lt;br /&gt;
* Has Walmart opened itself up to “Denial of inventory” attacks?  https://arstechnica.com/business/2012/05/has-walmart-opened-itself-up-to-denial-of-inventory-attacks/	&lt;br /&gt;
* How Hoarder Bots Steal sales from Online Retailers https://www.internetretailer.com/mobile/2016/12/16/how-hoarder-bots-steal-sales-online-retailers&lt;br /&gt;
*	How to Defend Against DDoS Attacks - Strategies for the Network	 Transport	 and Application Layers	 Prolexic	 http://www.prolexic.com/kcresources/white-paper/strategies-for-the-network-transport-and-application-layers-412/Strategies_for_the_Network_Transport_and_Application_Layers_Prolexic_White_Paper_A4_082412.pdf	&lt;br /&gt;
* How to Defend Online Travel Websites in the Era of Site Scraping, Distil Networks http://www.distilnetworks.com/defend-online-travel-websites-era-site-scraping-download/&lt;br /&gt;
*	How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores	 http://research.microsoft.com/pubs/145858/caas-oakland-final.pdf				&lt;br /&gt;
*	HTML5 Overview	 A look at HTML5 Attack Scenarios	 Trend Micro	2011	 http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt_html5-attack-scenarios.pdf	&lt;br /&gt;
*	HTML5 Top 10 Threats Stealth Attacks and Silent Exploits	2012	 https://media.blackhat.com/bh-eu-12/shah/bh-eu-12-Shah_HTML5_Top_10-WP.pdf			&lt;br /&gt;
*	HTML5 web security	2011	 http://media.hacking-lab.com/hlnews/HTML5_Web_Security_v1.0.pdf			&lt;br /&gt;
*	HTTPPOST - Slow POST	 Wong Onn Chee	 OWASP AppSec DC 2010	 https://www.owasp.org/images/4/43/Layer_7_DDOS.pdf	&lt;br /&gt;
* If you've got @British_Airways account may make sense to change your password. Just had all my Avios cleared out! https://twitter.com/suttonnick/status/581556027948195840/photo/1	&lt;br /&gt;
* Internet Security Threat Report, Volume 19, 2014 http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf&lt;br /&gt;
*	An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks	 http://www.springer.com/gb/book/9788132202769	&lt;br /&gt;
*	Is Your Data Center Ready for Today’s DDoS Threats? DDoS attack types	 protection methods and testing your detection and mitigation defenses	 http://www.fortinet.com/sites/default/files/whitepapers/WP-DDoS-Testing.pdf			&lt;br /&gt;
*	Joomla Reflection DDoS-for-Hire	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2015-state-of-the-internet-threat-advisory-joomla-reflection-attack-ddos-for-hire.pdf		&lt;br /&gt;
*	Layer 7 DDOS – Blocking HTTP Flood Attacks	 http://blog.sucuri.net/2014/02/layer-7-ddos-blocking-http-flood-attacks.html				&lt;br /&gt;
*	Lenovo	 Superfish put smut on my system' – class-action lawsuit	 The Register	 http://www.theregister.co.uk/2015/02/23/lenovo_superfish_class_action_lawsuit/		&lt;br /&gt;
* List of Attack Vectors   Relative Vulnerability Rating TECAPI http://www.tecapi.com/public/relative-vulnerability-rating-gui.jsp#&lt;br /&gt;
*	Man in the Browser	 http://scisweb.ulster.ac.uk/~kevin/IJACI-Vol4No1-maninbrowser.pdf				&lt;br /&gt;
*	Man in the Browser Attack	 https://www.owasp.org/index.php/Man-in-the-browser_attack&lt;br /&gt;
* Mapping and Measuring Cybercrime, Oxford Internet Institute http://www.oii.ox.ac.uk/publications/FD18.pdf				&lt;br /&gt;
*	Massive Changes in the Criminal Landscape	 Europol	2015	 https://www.europol.europa.eu/content/massive-changes-criminal-landscape	&lt;br /&gt;
* Matching Attack Patterns to Security Vulnerabilities in Software-Intensive System Designs http://collaboration.csc.ncsu.edu/laurie/Papers/ICSE_Final_MCG_LW.pdf	&lt;br /&gt;
*	Mitigating DDoS Attacks with F5 Technology	 F5	 https://f5.com/resources/white-papers/mitigating-ddos-attacks-with-f5-technology			&lt;br /&gt;
* Mitigating the DoS/DDosS Threat, Radware, 2012 http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452061&lt;br /&gt;
* Modern Web Attacks, Sophos, 2007 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/modern-web-attacks.aspx&lt;br /&gt;
*	ModSecurity Advanced Topic of the Week: Mitigating Slow HTTP DoS Attacks	 https://www.trustwave.com/Resources/SpiderLabs-Blog/(Updated)-ModSecurity-Advanced-Topic-of-the-Week--Mitigating-Slow-HTTP-DoS-Attacks/	&lt;br /&gt;
* Most common attacks on web applications https://ipsec.pl/web-application-security/most-common-attacks-web-applications.html			&lt;br /&gt;
* Multi-dimensional Vulnerability Hierarchies Daniel Miessler  https://danielmiessler.com/study/multi-dimensional-vulnerability-hierarchies/&lt;br /&gt;
*	New Wave of DDoS Attacks Launched	 BankInfoSecurity.com	 Mar 2013	 http://www.bankinfosecurity.com/new-wave-ddos-attacks-launched-a-5584/op-1		&lt;br /&gt;
*	NOMAD: Toward Non-Invasive Moving Target Defense Against Web Bots	 http://faculty.cs.tamu.edu/guofei/paper/NOMAD_CNS13.pdf				&lt;br /&gt;
*	Online Ad Fraud Exposed: Advertisers Losing $6.3 Billion To $10 Billion Per Year	 Sep 2014	 http://www.darkreading.com/analytics/threat-intelligence/online-ad-fraud-exposed-advertisers-losing-$63-billion-to-$10-billion-per-year/d/d-id/1317979			&lt;br /&gt;
* Online Data Companies versus Bots: The Fight is on for Control of Online Data, Distil Networks http://www.distilnetworks.com/online-data-companies-vs-bots-download/&lt;br /&gt;
*	Optimal Airline Ticket Purchasing Using Automated User-Guided Feature Selection	 http://ijcai.org/papers13/Papers/IJCAI13-032.pdf				&lt;br /&gt;
*	Payment Checkout Flaws and Bugs	2014	 https://www.clerkendweller.uk/2014/11/4/Payment-Checkout-Flaws-and-Bugs			&lt;br /&gt;
*	PCI Compliance Report 2015	 Verizon	 http://www.verizonenterprise.com/pcireport/2015/			&lt;br /&gt;
*	Pixel Perfect Timing Attacks with HTML5	2013	 http://www.contextis.com/services/research/white-papers/pixel-perfect-timing-attacks-html5/			&lt;br /&gt;
*	Polymorphism as a Defense for Automated Attack of Websites	 http://link.springer.com/chapter/10.1007%2F978-3-319-07536-5_30				&lt;br /&gt;
*	Preventing Web Scraping: Best Practice 	 https://creativedigitalideas.files.wordpress.com/2014/11/best-practice-to-prevent-web-scraping.pdf				&lt;br /&gt;
*	Profile: Automated Credit Card Fraud	 http://old.honeynet.org/papers/profiles/cc-fraud.pdf				&lt;br /&gt;
* Protecting Against Web Floods, Radware http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452968&lt;br /&gt;
*	Q4 2014 State of the Internet Security Report	 prolexic	 http://www.stateoftheinternet.com/downloads/pdfs/2014-internet-security-report-q4.pdf			&lt;br /&gt;
*	Reflection injection	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf		&lt;br /&gt;
* A Report on taxonomy and evaluation of existing inventories, ENISAhttp://ecrime-project.eu/wp-content/uploads/2015/02/E-Crime-Deliverable-2-1-20141128_FINAL.pdf			&lt;br /&gt;
* Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft, Dept of Justice http://www.justice.gov/criminal/cybercrime/docs/ip-victim-guide-and-checklist-march-2013.pdf&lt;br /&gt;
*	SANS Top 20 Critical Controls	 https://www.sans.org/critical-security-controls/		&lt;br /&gt;
* Securing Websites, Sophos, 2011 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/securing-websites.aspx		&lt;br /&gt;
*	Security Insights: Defending Against Automated Threats	 http://www.securityweek.com/security-insights-defending-against-automated-threats				&lt;br /&gt;
*	Server side DDoS	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/DDOS_Attack_Method_Payload_05182010			&lt;br /&gt;
*	Slow Read Denial of Service attack	 https://code.google.com/p/slowhttptest/wiki/SlowReadTest				&lt;br /&gt;
*	Slow-Read DoS Attack	 https://www.trustwave.com/Resources/SpiderLabs-Blog/ModSecurity-Advanced-Topic-of-the-Week--Mitigation-of--Slow-Read--Denial-of-Service-Attack/				&lt;br /&gt;
*	Slowloris HTTP DoS	 http://ha.ckers.org/slowloris/	 	&lt;br /&gt;
* So what are the &amp;quot;most critical&amp;quot; application flaws? On new OWASP Top 10 https://ipsec.pl/application-security/2013/so-what-are-most-critical-application-flaws-new-owasp-top-10.html		&lt;br /&gt;
*	Social Media Bots Offer Phony Friends and Real Profit	 NY Times	 http://www.nytimes.com/2014/11/20/fashion/social-media-bots-offer-phony-friends-and-real-profit.html?_r=1			&lt;br /&gt;
* Software Vulnerability Analysis, Krsul, 1998 http://www.krsul.org/ivan/articles/main.pdf&lt;br /&gt;
*	Sophos Security Threat Report	 http://blogs.sophos.com/2014/12/11/our-top-10-predictions-for-security-threats-in-2015-and-beyond/&lt;br /&gt;
* SpoofedMe Social Login Attack Discovered by IBM X-Force Researchers http://securityintelligence.com/spoofedme-social-login-attack-discovered-by-ibm-x-force-researchers/#.VSuiEhPSngM				&lt;br /&gt;
* State of Software Security Report, Volume 5, Veracode, 2013 https://info.veracode.com/state-of-software-security-report-volume5.html&lt;br /&gt;
*	Stopping Automated Attack Tools	 http://www.technicalinfo.net/papers/StoppingAutomatedAttackTools.html&lt;br /&gt;
* Taxonomy on Online Game Security http://www.math.snu.ac.kr/~jhcheon/publications/2004/Taxonomy%20on%20online%20game%20security_EL.pdf	&lt;br /&gt;
* A Taxonomy of Computer Program Security Flaws, with Examples, Landwehr https://cwe.mitre.org/documents/sources/ATaxonomyofComputerProgramSecurityFlawswithExamples%5BLandwehr93%5D.pdf&lt;br /&gt;
* A Taxonomy of Security Faults in the UNIX Operating System, Aslam, 1995 https://cwe.mitre.org/documents/sources/ATaxonomyofSecurityFaultsintheUNIXOperatingSystem%5BAslam95%5D.pdf		&lt;br /&gt;
* Testing Guide, v4, OWASP, 2014 https://www.owasp.org/images/5/52/OWASP_Testing_Guide_v4.pdf								&lt;br /&gt;
*	The Bot Baseline: Fraud in Digital Advertising	 https://s3.amazonaws.com/whiteops-public/WO-ANA-Baseline-Study-of-Bot-Fraud.pdf							&lt;br /&gt;
*	The Internet Organised Crime Threat Assessment (iOCTA) 2014	 https://www.europol.europa.eu/content/internet-organised-crime-threat-assesment-iocta				&lt;br /&gt;
*	The Notorious Nine	 Cloud Computing Top Threats in 2013	 CSA	 https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf	&lt;br /&gt;
* The Risks of Content Management Systems, IBM, 2015 https://portal.sec.ibm.com/mss/html/en_US/support_resources/pdf/CMS_Threats_MSS_Threat_Report.pdf	&lt;br /&gt;
* The Spy in the Sandbox – Practical Cache Attacks in Javascript http://iss.oy.ne.ro/SpyInTheSandbox.pdf						&lt;br /&gt;
* Thousands of Hacked Uber Accounts Selling on Dark Web for $1 http://thehackernews.com/2015/03/thousands-of-hacked-uber-accounts_30.html?m=1&lt;br /&gt;
* Threat Intelligence Quarterly, IBM, 1Q 2015 https://www.ibm.com/services/forms/signup.do?source=swg-WW_Security_Organic&amp;amp;S_PKG=ov33510&amp;amp;S_TACT=C327017W&amp;amp;dynform=18101&lt;br /&gt;
* Threat Modeling: Designing for Security, Adam Shostack, Wiley, April 2014 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118809998.html&lt;br /&gt;
*	Threats and Mitigations: A Guide to Multi-Layered Web Security - eBook	 Prolexic	 	 http://www.prolexic.com/knowledge-center/prolexic-download/guide-multi-layered-web-security-ebook.pdf		&lt;br /&gt;
* Trapping Unknown Malware in a Context Web, Sophos http://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/HuqSzabo-VB2013.pdf?la=en.pdf&lt;br /&gt;
*	Trustwave Global Security Report	2014	 https://www2.trustwave.com/GSR2014.html?utm_source=redirect&amp;amp;utm_medium=web&amp;amp;utm_campaign=GSR2014			&lt;br /&gt;
*	TurboTax’s Anti-Fraud Efforts Under Scrutiny	 http://krebsonsecurity.com/2015/02/turbotaxs-anti-fraud-efforts-under-scrutiny/				&lt;br /&gt;
*	Two Security Vulnerabilities in the Spring Framework’s MVC pdf (from 2008)	 http://blog.diniscruz.com/2011/07/two-security-vulnerabilities-in-spring.html&lt;br /&gt;
*	The Underground Economy of Spam: A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns	 http://static.usenix.org/events/leet11/tech/full_papers/Stone-Gross.pdf					&lt;br /&gt;
*	Understanding Web Bots and How They Hurt Your Business	 Encapsula	 http://www.slideshare.net/Incapsula/understanding-web-bots-and-how-they-hurt-your-business		&lt;br /&gt;
* Use of A Taxonomy of Security Faults, Taimur Aslam, Ivan Krsul and Eugene H Spafford, 1996  http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=2304&amp;amp;context=cstech&lt;br /&gt;
*	The WASC Threat Classification v2.0	 http://projects.webappsec.org/w/page/13246978/Threat%20Classification	&lt;br /&gt;
* Warhol Worms: The Potential for Very Fast Internet Plagues http://www.iwar.org.uk/comsec/resources/worms/warhol-worm.htm	&lt;br /&gt;
*	Web Application Attack Report #5	 Imperva	 http://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed5.pdf	&lt;br /&gt;
* Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Ryan Barnett, Wiley, December 2012 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118362187.html		&lt;br /&gt;
*	Web Attacks in the Wild	 Corsaire	 https://www.owasp.org/images/a/a7/Web_attacks_in_the_wild_-_ap.pdf			&lt;br /&gt;
*	Web Automation	 Friend or Foe?	 https://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf			&lt;br /&gt;
*	Web Spambot Detection Based on Web Navigation Behaviour 	 http://pedramhayati.com/papers/Web_Spambot_Detection_Based_on_Web_Usage_Behaviour.pdf		&lt;br /&gt;
* Website Security Statistics Report, 2014 http://info.whitehatsec.com/rs/whitehatsecurity/images/statsreport2014-20140410.pdf		&lt;br /&gt;
*	What is Zeus?	 http://www.sophos.com/medialibrary/pdfs/technical%20papers/sophos%20what%20is%20zeus%20tp.pdf				&lt;br /&gt;
*	When Web 2.0 Attacks! Understanding Ajax	 Flash and other highly interactive web technologies…	 https://www.owasp.org/images/f/fc/When_Web_2.0_Attacks_-_Understanding_Security_Implications_of_Highly_Interactive_Technologies-Rafal_Los.pdf			&lt;br /&gt;
*	Where have all of our Passwords Gone?	 Gartner	2015	 http://blogs.gartner.com/avivah-litan/2015/01/22/where-have-all-our-passwords-gone/		&lt;br /&gt;
*	WS-Attacks.org	 http://www.ws-attacks.org/index.php/Main_Page&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; What do you mean by &amp;quot;web&amp;quot;, &amp;quot;application&amp;quot; and &amp;quot;automated threat&amp;quot;?&lt;br /&gt;
: See the definitions in the project's {{#switchtablink:Project Scope and Definitions|glossary}}.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;ontology&amp;quot;?&lt;br /&gt;
: An ontology is a set of types, properties, and relationship. These together define a subject description language. This particular ontology is meant to represent what automated threats real world owners observe affecting their web applications in usual operations.&lt;br /&gt;
&lt;br /&gt;
; Isn't this another bug (vulnerability) list?&lt;br /&gt;
: No, none of the named automated threat events are implementation bugs - they relate to abuse of functionality using automated means.&lt;br /&gt;
&lt;br /&gt;
; I thought &amp;quot;so and so&amp;quot; already did that?&lt;br /&gt;
: We found that it did not exist. While many threats are mentioned in the sources researched, there was no overall list or definitions. We found the automated threat events tended to all be in a small number of definied items from Mitre CAPEC and WASC Threat Classification. If you know of other automated threat lists/taxonomies/ontologies, please share them.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;oat&amp;quot;?&lt;br /&gt;
: It is our abbreviation for OWASP Automated Threat (OAT).&lt;br /&gt;
&lt;br /&gt;
; I am confused and don't know which OAT my problem is - how do I identify it?&lt;br /&gt;
: In 2017 we created a [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] to help identify the correct OAT, which can then be confirmed by reading the full description in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook]. The short summaries are important explanations of each OAT name.&lt;br /&gt;
&lt;br /&gt;
; How can I help?&lt;br /&gt;
: Please join our mailing list, send ideas, contribute clarifications, corrections and improvement, and let other people know about the project and its handbook.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements and Sponsors =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
* Sumit Agarwal&lt;br /&gt;
* Jason Chan&lt;br /&gt;
* Mark Hall&lt;br /&gt;
* Omri Iluz&lt;br /&gt;
* Andrew van der Stock&lt;br /&gt;
* Roland Weber&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
Additionally other professional colleagues and website owners and operators who provided feedback.&lt;br /&gt;
&lt;br /&gt;
==Reviewers==&lt;br /&gt;
&lt;br /&gt;
* Igor Andriushchenko&lt;br /&gt;
* Gabriel Mendez Justiniano&lt;br /&gt;
* Matt Tesauro&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
All OWASP Projects are run and developed by volunteers and rely on personal donations and sponsorship to continue their development. OWASP does not endorse or recommend commercial products or services, allowing our community to remain vendor neutral with the collective wisdom of the best minds in software security worldwide. This project has received the sponsorship part of their Corporate OWASP membership fees from Verizon Digital Media Services in 2016 and Distil Networks in 2017, which has already contributed to the v1.2 production design costs, and will also be utilised to help promote knowledge of the project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[file:Verizon_Digital_Medial_Logo.jpg|size=150x45px|link=https://www.verizondigitalmedia.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Distil-flat-logo-2.png|link=https://www.distilnetworks.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Can you help? The project is looking for information on the prevalence and types of automated threats seen by web application owners in the real world. This will be used to refine and organise the information gathered from research papers, whitepapers, security reports and industry news. Please use the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/automated_threats_to_web_applications Mailing list]&lt;br /&gt;
&lt;br /&gt;
To share information confidentially, you can email the project leaders directly: [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:colin.watson@owasp.org Colin Watson].&lt;br /&gt;
&lt;br /&gt;
== Completed Outputs==&lt;br /&gt;
&lt;br /&gt;
* {{#switchtablink:Scope and Definitions|Glossary}}&lt;br /&gt;
* {{#switchtablink:Bibliography|Bibligraphy of information sources}}&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automated-threats.pdf summary chart] has been published summarising the information gathered and work to date&lt;br /&gt;
* Identifying automated threats to web applications, and determining the primary name used. This first part of the project intends to produce a consistent vocabulary for discussing the threats before moving onto other aspects&lt;br /&gt;
* The primary terms have now been defined and described for the ontology&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automation-briefing.pdf briefing document] was produced in May 2015&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Automated Threat Handbook] July 2015 [https://www.owasp.org/index.php/File:Owasp-automated-threat-handbook-source-files.zip source files], updated in November 2016&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automation-project-briefing.pdf project overview flyer]  July 2015&lt;br /&gt;
* Release  [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] December 2016&lt;br /&gt;
&lt;br /&gt;
== Roadmap==&lt;br /&gt;
&lt;br /&gt;
The project's roadmap was updated in October 2017.&lt;br /&gt;
&lt;br /&gt;
===Q1 2015===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Feb 2015: Define scope and terminology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Mar 2015: Research prior work and reports about automated threats to web applications to create bibliography&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q2 2015===&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Assess threats/attacks and create ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Application owner interviews and creation of initial project outputs, to refine model&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Publication of outputs and request for review/data&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Summit session and survey at AppSec EU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Write ontology document&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Write 2-page project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Publish project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul 2015: Publish v1.0 ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q3 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul-Sep 2016: Gathering of additional contributions and update handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q4 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Nov 2016: Release updated handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec 2016: Threat identification chart&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q1 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec-Mar 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check against changes to CAPEC v2.9&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q2 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Apr-Jun 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecEU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q3 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Chase up ongoing project review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecUS&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q4 2017 ===&lt;br /&gt;
* Release v1.2 (now due 15 Feb 2018)&lt;br /&gt;
&lt;br /&gt;
=== Q1 2018 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create OAT wiki pages&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Future ===&lt;br /&gt;
* Write executive summary&lt;br /&gt;
* Release executive summary document&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-SR-2]] [[Category:SAMM-TA-1]] [[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=237795</id>
		<title>OWASP Automated Threats to Web Applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=237795"/>
				<updated>2018-02-16T15:22:19Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* News and Events */ OAT wiki pages&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Automated-threats-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Automated Threats to Web Applications==&lt;br /&gt;
&lt;br /&gt;
The OWASP Automated Threats to Web Applications Project has completed a review of reports, academic and other papers, news stories and vulnerability taxonomies/listings to identify, name and classify these scenarios – automated by software causing a divergence from accepted behavior producing one or more undesirable effects on a web application, but excluding tool-based exploitation of single-issue vulnerabilities. The initial objective was to produce an ontology providing a common language for developers, architects, operators, business owners, security engineers, purchasers and suppliers/ vendors, to facilitate clear communication and help tackle the issues.&lt;br /&gt;
The project also identifies symptoms, mitigations and controls in this problem area. Like all OWASP outputs, everything is free and published using an open source license.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Automation-project-briefing.pdf Two page summary project briefing as a PDF].&lt;br /&gt;
&lt;br /&gt;
== Description==&lt;br /&gt;
&lt;br /&gt;
Web applications are subjected to unwanted automated usage – day in, day out. Often these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is commonly mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the primary intent. Frequently these have sector-specific names. Most of these problems seen regularly by web application owners are not listed in any OWASP Top Ten or other top issue list. Furthermore, they are not enumerated or defined adequately in existing dictionaries. These factors have contributed to inadequate visibility, and an inconsistency in naming such threats, with a consequent lack of clarity in attempts to address the issues.&lt;br /&gt;
&lt;br /&gt;
Without sharing a common language between devops, architects, business owners, security engineers, purchasers and suppliers/vendors, everyone has to make extra effort to communicate clearly. Misunderstandings can be costly. The adverse impacts affect the privacy and security of individuals as well as the security of the applications and related system components.&lt;br /&gt;
&lt;br /&gt;
== Automated Threats ==&lt;br /&gt;
&lt;br /&gt;
The list of threat events, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-020 Account Aggregation]]&lt;br /&gt;
* [[OAT-019 Account Creation]]&lt;br /&gt;
* [[OAT-003 Ad Fraud]]&lt;br /&gt;
* [[OAT-009 CAPTCHA Defeat]]&lt;br /&gt;
* [[OAT-010 Card Cracking]]&lt;br /&gt;
* [[OAT-001 Carding]]&lt;br /&gt;
* [[OAT-012 Cashing Out]]&lt;br /&gt;
* [[OAT-007 Credential Cracking]]&lt;br /&gt;
* [[OAT-008 Credential Stuffing]]&lt;br /&gt;
* [[OAT-021 Denial of Inventory]]&lt;br /&gt;
* [[OAT-015  Denial of Service]]&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-006 Expediting]]&lt;br /&gt;
* [[OAT-004 Fingerprinting]]&lt;br /&gt;
* [[OAT-018 Footprinting]]&lt;br /&gt;
* [[OAT-005 Scalping]]&lt;br /&gt;
* [[OAT-011 Scraping]]&lt;br /&gt;
* [[OAT-016 Skewing]]&lt;br /&gt;
* [[OAT-013 Sniping]]&lt;br /&gt;
* [[OAT-017 Spamming]]&lt;br /&gt;
* [[OAT-002 Token Cracking]]&lt;br /&gt;
* [[OAT-014 Vulnerability Scanning]]&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
Not sure which is which? Use the [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] in conjunction with the full [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
All the materials are free to use. They are licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What Is This? ==&lt;br /&gt;
&lt;br /&gt;
Information and resources to help web application owners defend against [[:Category:Automated Threat|automated threats]]&lt;br /&gt;
&lt;br /&gt;
== What Isn't It? ==&lt;br /&gt;
&lt;br /&gt;
* Another vulnerability list&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Attack trees&lt;br /&gt;
* Non web&lt;br /&gt;
* Non application&lt;br /&gt;
&lt;br /&gt;
==Project Objective==&lt;br /&gt;
&lt;br /&gt;
This project brings together research and analysis of real world automated attacks against web applications, to produce documentation to assist operators defend against these threats. Sector-specific guidance will be available.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Automatedthreats-presentation-small.jpg|link=media:Bots-AppSecUSA2017-Project-Summit.pptx]]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP WASC Web Hacking Incidents Database Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
* [[OWASP AppSensor Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP ModSecurity Core Rule Set Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Download the free handbook as a PDF]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [16 Feb 2018] OAT wiki pages created&lt;br /&gt;
* [15 Feb 2018] v1.2 Handbook published&lt;br /&gt;
* [25 Sep 2017] Promoted to Labs status&lt;br /&gt;
* [19-20 Sep 2017] Working session at the AppSecUSA 2017 Project Summit&lt;br /&gt;
* [15 May 2017] Draft feedback on Top Ten A7 shared&lt;br /&gt;
* [17 Apr 2017] [https://www.owasp.org/index.php/File:BadBots_OWASP_AppSec_CA_2017.pptx Slides] from AppSec California (2017)&lt;br /&gt;
* [20 Dec 2016] Threat identification chart [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf published]&lt;br /&gt;
* [03 Nov 2016] Presentation at [http://lascon.org/ LASCON 2016]&lt;br /&gt;
* [03 Nov 2016] v1.1 Handbook published&lt;br /&gt;
* [11-12 Oct 2016] Working session at the [https://docs.google.com/presentation/d/1iMQHTc-h5qcP7gBBRcPHGmVaTWqx3dpMwNMVlA--rqs/edit#slide=id.p3 AppSecUSA 2017 Project Summit]&lt;br /&gt;
* [04 Aug 2016] Project Q&amp;amp;A at Blackhat USA 2-5pm in the OWASP booth&lt;br /&gt;
* [26 Oct 2015] [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf v1.01 handbook] published&lt;br /&gt;
* [24 Sep 2015] [https://www.owasp.org/index.php/File:Colinwatson-a-new-ontology-of-unwanted-automation.pptx Presentation] at [https://2015.appsecusa.org/c/?page_id=896#a AppSec USA 2015]&lt;br /&gt;
&lt;br /&gt;
==In Print==&lt;br /&gt;
&lt;br /&gt;
[[File:AutomatedThreatHandbook_small.jpg|link=http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22932107.html]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22932107.html Automated Threat Handbook] can be purchased at cost as a print on demand book.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
    &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Scope and Definitions =&lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The aim was to create a listing of vendor-neutral and technology agnostic terms that describe real-world automated threats to web applications, at a level of abstraction that application owners can relate to. These terms are threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
The focus is on abuse of functionality - misuse of inherent functionality and related design flaws, some of which are also referred to as business logic flaws. There is almost no focus on implementation bugs. It is not that the latter are not the target for attacks, but there is much more knowledge published in that area with a greater agreement on terminology. All the scenarios identified must require the web to exist for the threat to be materialised. Many of the scenarios have impacts upon the organisation that owns or operates web applications, but some scenarios have impacts more focused on individuals or other bodies. An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
==Definitions ==&lt;br /&gt;
&lt;br /&gt;
=== Automated Threats to Web Applications ===&lt;br /&gt;
&lt;br /&gt;
Threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
== Glossary ==&lt;br /&gt;
&lt;br /&gt;
;Action&lt;br /&gt;
: An act taken against an asset by a threat agent. Requires first that contact occurs between the asset and threat agent (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Application&lt;br /&gt;
: Software that performs a business process i.e. not system software&lt;br /&gt;
: A software program hosted by an information system (Ref 2)&lt;br /&gt;
&lt;br /&gt;
; Application layer&lt;br /&gt;
: &amp;quot;Layer 7” in the OSI model (Ref 3) and “application layer” in the TCP/IP model (Ref 4)&lt;br /&gt;
&lt;br /&gt;
;Threat&lt;br /&gt;
: Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events, etc.); malicious actors; errors; failures (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Agent&lt;br /&gt;
: Any agent (e.g., object, substance, human, etc.) that is capable of acting against an asset in a manner that can result in harm (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Event&lt;br /&gt;
: Occurs when a threat agent acts against an asset (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Web&lt;br /&gt;
: The World Wide Web (WWW, or simply Web) is an information space in which the items of interest, referred to as resources, are identified by global identifiers called Uniform Resource Identifiers (URI) (Ref 5)&lt;br /&gt;
: The first three specifications for Web technologies defined URLs, HTTP, and HTML (Ref 6)&lt;br /&gt;
&lt;br /&gt;
; Web application&lt;br /&gt;
: An application delivered over the web&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Glossary references:&lt;br /&gt;
# [http://pubs.opengroup.org/onlinepubs/9699919899/toc.pdf Risk Taxonomy, Technical Standard, The Open Group, 2009]&lt;br /&gt;
# [http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf NISTIR 7298 rev 2, NIST]&lt;br /&gt;
# [http://en.wikipedia.org/wiki/OSI_model OSI model, Wikipedia] &lt;br /&gt;
# [http://en.wikipedia.org/wiki/Internet_protocol_suite TCP/IP model, Wikipedia]&lt;br /&gt;
# [http://www.w3.org/TR/webarch/ Architecture of the World Wide Web, Volume One, W3C]&lt;br /&gt;
# [http://www.w3.org/Help/ Help and FAQ, W3C]&lt;br /&gt;
&lt;br /&gt;
=Use Case Scanarios=&lt;br /&gt;
&lt;br /&gt;
The following scenarios and organisation names are completely fictitious.&lt;br /&gt;
&lt;br /&gt;
==Defining application development security requirements==&lt;br /&gt;
&lt;br /&gt;
Cinnaminta SpA intends to build and launch a new multi-lingual and multi-currency ecommerce website. The development will be outsourced and Cinnaminta has been working on the functional design document. Among many other requirements, the application security specification requires that the website must not include any vulnerabilities identified in PCI DSS v3.1 Requirement 6.5, nor any other vulnerabilities that could affect the protection of payment cardholder data. Cinnaminta specifies that the website's payment functions must not be susceptible to the threat events '''OAT-001 Carding''' or '''OAT-010 Card Cracking''' as defined in the '''OWASP Automated Threat Handbook'''. In addition, the application must interact with the company's existing fraud detection system to counter '''OAT-012 Cashing Out'''. The requirements are specified in terms of these threat events, rather than particular product or service categories. Development houses responding to the call for bids use the ontology to focus their answers to these aspects appropriately.&lt;br /&gt;
&lt;br /&gt;
== Sharing intelligence within a sector==&lt;br /&gt;
&lt;br /&gt;
Unlimited Innovations Inc develops and supports patient-facing software solutions to a range of healthcare providers, many of which participate in the National Health Service Cyber Intelligence Sharing Center (NHS-CISC). Unlimited Innovations already builds continuous monitoring capabilities into its software and decides to provide an optional enhancement so that customers could choose to share their misuse event data with each other, to benefit from the combined threat intelligence. Rather than sharing large quantities of low-level data, Unlimited Innovations aggregates information and broadcasts validated and categorised threat data amongst the participating organisations. Automation attacks are classified according to the threat events defined in the '''OWASP Automated Threat Handbook''' so that each receiving party understands the nature of the threat. Even organisations that do not want to take part in this information sharing can benefit, since their own categorised information is made available to internal business management in the form of an easy-to-comprehend monitoring dashboard. The information gathered can also be fed into their other business information management systems to help improve patient service.&lt;br /&gt;
&lt;br /&gt;
== Exchanging threat data between CERTs==&lt;br /&gt;
&lt;br /&gt;
National Computer Emergency Response Teams (CERTs) recognise that sharing of local information can contribute to worldwide prevention of cyber attacks. Despite advances in cooperation between CERTs, anything to increase continuity and interoperability, such as standards for data exchange, is encouraged. CERT Zog is concerned about the sparsity of application-specific data it receives, and also the classification of that data. It has a particular concern about attacks and breaches that affect sectors defined in Zog's 2015 national cyber security strategy. CERT Zog and its neighbour CERT Tarset agree to tag threat events using the '''OWASP Automated Threat Handbook''' in order to add greater context to existing solutions being used for threat data exchange between them. The programme also collects sector metadata, so that all organisations within these can benefit from the centralised intelligence.&lt;br /&gt;
&lt;br /&gt;
== Enhancing application penetration test findings==&lt;br /&gt;
&lt;br /&gt;
Specialist application security penetration testing firm Cherak Industries Pte Ltd works primarily for financial services companies in the banking and insurance sectors, and is looking to expand its business throughout Asia. Cherak has some innovative pen test result reporting systems which integrate with client software fault and vulnerability tracking systems, and it actively looks for methods to provide additional value to its clients. Cherak has identified that pen test clients would benefit from help to in understanding the effects of combinations of vulnerabilities, especially design flaws, and has decided to utilise the '''OWASP Automated Threat Handbook''' to define and explain the automation-related threats. The individual vulnerabilities were scored as normal using CVSSv2 and v3, the matching CWEs identified, and mitigations in place documented. In addition, Cherak uses the threat events defined in the '''OWASP Automated Threat Handbook''' to help create a new section in the executive summary that explains how combinations of the issues found could lead to automation threats and the possible technical and business impacts. For example, an assessment for one client had identified weaknesses in authentication so that there is a risk of '''OAT-008 Credential Stuffing'''. The defined identifier was provided to the client, so its technical staff could refer to additional information on the OWASP website.&lt;br /&gt;
&lt;br /&gt;
== Specifying service acquisition needs==&lt;br /&gt;
&lt;br /&gt;
Falstone Paradise Inc is concerned about malicious use of their portfolio of hotel and resort websites. The majority of the websites use a shared application platform, but there are some unique applications and a large number of other micro-sites, some of which use generic content management systems such as Wordpress and Drupal. Falstone Paradise has identified that its IT operations team are spending too much time dealing with the effects of automated misuse, such as cleaning up data, resetting customer accounts and providing extra capacity during attacks. Furthermore, the unwanted automation is also causing some instabilities leading to negative feedback from customers. Therefore Falstone Paradise decides to go out to the security marketplace to identify, assess and select products or services that might help address these automation issues for all its websites. Their buying team works with their information technology colleagues to write the detailed requirements in an Invitation to Tender (ITT) document. This describes the types of attacks its web applications are receiving, their frequency of occurrence and their magnitudes. These are defined according to the '''OWASP Automated Threat Handbook''', so that vendors do not misunderstand the requirements, and each vendor's offering can be assessed against the particular automation threat events of concern.&lt;br /&gt;
&lt;br /&gt;
== Characterising vendor services ==&lt;br /&gt;
&lt;br /&gt;
Better Best Ltd has developed an innovative technology to help gaming companies defend against a range of automated threats that can otherwise permit cheating and distortion of the game, leading to disruption for normal players. The solution can be deployed on premises, but is also available in the cloud as a service. But Better Best is finding difficulty explaining its solution in the market place, especially since it does not fit into any conventional product category. Better Best decide to use the terminology and threat events listed in the '''OWASP Automated Threat Handbook''' to define their product's capabilities. They hope this will provide some clarity about their offering, and also demonstrate how their product can be used to replace more than one other conventional security device. Additionally, Better Best writes a white paper describing how their product has been successfully used by one of their reference customers Hollybush Challenge Games to protect against '''OAT-006 Expediting''', '''OAT-005 Scalping''', '''OAT-016 Skewing''' and '''OAT-013 Sniping'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Ontology=&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The list of [[:Category:Automated Threat|automated threat events]] and summary descriptions, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-020'''	  Account Aggregation&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Use by an intermediary application that collects together multiple accounts and interacts on their behalf.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-019'''	  Account Creation&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Create multiple accounts for subsequent misuse.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-003'''	  Ad Fraud&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
False clicks and fraudulent display of web-placed advertisements.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-009'''	  CAPTCHA Defeat&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Solve anti-automation tests.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-010'''	  Card Cracking&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify missing start/expiry dates and security codes for stolen payment card data by trying different values.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-001'''	  Carding&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Multiple payment authorisation attempts used to verify the validity of bulk stolen payment card data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-012'''	  Cashing Out&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Buy goods or obtain cash utilising validated stolen payment card or other user account data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-007'''	  Credential Cracking&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify valid login credentials by trying different values for usernames and/or passwords.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-008'''	  Credential Stuffing&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass log in attempts used to verify the validity of stolen username/password pairs.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-021'''	  Denial of Inventory&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Deplete goods or services stock without ever completing the purchase or committing to the transaction.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-015'''	  Denial of Service&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Target resources of the application and database servers, or individual user accounts, to achieve denial of service (DoS).&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-006'''	  Expediting&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Perform actions to hasten progress of usually slow, tedious or time-consuming actions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-004'''	  Fingerprinting&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Elicit information about the supporting software and framework types and versions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-018'''	  Footprinting&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Probe and explore application to identify its constituents and properties.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-005'''	  Scalping&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Obtain limited-availability and/or preferred goods/services by unfair methods.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-011'''	  Scraping&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Collect application content and/or other data for use elsewhere.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-016'''	  Skewing&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Repeated link clicks, page requests or form submissions intended to alter some metric.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-013'''	  Sniping&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Last minute bid or offer for goods or services.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-017'''	  Spamming&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Malicious or questionable information addition that appears in public or private content, databases or user messages.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-002'''	  Token Cracking&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass enumeration of coupon numbers, voucher codes, discount tokens, etc.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-014'''	  Vulnerability Scanning&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Crawl and fuzz application to identify weaknesses and possible vulnerabilities.&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Comparison with other dictionaries, taxonomies and lists==&lt;br /&gt;
&lt;br /&gt;
===[https://capec.mitre.org/ Common Attack Pattern Enumeration and Classification] (CAPEC)===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-capec-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
CAPEC is a dictionary and classification taxonomy of known attacks on software. Its primary classification structures are:&lt;br /&gt;
&lt;br /&gt;
* [https://capec.mitre.org/data/definitions/3000.html Domains of attack] (3000) - Social Engineering (403), [https://capec.mitre.org/data/definitions/437.html Supply Chain] (437), Communications (512), [https://capec.mitre.org/data/definitions/513.html Software] (513), Physical Security (514), Hardware (515)&lt;br /&gt;
* Mechanism of Attack (1000) - Gather Information (118), Deplete Resources (119), Injection (152), Deceptive Interactions (156), Manipulate Timing and State (172), Abuse of Functionality (210), Probabilistic Techniques (223), Exploitation of Authentication (225), Exploitation of Authorization (232), Manipulate Data Structures (255), Manipulate Resources (262), Analyze Target (281), Gain Physical Access (436), Malicious Code Execution (525), Alter System Components (526), Manipulate System Users (527)&lt;br /&gt;
&lt;br /&gt;
===[http://projects.webappsec.org/w/page/13246978/Threat%20Classification WASC Threat Classification]===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-wasc-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
The WASC Threat Classification classifies weaknesses and attacks that can lead to the compromise of a website, its data, or its users.&lt;br /&gt;
&lt;br /&gt;
===[[OWASP WASC Web Hacking Incidents Database Project]] (WHID)===&lt;br /&gt;
&lt;br /&gt;
WHID [https://www.google.com/fusiontables/DataSource?snapid=S1536501YnLo classifies] publicly known incidents using:&lt;br /&gt;
&lt;br /&gt;
* attack methods e.g. ARP spoofing, abuse of functionality, account compromise, administration error, automation, backdoor, banking trojan, brute force, clickjacking, code injection, content injection, content spoofing, credential/session prediction, cross site request forgery (CSRF), cross-site scripting (XSS), denial of service, directory traversal, domain hijacking, DNS hijacking, forceful browsing, HTTP response splitting, hidden parameter manipulation, hosting malicious code, information leakage, insufficient authentication, known vulnerability, local file inclusion (LFI), malvertising, malware, malware injection, mass assignment, misconfiguration, OS commanding, parameter manipulation, path traversal, phishing, predictable resource location, process automation, redirection, remote file inclusion (RFI), rogue 3rd party app, scaping, search engine poisoning, shell injection, social engineering, stolen credentials, SQL injection, unintentional information disclosure, weak password recovery validation, worm&lt;br /&gt;
* weakness e.g. abuse of functionality, application misconfiguration, directory indexing, improper filesystem permissions, improper input handling, improper output handling, information leakage, insecure indexing, insufficient anti-automation, insufficient authentication, insufficient authorization, insufficient entropy, insufficient password recovery, insufficient process validation, insufficient session expiration, insufficient transport layer protection, misconfiguration, predictable resource location, weak password&lt;br /&gt;
* outcome account hijacking, account takeover, botnet participation, chaos, credit card leakage, data loss, defacement, DDoS attacks, DNS hijacking, DNS redirection, disinformation, disclosure only, downtime, extortion, fraud, information warfare, leakage of information, link spam, loss of sales, malware distribution,  monetary loss, phishing, planting of malware, service disruption, session hijacking, spam, spam links, stolen credentials, worm&lt;br /&gt;
&lt;br /&gt;
Plus other/various/unknown.&lt;br /&gt;
&lt;br /&gt;
= Bibliography =&lt;br /&gt;
&lt;br /&gt;
The following academic, open source, commercial and news sources were used in the research on automated threats to web applications. OWASP is a worldwide not-for-profit charitable organization focused on improving the security of software.  We operate under a vendor neutral policy and we do not endorse products or services.&lt;br /&gt;
&lt;br /&gt;
* 10 years of Application Security, Denyall http://www.denyall.com/resources/whitepapers/?aliId=3438442&lt;br /&gt;
*	2012 Payment Card Threat Report	 https://www.securitymetrics.com/static/resources/orange/2012%20Payment%20Card%20Threat%20Report%20copy.pdf				&lt;br /&gt;
*	2014 Bot Traffic Report: Just the Droids You were Looking for	 http://www.incapsula.com/blog/bot-traffic-report-2014.html				&lt;br /&gt;
*	3 Types of ‘Return Fraud’ to Monitor this Holiday Season	 http://www.practicalecommerce.com/articles/3168-3-Types-of-%E2%80%98Return-Fraud-to-Monitor-this-Holiday-Season	&lt;br /&gt;
* 7 Ways Bots Hurt Your Website, Distil Networks http://www.distilnetworks.com/7-ways-bots-hurt-website-whitepaper/						&lt;br /&gt;
*	Abusing HTML 5 Structured Client-side Storage	2008	 http://packetstorm.wowhacker.com/papers/general/html5whitepaper.pdf		&lt;br /&gt;
* Acquiring Experience with Ontology and Vocabularies, Walt Melo, Risa Mayan and Jean Stanford, 2011  http://www.omg.org/news/meetings/workshops/SOA-HC/presentations-2011/13_SC-6_Melo_Stanford_Mayan.pdf	&lt;br /&gt;
*	An Anatomy of a SQL Injection Attack	 Hacker Intelligence Initiative	 Imperva	 	 http://www.imperva.com/docs/HII_An_Anatomy_of_a_SQL_Injection_Attack_SQLi.pdf	&lt;br /&gt;
*	The Anatomy of Clickbot.A	 https://www.usenix.org/legacy/event/hotbots07/tech/full_papers/daswani/daswani.pdf				&lt;br /&gt;
*	Anatomy of comment spam	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Anatomy_of_Comment_Spam.pdf		&lt;br /&gt;
*	Anti-Automation Monitoring and Prevention	2015	 https://www.clerkendweller.uk/2015/1/29/AntiAutomation-Monitoring-and-Prevention			&lt;br /&gt;
*	Anti-DDoS Solution for Internet Corporation	 http://www.nsfocus.com/uploadfile/Solution/NSFOCUS%20Anti-DDoS%20Solution%20for%20Internet%20Corporation.pdf				&lt;br /&gt;
*	Anti-Fraud Principles and Proposed Taxonomy	 Sep 2014	 http://www.iab.net/media/file/IAB_Anti_Fraud_Principles_and_Taxonomy.pdf			&lt;br /&gt;
*	Apache Security	 Ivan Ristic	 			&lt;br /&gt;
* Application Security Desk Reference, OWASP https://www.owasp.org/index.php/Category:OWASP_ASDR_Project&lt;br /&gt;
* Application Security Guide For CISOs, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf&lt;br /&gt;
* AppSensor, OWASP https://www.owasp.org/index.php/OWASP_AppSensor_Project&lt;br /&gt;
*	Attack &amp;amp; Defense Labs	 http://www.andlabs.org/html5.html				&lt;br /&gt;
*	Attack categories	 OWASP	 https://www.owasp.org/index.php/Category:Attack	&lt;br /&gt;
* Attack Trees, Schneier, Dr. Dobb's Journal, December 1999 https://www.schneier.com/paper-attacktrees-ddj-ft.html		&lt;br /&gt;
*	Attacking with HTML5	2010	 https://media.blackhat.com/bh-ad-10/Kuppan/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-wp.pdf			&lt;br /&gt;
*	Automated attacks	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Automation_of_Attacks.pdf		&lt;br /&gt;
*	Avoiding the Top 10 Software Security Design Flaws	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf				&lt;br /&gt;
*	Bad Bots On The Rise	 Dec 2014	 http://www.darkreading.com/informationweek-home/bad-bots-on-the-rise/d/d-id/1318276	&lt;br /&gt;
* Banking Botnets Persist Despite Takedowns, Dell SecureWorks, 2015 http://www.secureworks.com/cyber-threat-intelligence/threats/banking-botnets-persist-despite-takedowns/	&lt;br /&gt;
*	The Barracuda Web Application Firewall: XML Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_XML_Firewall.pdf	&lt;br /&gt;
*	Blocking Brute Force Attacks	 http://www.cs.virginia.edu/~csadmin/gen_support/brute_force.php				&lt;br /&gt;
*	Bot Traffic Growing Problem for Digital	 Oct 2014	 http://www.netnewscheck.com/article/36537/bot-traffic-growing-problem-for-digital			&lt;br /&gt;
*	BotoPedia	 Incapsula	 http://www.botopedia.org/			&lt;br /&gt;
*	Boy in the Browser	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/Boy_in_the_Browser	&lt;br /&gt;
* Business Logic Attacks - Bots and BATs, Eldad Chai, 2009 http://www.owasp.org/images/9/96/AppSecEU09_BusinessLogicAttacks_EldadChai.ppt		&lt;br /&gt;
*	Bypassing Client Application Protection Techniques	 http://www.securiteam.com/securityreviews/6S0030ABPE.html&lt;br /&gt;
*	A CAPTCHA in the Rye	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_a_CAPTCHA_in_the_Rye.pdf					&lt;br /&gt;
*	Characterizing Large Scale Click fraud	 http://cseweb.ucsd.edu/~voelker/pubs/za-ccs14.pdf	&lt;br /&gt;
* Charter Addition Proposal: &amp;quot;Trusted Code&amp;quot; for the Web https://lists.w3.org/Archives/Public/public-webappsec/2015Mar/0150.html&lt;br /&gt;
*	A cheesy Apache / IIS DoS vuln (+a question) 	 http://www.securityfocus.com/archive/1/456339/30/0/threaded	&lt;br /&gt;
* China's Man-on-the-Side Attack on GitHub http://www.netresec.com/?page=Blog&amp;amp;month=2015-03&amp;amp;post=China%27s-Man-on-the-Side-Attack-on-GitHub&lt;br /&gt;
* The CISO Survey and Report, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-report-2013-1.0.pdf&lt;br /&gt;
* Common Attack Pattern Enumeration and Classification (CAPEC), Mitre https://capec.mitre.org/			&lt;br /&gt;
*	Common Cyber Attacks: Reducing the Impact	 CERT-UK	 https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/400106/Common_Cyber_Attacks-Reducing_The_Impact.pdf			&lt;br /&gt;
*	Corporate espionage – the internet’s new growth industry	 http://www.itproportal.com/2015/03/19/corporate-espionage-internets-new-growth-industry/				&lt;br /&gt;
*	CSA Top Threats to Cloud Computing	 https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf				&lt;br /&gt;
*	CSRF vulnerability in GMail service	 http://seclists.org/fulldisclosure/2009/Mar/29		&lt;br /&gt;
* CWE/SANS Top 25 Most Dangerous Software Errors, 2011 http://cwe.mitre.org/top25/		&lt;br /&gt;
*	Cyber Fraud - Tactics	 Techniques and Procedures	 http://www.crcpress.com/product/isbn/9781420091274			&lt;br /&gt;
* Cybercrime Report: Q1 2015, ThreatMetrix, 2015 http://info.threatmetrix.com/WP-2015Q1CybercrimeReport_WP-LP.html&lt;br /&gt;
*	Data Breach Investigations Report (DBIR), 2014	 http://www.verizonenterprise.com/DBIR/2014/				&lt;br /&gt;
* Data Breach Investigations Report (DBIR), 2015 http://www.verizonenterprise.com/DBIR/2015/&lt;br /&gt;
*	Data Breaches Fuel Login Attacks	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2014-state-of-the-internet-threat-advisory-public-data-breaches-fuel-login-attacks.pdf		&lt;br /&gt;
*	Data Scraping	 Wikipedia	 http://en.wikipedia.org/wiki/Data_scraping			&lt;br /&gt;
*	DDoS Quick Guide	 https://www.us-cert.gov/sites/default/files/publications/DDoS%20Quick%20Guide.pdf	&lt;br /&gt;
* DDoS Threat Landscape Report, 2013-2014 http://lp.incapsula.com/rs/incapsulainc/images/2013-14_ddos_threat_landscape.pdf	&lt;br /&gt;
* Defending Against an Internet-based Attack on the Physical World http://avirubin.com/scripted.attacks.pdf		&lt;br /&gt;
*	Defending Against Application-Based DDoS Attacks with the Barracuda Web Application Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_Defending%20_Against_%20Application-Based_%20DDoS_%20Attacks.pdf				&lt;br /&gt;
*	Demystifying HTML 5 Attacks	 http://resources.infosecinstitute.com/demystifying-html-5-attacks/				&lt;br /&gt;
*	Denial of Service Attacks: A Comprehensive Guide to Trends	 Techniques	 and Technologies	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Denial_of_Service_Attacks-Trends_Techniques_and_Technologies.pdf&lt;br /&gt;
*	Detecting and Blocking Site Scraping Attacks	 Imperva	 http://www.imperva.com/docs/WP_Detecting_and_Blocking_Site_Scraping_Attacks.pdf			&lt;br /&gt;
*	Detecting Automation of Twitter Accounts: Are you a human	 cyborg	 or a bot?	 http://www.cs.wm.edu/~hnw/paper/tdsc12b.pdf		&lt;br /&gt;
*	Detecting Malice	 Robert &amp;quot;RSnake&amp;quot; Hansen	2009	 http://www.detectmalice.com/		&lt;br /&gt;
*	Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) 	 http://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1414072277428&amp;amp;uri=CELEX:32002L0058				&lt;br /&gt;
*	Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data 	 http://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:31995L0046				&lt;br /&gt;
*	Distributed Denial-of-Service (DDoS) Cyber-Attacks	 Risk Mitigation	 and Additional Resources	 Federal Financial Institutions Examination Council	 http://www.ffiec.gov/press/PDF/FFIEC%20DDoS%20Joint%20Statement.pdf	&lt;br /&gt;
*	Do Evil - The Business of Social Media Bots	 Forbes	 http://www.forbes.com/sites/lutzfinger/2015/02/17/do-evil-the-business-of-social-media-bots/			&lt;br /&gt;
*	DoS and DDoS Glossary of Terms	 prolexic	 http://www.prolexic.com/knowledge-center-dos-and-ddos-glossary.html#layer-7-ddos-attack			&lt;br /&gt;
*	E-commerce Malware	 Trustwave	 https://gsr.trustwave.com/topics/placeholder-topic/e-commerce-malware/	&lt;br /&gt;
* Exploiting Software, G. Hoglund and G. McGraw, Addison-Wesley, 2004&lt;br /&gt;
* Five Trends to Track in E-Commerce Fraud, ThreatMetrix, 2013 http://info.threatmetrix.com/rs/threatmetrix/images/Five_Trends_eCommerce_Fraud_WP.pdf&lt;br /&gt;
* Hacker builds cheatbot for hit app Trivia Crack http://www.theregister.co.uk/2015/03/26/hacker_builds_trivia_crack_cheat_app/	&lt;br /&gt;
* Has Walmart opened itself up to “Denial of inventory” attacks?  https://arstechnica.com/business/2012/05/has-walmart-opened-itself-up-to-denial-of-inventory-attacks/	&lt;br /&gt;
* How Hoarder Bots Steal sales from Online Retailers https://www.internetretailer.com/mobile/2016/12/16/how-hoarder-bots-steal-sales-online-retailers&lt;br /&gt;
*	How to Defend Against DDoS Attacks - Strategies for the Network	 Transport	 and Application Layers	 Prolexic	 http://www.prolexic.com/kcresources/white-paper/strategies-for-the-network-transport-and-application-layers-412/Strategies_for_the_Network_Transport_and_Application_Layers_Prolexic_White_Paper_A4_082412.pdf	&lt;br /&gt;
* How to Defend Online Travel Websites in the Era of Site Scraping, Distil Networks http://www.distilnetworks.com/defend-online-travel-websites-era-site-scraping-download/&lt;br /&gt;
*	How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores	 http://research.microsoft.com/pubs/145858/caas-oakland-final.pdf				&lt;br /&gt;
*	HTML5 Overview	 A look at HTML5 Attack Scenarios	 Trend Micro	2011	 http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt_html5-attack-scenarios.pdf	&lt;br /&gt;
*	HTML5 Top 10 Threats Stealth Attacks and Silent Exploits	2012	 https://media.blackhat.com/bh-eu-12/shah/bh-eu-12-Shah_HTML5_Top_10-WP.pdf			&lt;br /&gt;
*	HTML5 web security	2011	 http://media.hacking-lab.com/hlnews/HTML5_Web_Security_v1.0.pdf			&lt;br /&gt;
*	HTTPPOST - Slow POST	 Wong Onn Chee	 OWASP AppSec DC 2010	 https://www.owasp.org/images/4/43/Layer_7_DDOS.pdf	&lt;br /&gt;
* If you've got @British_Airways account may make sense to change your password. Just had all my Avios cleared out! https://twitter.com/suttonnick/status/581556027948195840/photo/1	&lt;br /&gt;
* Internet Security Threat Report, Volume 19, 2014 http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf&lt;br /&gt;
*	An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks	 http://www.springer.com/gb/book/9788132202769	&lt;br /&gt;
*	Is Your Data Center Ready for Today’s DDoS Threats? DDoS attack types	 protection methods and testing your detection and mitigation defenses	 http://www.fortinet.com/sites/default/files/whitepapers/WP-DDoS-Testing.pdf			&lt;br /&gt;
*	Joomla Reflection DDoS-for-Hire	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2015-state-of-the-internet-threat-advisory-joomla-reflection-attack-ddos-for-hire.pdf		&lt;br /&gt;
*	Layer 7 DDOS – Blocking HTTP Flood Attacks	 http://blog.sucuri.net/2014/02/layer-7-ddos-blocking-http-flood-attacks.html				&lt;br /&gt;
*	Lenovo	 Superfish put smut on my system' – class-action lawsuit	 The Register	 http://www.theregister.co.uk/2015/02/23/lenovo_superfish_class_action_lawsuit/		&lt;br /&gt;
* List of Attack Vectors   Relative Vulnerability Rating TECAPI http://www.tecapi.com/public/relative-vulnerability-rating-gui.jsp#&lt;br /&gt;
*	Man in the Browser	 http://scisweb.ulster.ac.uk/~kevin/IJACI-Vol4No1-maninbrowser.pdf				&lt;br /&gt;
*	Man in the Browser Attack	 https://www.owasp.org/index.php/Man-in-the-browser_attack&lt;br /&gt;
* Mapping and Measuring Cybercrime, Oxford Internet Institute http://www.oii.ox.ac.uk/publications/FD18.pdf				&lt;br /&gt;
*	Massive Changes in the Criminal Landscape	 Europol	2015	 https://www.europol.europa.eu/content/massive-changes-criminal-landscape	&lt;br /&gt;
* Matching Attack Patterns to Security Vulnerabilities in Software-Intensive System Designs http://collaboration.csc.ncsu.edu/laurie/Papers/ICSE_Final_MCG_LW.pdf	&lt;br /&gt;
*	Mitigating DDoS Attacks with F5 Technology	 F5	 https://f5.com/resources/white-papers/mitigating-ddos-attacks-with-f5-technology			&lt;br /&gt;
* Mitigating the DoS/DDosS Threat, Radware, 2012 http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452061&lt;br /&gt;
* Modern Web Attacks, Sophos, 2007 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/modern-web-attacks.aspx&lt;br /&gt;
*	ModSecurity Advanced Topic of the Week: Mitigating Slow HTTP DoS Attacks	 https://www.trustwave.com/Resources/SpiderLabs-Blog/(Updated)-ModSecurity-Advanced-Topic-of-the-Week--Mitigating-Slow-HTTP-DoS-Attacks/	&lt;br /&gt;
* Most common attacks on web applications https://ipsec.pl/web-application-security/most-common-attacks-web-applications.html			&lt;br /&gt;
* Multi-dimensional Vulnerability Hierarchies Daniel Miessler  https://danielmiessler.com/study/multi-dimensional-vulnerability-hierarchies/&lt;br /&gt;
*	New Wave of DDoS Attacks Launched	 BankInfoSecurity.com	 Mar 2013	 http://www.bankinfosecurity.com/new-wave-ddos-attacks-launched-a-5584/op-1		&lt;br /&gt;
*	NOMAD: Toward Non-Invasive Moving Target Defense Against Web Bots	 http://faculty.cs.tamu.edu/guofei/paper/NOMAD_CNS13.pdf				&lt;br /&gt;
*	Online Ad Fraud Exposed: Advertisers Losing $6.3 Billion To $10 Billion Per Year	 Sep 2014	 http://www.darkreading.com/analytics/threat-intelligence/online-ad-fraud-exposed-advertisers-losing-$63-billion-to-$10-billion-per-year/d/d-id/1317979			&lt;br /&gt;
* Online Data Companies versus Bots: The Fight is on for Control of Online Data, Distil Networks http://www.distilnetworks.com/online-data-companies-vs-bots-download/&lt;br /&gt;
*	Optimal Airline Ticket Purchasing Using Automated User-Guided Feature Selection	 http://ijcai.org/papers13/Papers/IJCAI13-032.pdf				&lt;br /&gt;
*	Payment Checkout Flaws and Bugs	2014	 https://www.clerkendweller.uk/2014/11/4/Payment-Checkout-Flaws-and-Bugs			&lt;br /&gt;
*	PCI Compliance Report 2015	 Verizon	 http://www.verizonenterprise.com/pcireport/2015/			&lt;br /&gt;
*	Pixel Perfect Timing Attacks with HTML5	2013	 http://www.contextis.com/services/research/white-papers/pixel-perfect-timing-attacks-html5/			&lt;br /&gt;
*	Polymorphism as a Defense for Automated Attack of Websites	 http://link.springer.com/chapter/10.1007%2F978-3-319-07536-5_30				&lt;br /&gt;
*	Preventing Web Scraping: Best Practice 	 https://creativedigitalideas.files.wordpress.com/2014/11/best-practice-to-prevent-web-scraping.pdf				&lt;br /&gt;
*	Profile: Automated Credit Card Fraud	 http://old.honeynet.org/papers/profiles/cc-fraud.pdf				&lt;br /&gt;
* Protecting Against Web Floods, Radware http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452968&lt;br /&gt;
*	Q4 2014 State of the Internet Security Report	 prolexic	 http://www.stateoftheinternet.com/downloads/pdfs/2014-internet-security-report-q4.pdf			&lt;br /&gt;
*	Reflection injection	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf		&lt;br /&gt;
* A Report on taxonomy and evaluation of existing inventories, ENISAhttp://ecrime-project.eu/wp-content/uploads/2015/02/E-Crime-Deliverable-2-1-20141128_FINAL.pdf			&lt;br /&gt;
* Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft, Dept of Justice http://www.justice.gov/criminal/cybercrime/docs/ip-victim-guide-and-checklist-march-2013.pdf&lt;br /&gt;
*	SANS Top 20 Critical Controls	 https://www.sans.org/critical-security-controls/		&lt;br /&gt;
* Securing Websites, Sophos, 2011 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/securing-websites.aspx		&lt;br /&gt;
*	Security Insights: Defending Against Automated Threats	 http://www.securityweek.com/security-insights-defending-against-automated-threats				&lt;br /&gt;
*	Server side DDoS	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/DDOS_Attack_Method_Payload_05182010			&lt;br /&gt;
*	Slow Read Denial of Service attack	 https://code.google.com/p/slowhttptest/wiki/SlowReadTest				&lt;br /&gt;
*	Slow-Read DoS Attack	 https://www.trustwave.com/Resources/SpiderLabs-Blog/ModSecurity-Advanced-Topic-of-the-Week--Mitigation-of--Slow-Read--Denial-of-Service-Attack/				&lt;br /&gt;
*	Slowloris HTTP DoS	 http://ha.ckers.org/slowloris/	 	&lt;br /&gt;
* So what are the &amp;quot;most critical&amp;quot; application flaws? On new OWASP Top 10 https://ipsec.pl/application-security/2013/so-what-are-most-critical-application-flaws-new-owasp-top-10.html		&lt;br /&gt;
*	Social Media Bots Offer Phony Friends and Real Profit	 NY Times	 http://www.nytimes.com/2014/11/20/fashion/social-media-bots-offer-phony-friends-and-real-profit.html?_r=1			&lt;br /&gt;
* Software Vulnerability Analysis, Krsul, 1998 http://www.krsul.org/ivan/articles/main.pdf&lt;br /&gt;
*	Sophos Security Threat Report	 http://blogs.sophos.com/2014/12/11/our-top-10-predictions-for-security-threats-in-2015-and-beyond/&lt;br /&gt;
* SpoofedMe Social Login Attack Discovered by IBM X-Force Researchers http://securityintelligence.com/spoofedme-social-login-attack-discovered-by-ibm-x-force-researchers/#.VSuiEhPSngM				&lt;br /&gt;
* State of Software Security Report, Volume 5, Veracode, 2013 https://info.veracode.com/state-of-software-security-report-volume5.html&lt;br /&gt;
*	Stopping Automated Attack Tools	 http://www.technicalinfo.net/papers/StoppingAutomatedAttackTools.html&lt;br /&gt;
* Taxonomy on Online Game Security http://www.math.snu.ac.kr/~jhcheon/publications/2004/Taxonomy%20on%20online%20game%20security_EL.pdf	&lt;br /&gt;
* A Taxonomy of Computer Program Security Flaws, with Examples, Landwehr https://cwe.mitre.org/documents/sources/ATaxonomyofComputerProgramSecurityFlawswithExamples%5BLandwehr93%5D.pdf&lt;br /&gt;
* A Taxonomy of Security Faults in the UNIX Operating System, Aslam, 1995 https://cwe.mitre.org/documents/sources/ATaxonomyofSecurityFaultsintheUNIXOperatingSystem%5BAslam95%5D.pdf		&lt;br /&gt;
* Testing Guide, v4, OWASP, 2014 https://www.owasp.org/images/5/52/OWASP_Testing_Guide_v4.pdf								&lt;br /&gt;
*	The Bot Baseline: Fraud in Digital Advertising	 https://s3.amazonaws.com/whiteops-public/WO-ANA-Baseline-Study-of-Bot-Fraud.pdf							&lt;br /&gt;
*	The Internet Organised Crime Threat Assessment (iOCTA) 2014	 https://www.europol.europa.eu/content/internet-organised-crime-threat-assesment-iocta				&lt;br /&gt;
*	The Notorious Nine	 Cloud Computing Top Threats in 2013	 CSA	 https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf	&lt;br /&gt;
* The Risks of Content Management Systems, IBM, 2015 https://portal.sec.ibm.com/mss/html/en_US/support_resources/pdf/CMS_Threats_MSS_Threat_Report.pdf	&lt;br /&gt;
* The Spy in the Sandbox – Practical Cache Attacks in Javascript http://iss.oy.ne.ro/SpyInTheSandbox.pdf						&lt;br /&gt;
* Thousands of Hacked Uber Accounts Selling on Dark Web for $1 http://thehackernews.com/2015/03/thousands-of-hacked-uber-accounts_30.html?m=1&lt;br /&gt;
* Threat Intelligence Quarterly, IBM, 1Q 2015 https://www.ibm.com/services/forms/signup.do?source=swg-WW_Security_Organic&amp;amp;S_PKG=ov33510&amp;amp;S_TACT=C327017W&amp;amp;dynform=18101&lt;br /&gt;
* Threat Modeling: Designing for Security, Adam Shostack, Wiley, April 2014 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118809998.html&lt;br /&gt;
*	Threats and Mitigations: A Guide to Multi-Layered Web Security - eBook	 Prolexic	 	 http://www.prolexic.com/knowledge-center/prolexic-download/guide-multi-layered-web-security-ebook.pdf		&lt;br /&gt;
* Trapping Unknown Malware in a Context Web, Sophos http://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/HuqSzabo-VB2013.pdf?la=en.pdf&lt;br /&gt;
*	Trustwave Global Security Report	2014	 https://www2.trustwave.com/GSR2014.html?utm_source=redirect&amp;amp;utm_medium=web&amp;amp;utm_campaign=GSR2014			&lt;br /&gt;
*	TurboTax’s Anti-Fraud Efforts Under Scrutiny	 http://krebsonsecurity.com/2015/02/turbotaxs-anti-fraud-efforts-under-scrutiny/				&lt;br /&gt;
*	Two Security Vulnerabilities in the Spring Framework’s MVC pdf (from 2008)	 http://blog.diniscruz.com/2011/07/two-security-vulnerabilities-in-spring.html&lt;br /&gt;
*	The Underground Economy of Spam: A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns	 http://static.usenix.org/events/leet11/tech/full_papers/Stone-Gross.pdf					&lt;br /&gt;
*	Understanding Web Bots and How They Hurt Your Business	 Encapsula	 http://www.slideshare.net/Incapsula/understanding-web-bots-and-how-they-hurt-your-business		&lt;br /&gt;
* Use of A Taxonomy of Security Faults, Taimur Aslam, Ivan Krsul and Eugene H Spafford, 1996  http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=2304&amp;amp;context=cstech&lt;br /&gt;
*	The WASC Threat Classification v2.0	 http://projects.webappsec.org/w/page/13246978/Threat%20Classification	&lt;br /&gt;
* Warhol Worms: The Potential for Very Fast Internet Plagues http://www.iwar.org.uk/comsec/resources/worms/warhol-worm.htm	&lt;br /&gt;
*	Web Application Attack Report #5	 Imperva	 http://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed5.pdf	&lt;br /&gt;
* Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Ryan Barnett, Wiley, December 2012 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118362187.html		&lt;br /&gt;
*	Web Attacks in the Wild	 Corsaire	 https://www.owasp.org/images/a/a7/Web_attacks_in_the_wild_-_ap.pdf			&lt;br /&gt;
*	Web Automation	 Friend or Foe?	 https://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf			&lt;br /&gt;
*	Web Spambot Detection Based on Web Navigation Behaviour 	 http://pedramhayati.com/papers/Web_Spambot_Detection_Based_on_Web_Usage_Behaviour.pdf		&lt;br /&gt;
* Website Security Statistics Report, 2014 http://info.whitehatsec.com/rs/whitehatsecurity/images/statsreport2014-20140410.pdf		&lt;br /&gt;
*	What is Zeus?	 http://www.sophos.com/medialibrary/pdfs/technical%20papers/sophos%20what%20is%20zeus%20tp.pdf				&lt;br /&gt;
*	When Web 2.0 Attacks! Understanding Ajax	 Flash and other highly interactive web technologies…	 https://www.owasp.org/images/f/fc/When_Web_2.0_Attacks_-_Understanding_Security_Implications_of_Highly_Interactive_Technologies-Rafal_Los.pdf			&lt;br /&gt;
*	Where have all of our Passwords Gone?	 Gartner	2015	 http://blogs.gartner.com/avivah-litan/2015/01/22/where-have-all-our-passwords-gone/		&lt;br /&gt;
*	WS-Attacks.org	 http://www.ws-attacks.org/index.php/Main_Page&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; What do you mean by &amp;quot;web&amp;quot;, &amp;quot;application&amp;quot; and &amp;quot;automated threat&amp;quot;?&lt;br /&gt;
: See the definitions in the project's {{#switchtablink:Project Scope and Definitions|glossary}}.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;ontology&amp;quot;?&lt;br /&gt;
: An ontology is a set of types, properties, and relationship. These together define a subject description language. This particular ontology is meant to represent what automated threats real world owners observe affecting their web applications in usual operations.&lt;br /&gt;
&lt;br /&gt;
; Isn't this another bug (vulnerability) list?&lt;br /&gt;
: No, none of the named automated threat events are implementation bugs - they relate to abuse of functionality using automated means.&lt;br /&gt;
&lt;br /&gt;
; I thought &amp;quot;so and so&amp;quot; already did that?&lt;br /&gt;
: We found that it did not exist. While many threats are mentioned in the sources researched, there was no overall list or definitions. We found the automated threat events tended to all be in a small number of definied items from Mitre CAPEC and WASC Threat Classification. If you know of other automated threat lists/taxonomies/ontologies, please share them.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;oat&amp;quot;?&lt;br /&gt;
: It is our abbreviation for OWASP Automated Threat (OAT).&lt;br /&gt;
&lt;br /&gt;
; I am confused and don't know which OAT my problem is - how do I identify it?&lt;br /&gt;
: In 2017 we created a [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] to help identify the correct OAT, which can then be confirmed by reading the full description in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook]. The short summaries are important explanations of each OAT name.&lt;br /&gt;
&lt;br /&gt;
; How can I help?&lt;br /&gt;
: Please join our mailing list, send ideas, contribute clarifications, corrections and improvement, and let other people know about the project and its handbook.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements and Sponsors =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
* Sumit Agarwal&lt;br /&gt;
* Jason Chan&lt;br /&gt;
* Mark Hall&lt;br /&gt;
* Omri Iluz&lt;br /&gt;
* Andrew van der Stock&lt;br /&gt;
* Roland Weber&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
Additionally other professional colleagues and website owners and operators who provided feedback.&lt;br /&gt;
&lt;br /&gt;
==Reviewers==&lt;br /&gt;
&lt;br /&gt;
* Igor Andriushchenko&lt;br /&gt;
* Gabriel Mendez Justiniano&lt;br /&gt;
* Matt Tesauro&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
All OWASP Projects are run and developed by volunteers and rely on personal donations and sponsorship to continue their development. OWASP does not endorse or recommend commercial products or services, allowing our community to remain vendor neutral with the collective wisdom of the best minds in software security worldwide. This project has received the sponsorship part of their Corporate OWASP membership fees from Verizon Digital Media Services in 2016 and Distil Networks in 2017, which has already contributed to the v1.2 production design costs, and will also be utilised to help promote knowledge of the project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[file:Verizon_Digital_Medial_Logo.jpg|size=150x45px|link=https://www.verizondigitalmedia.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Distil-flat-logo-2.png|link=https://www.distilnetworks.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Can you help? The project is looking for information on the prevalence and types of automated threats seen by web application owners in the real world. This will be used to refine and organise the information gathered from research papers, whitepapers, security reports and industry news. Please use the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/automated_threats_to_web_applications Mailing list]&lt;br /&gt;
&lt;br /&gt;
To share information confidentially, you can email the project leaders directly: [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:colin.watson@owasp.org Colin Watson].&lt;br /&gt;
&lt;br /&gt;
== Completed Outputs==&lt;br /&gt;
&lt;br /&gt;
* {{#switchtablink:Scope and Definitions|Glossary}}&lt;br /&gt;
* {{#switchtablink:Bibliography|Bibligraphy of information sources}}&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automated-threats.pdf summary chart] has been published summarising the information gathered and work to date&lt;br /&gt;
* Identifying automated threats to web applications, and determining the primary name used. This first part of the project intends to produce a consistent vocabulary for discussing the threats before moving onto other aspects&lt;br /&gt;
* The primary terms have now been defined and described for the ontology&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automation-briefing.pdf briefing document] was produced in May 2015&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Automated Threat Handbook] July 2015 [https://www.owasp.org/index.php/File:Owasp-automated-threat-handbook-source-files.zip source files], updated in November 2016&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automation-project-briefing.pdf project overview flyer]  July 2015&lt;br /&gt;
* Release  [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] December 2016&lt;br /&gt;
&lt;br /&gt;
== Roadmap==&lt;br /&gt;
&lt;br /&gt;
The project's roadmap was updated in October 2017.&lt;br /&gt;
&lt;br /&gt;
===Q1 2015===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Feb 2015: Define scope and terminology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Mar 2015: Research prior work and reports about automated threats to web applications to create bibliography&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q2 2015===&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Assess threats/attacks and create ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Application owner interviews and creation of initial project outputs, to refine model&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Publication of outputs and request for review/data&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Summit session and survey at AppSec EU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Write ontology document&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Write 2-page project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Publish project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul 2015: Publish v1.0 ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q3 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul-Sep 2016: Gathering of additional contributions and update handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q4 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Nov 2016: Release updated handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec 2016: Threat identification chart&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q1 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec-Mar 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check against changes to CAPEC v2.9&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q2 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Apr-Jun 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecEU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q3 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Chase up ongoing project review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecUS&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q4 2017 ===&lt;br /&gt;
* Release v1.2 (now due 15 Feb 2018)&lt;br /&gt;
&lt;br /&gt;
=== Q1 2018 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create OAT wiki pages&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Future ===&lt;br /&gt;
* Write executive summary&lt;br /&gt;
* Release executive summary document&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-SR-2]] [[Category:SAMM-TA-1]] [[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=237794</id>
		<title>OWASP Automated Threats to Web Applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Automated_Threats_to_Web_Applications&amp;diff=237794"/>
				<updated>2018-02-16T15:21:14Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* News and Events */ v1.2 and wiki pages&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Automated-threats-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Automated Threats to Web Applications==&lt;br /&gt;
&lt;br /&gt;
The OWASP Automated Threats to Web Applications Project has completed a review of reports, academic and other papers, news stories and vulnerability taxonomies/listings to identify, name and classify these scenarios – automated by software causing a divergence from accepted behavior producing one or more undesirable effects on a web application, but excluding tool-based exploitation of single-issue vulnerabilities. The initial objective was to produce an ontology providing a common language for developers, architects, operators, business owners, security engineers, purchasers and suppliers/ vendors, to facilitate clear communication and help tackle the issues.&lt;br /&gt;
The project also identifies symptoms, mitigations and controls in this problem area. Like all OWASP outputs, everything is free and published using an open source license.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/File:Automation-project-briefing.pdf Two page summary project briefing as a PDF].&lt;br /&gt;
&lt;br /&gt;
== Description==&lt;br /&gt;
&lt;br /&gt;
Web applications are subjected to unwanted automated usage – day in, day out. Often these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is commonly mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the primary intent. Frequently these have sector-specific names. Most of these problems seen regularly by web application owners are not listed in any OWASP Top Ten or other top issue list. Furthermore, they are not enumerated or defined adequately in existing dictionaries. These factors have contributed to inadequate visibility, and an inconsistency in naming such threats, with a consequent lack of clarity in attempts to address the issues.&lt;br /&gt;
&lt;br /&gt;
Without sharing a common language between devops, architects, business owners, security engineers, purchasers and suppliers/vendors, everyone has to make extra effort to communicate clearly. Misunderstandings can be costly. The adverse impacts affect the privacy and security of individuals as well as the security of the applications and related system components.&lt;br /&gt;
&lt;br /&gt;
== Automated Threats ==&lt;br /&gt;
&lt;br /&gt;
The list of threat events, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-020 Account Aggregation]]&lt;br /&gt;
* [[OAT-019 Account Creation]]&lt;br /&gt;
* [[OAT-003 Ad Fraud]]&lt;br /&gt;
* [[OAT-009 CAPTCHA Defeat]]&lt;br /&gt;
* [[OAT-010 Card Cracking]]&lt;br /&gt;
* [[OAT-001 Carding]]&lt;br /&gt;
* [[OAT-012 Cashing Out]]&lt;br /&gt;
* [[OAT-007 Credential Cracking]]&lt;br /&gt;
* [[OAT-008 Credential Stuffing]]&lt;br /&gt;
* [[OAT-021 Denial of Inventory]]&lt;br /&gt;
* [[OAT-015  Denial of Service]]&lt;br /&gt;
&lt;br /&gt;
   | width=&amp;quot;300&amp;quot; align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
* [[OAT-006 Expediting]]&lt;br /&gt;
* [[OAT-004 Fingerprinting]]&lt;br /&gt;
* [[OAT-018 Footprinting]]&lt;br /&gt;
* [[OAT-005 Scalping]]&lt;br /&gt;
* [[OAT-011 Scraping]]&lt;br /&gt;
* [[OAT-016 Skewing]]&lt;br /&gt;
* [[OAT-013 Sniping]]&lt;br /&gt;
* [[OAT-017 Spamming]]&lt;br /&gt;
* [[OAT-002 Token Cracking]]&lt;br /&gt;
* [[OAT-014 Vulnerability Scanning]]&lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
Not sure which is which? Use the [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] in conjunction with the full [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
All the materials are free to use. They are licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;copy; OWASP Foundation&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What Is This? ==&lt;br /&gt;
&lt;br /&gt;
Information and resources to help web application owners defend against [[:Category:Automated Threat|automated threats]]&lt;br /&gt;
&lt;br /&gt;
== What Isn't It? ==&lt;br /&gt;
&lt;br /&gt;
* Another vulnerability list&lt;br /&gt;
* Threat modelling&lt;br /&gt;
* Attack trees&lt;br /&gt;
* Non web&lt;br /&gt;
* Non application&lt;br /&gt;
&lt;br /&gt;
==Project Objective==&lt;br /&gt;
&lt;br /&gt;
This project brings together research and analysis of real world automated attacks against web applications, to produce documentation to assist operators defend against these threats. Sector-specific guidance will be available.&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
[[File:Automatedthreats-presentation-small.jpg|link=media:Bots-AppSecUSA2017-Project-Summit.pptx]]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP WASC Web Hacking Incidents Database Project|OWASP WASC Web Hacking Incidents Database Project]]&lt;br /&gt;
* [[OWASP AppSensor Project|OWASP AppSensor Project]]&lt;br /&gt;
* [[OWASP ModSecurity Core Rule Set Project|OWASP ModSecurity Core Rule Set Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Download the free handbook as a PDF]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [15 Jan 2018] v1.2 Handbook published&lt;br /&gt;
* [25 Sep 2017] Promoted to Labs status&lt;br /&gt;
* [19-20 Sep 2017] Working session at the AppSecUSA 2017 Project Summit&lt;br /&gt;
* [15 May 2017] Draft feedback on Top Ten A7 shared&lt;br /&gt;
* [17 Apr 2017] [https://www.owasp.org/index.php/File:BadBots_OWASP_AppSec_CA_2017.pptx Slides] from AppSec California (2017)&lt;br /&gt;
* [20 Dec 2016] Threat identification chart [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf published]&lt;br /&gt;
* [03 Nov 2016] Presentation at [http://lascon.org/ LASCON 2016]&lt;br /&gt;
* [03 Nov 2016] v1.1 Handbook published&lt;br /&gt;
* [11-12 Oct 2016] Working session at the [https://docs.google.com/presentation/d/1iMQHTc-h5qcP7gBBRcPHGmVaTWqx3dpMwNMVlA--rqs/edit#slide=id.p3 AppSecUSA 2017 Project Summit]&lt;br /&gt;
* [04 Aug 2016] Project Q&amp;amp;A at Blackhat USA 2-5pm in the OWASP booth&lt;br /&gt;
* [26 Oct 2015] [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf v1.01 handbook] published&lt;br /&gt;
* [24 Sep 2015] [https://www.owasp.org/index.php/File:Colinwatson-a-new-ontology-of-unwanted-automation.pptx Presentation] at [https://2015.appsecusa.org/c/?page_id=896#a AppSec USA 2015]&lt;br /&gt;
&lt;br /&gt;
==In Print==&lt;br /&gt;
&lt;br /&gt;
[[File:AutomatedThreatHandbook_small.jpg|link=http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22932107.html]]&lt;br /&gt;
&lt;br /&gt;
The [http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22932107.html Automated Threat Handbook] can be purchased at cost as a print on demand book.&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[Image:Owasp-labs-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Lab_Projects]]&lt;br /&gt;
    &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Scope and Definitions =&lt;br /&gt;
&lt;br /&gt;
==Scope==&lt;br /&gt;
&lt;br /&gt;
The aim was to create a listing of vendor-neutral and technology agnostic terms that describe real-world automated threats to web applications, at a level of abstraction that application owners can relate to. These terms are threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
The focus is on abuse of functionality - misuse of inherent functionality and related design flaws, some of which are also referred to as business logic flaws. There is almost no focus on implementation bugs. It is not that the latter are not the target for attacks, but there is much more knowledge published in that area with a greater agreement on terminology. All the scenarios identified must require the web to exist for the threat to be materialised. Many of the scenarios have impacts upon the organisation that owns or operates web applications, but some scenarios have impacts more focused on individuals or other bodies. An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
==Definitions ==&lt;br /&gt;
&lt;br /&gt;
=== Automated Threats to Web Applications ===&lt;br /&gt;
&lt;br /&gt;
Threat events to web applications undertaken using automated actions.&lt;br /&gt;
&lt;br /&gt;
An attack that can be achieved without the web is out of scope.&lt;br /&gt;
&lt;br /&gt;
== Glossary ==&lt;br /&gt;
&lt;br /&gt;
;Action&lt;br /&gt;
: An act taken against an asset by a threat agent. Requires first that contact occurs between the asset and threat agent (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Application&lt;br /&gt;
: Software that performs a business process i.e. not system software&lt;br /&gt;
: A software program hosted by an information system (Ref 2)&lt;br /&gt;
&lt;br /&gt;
; Application layer&lt;br /&gt;
: &amp;quot;Layer 7” in the OSI model (Ref 3) and “application layer” in the TCP/IP model (Ref 4)&lt;br /&gt;
&lt;br /&gt;
;Threat&lt;br /&gt;
: Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events, etc.); malicious actors; errors; failures (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Agent&lt;br /&gt;
: Any agent (e.g., object, substance, human, etc.) that is capable of acting against an asset in a manner that can result in harm (Ref 1)&lt;br /&gt;
&lt;br /&gt;
;Threat Event&lt;br /&gt;
: Occurs when a threat agent acts against an asset (Ref 1)&lt;br /&gt;
&lt;br /&gt;
; Web&lt;br /&gt;
: The World Wide Web (WWW, or simply Web) is an information space in which the items of interest, referred to as resources, are identified by global identifiers called Uniform Resource Identifiers (URI) (Ref 5)&lt;br /&gt;
: The first three specifications for Web technologies defined URLs, HTTP, and HTML (Ref 6)&lt;br /&gt;
&lt;br /&gt;
; Web application&lt;br /&gt;
: An application delivered over the web&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Glossary references:&lt;br /&gt;
# [http://pubs.opengroup.org/onlinepubs/9699919899/toc.pdf Risk Taxonomy, Technical Standard, The Open Group, 2009]&lt;br /&gt;
# [http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf NISTIR 7298 rev 2, NIST]&lt;br /&gt;
# [http://en.wikipedia.org/wiki/OSI_model OSI model, Wikipedia] &lt;br /&gt;
# [http://en.wikipedia.org/wiki/Internet_protocol_suite TCP/IP model, Wikipedia]&lt;br /&gt;
# [http://www.w3.org/TR/webarch/ Architecture of the World Wide Web, Volume One, W3C]&lt;br /&gt;
# [http://www.w3.org/Help/ Help and FAQ, W3C]&lt;br /&gt;
&lt;br /&gt;
=Use Case Scanarios=&lt;br /&gt;
&lt;br /&gt;
The following scenarios and organisation names are completely fictitious.&lt;br /&gt;
&lt;br /&gt;
==Defining application development security requirements==&lt;br /&gt;
&lt;br /&gt;
Cinnaminta SpA intends to build and launch a new multi-lingual and multi-currency ecommerce website. The development will be outsourced and Cinnaminta has been working on the functional design document. Among many other requirements, the application security specification requires that the website must not include any vulnerabilities identified in PCI DSS v3.1 Requirement 6.5, nor any other vulnerabilities that could affect the protection of payment cardholder data. Cinnaminta specifies that the website's payment functions must not be susceptible to the threat events '''OAT-001 Carding''' or '''OAT-010 Card Cracking''' as defined in the '''OWASP Automated Threat Handbook'''. In addition, the application must interact with the company's existing fraud detection system to counter '''OAT-012 Cashing Out'''. The requirements are specified in terms of these threat events, rather than particular product or service categories. Development houses responding to the call for bids use the ontology to focus their answers to these aspects appropriately.&lt;br /&gt;
&lt;br /&gt;
== Sharing intelligence within a sector==&lt;br /&gt;
&lt;br /&gt;
Unlimited Innovations Inc develops and supports patient-facing software solutions to a range of healthcare providers, many of which participate in the National Health Service Cyber Intelligence Sharing Center (NHS-CISC). Unlimited Innovations already builds continuous monitoring capabilities into its software and decides to provide an optional enhancement so that customers could choose to share their misuse event data with each other, to benefit from the combined threat intelligence. Rather than sharing large quantities of low-level data, Unlimited Innovations aggregates information and broadcasts validated and categorised threat data amongst the participating organisations. Automation attacks are classified according to the threat events defined in the '''OWASP Automated Threat Handbook''' so that each receiving party understands the nature of the threat. Even organisations that do not want to take part in this information sharing can benefit, since their own categorised information is made available to internal business management in the form of an easy-to-comprehend monitoring dashboard. The information gathered can also be fed into their other business information management systems to help improve patient service.&lt;br /&gt;
&lt;br /&gt;
== Exchanging threat data between CERTs==&lt;br /&gt;
&lt;br /&gt;
National Computer Emergency Response Teams (CERTs) recognise that sharing of local information can contribute to worldwide prevention of cyber attacks. Despite advances in cooperation between CERTs, anything to increase continuity and interoperability, such as standards for data exchange, is encouraged. CERT Zog is concerned about the sparsity of application-specific data it receives, and also the classification of that data. It has a particular concern about attacks and breaches that affect sectors defined in Zog's 2015 national cyber security strategy. CERT Zog and its neighbour CERT Tarset agree to tag threat events using the '''OWASP Automated Threat Handbook''' in order to add greater context to existing solutions being used for threat data exchange between them. The programme also collects sector metadata, so that all organisations within these can benefit from the centralised intelligence.&lt;br /&gt;
&lt;br /&gt;
== Enhancing application penetration test findings==&lt;br /&gt;
&lt;br /&gt;
Specialist application security penetration testing firm Cherak Industries Pte Ltd works primarily for financial services companies in the banking and insurance sectors, and is looking to expand its business throughout Asia. Cherak has some innovative pen test result reporting systems which integrate with client software fault and vulnerability tracking systems, and it actively looks for methods to provide additional value to its clients. Cherak has identified that pen test clients would benefit from help to in understanding the effects of combinations of vulnerabilities, especially design flaws, and has decided to utilise the '''OWASP Automated Threat Handbook''' to define and explain the automation-related threats. The individual vulnerabilities were scored as normal using CVSSv2 and v3, the matching CWEs identified, and mitigations in place documented. In addition, Cherak uses the threat events defined in the '''OWASP Automated Threat Handbook''' to help create a new section in the executive summary that explains how combinations of the issues found could lead to automation threats and the possible technical and business impacts. For example, an assessment for one client had identified weaknesses in authentication so that there is a risk of '''OAT-008 Credential Stuffing'''. The defined identifier was provided to the client, so its technical staff could refer to additional information on the OWASP website.&lt;br /&gt;
&lt;br /&gt;
== Specifying service acquisition needs==&lt;br /&gt;
&lt;br /&gt;
Falstone Paradise Inc is concerned about malicious use of their portfolio of hotel and resort websites. The majority of the websites use a shared application platform, but there are some unique applications and a large number of other micro-sites, some of which use generic content management systems such as Wordpress and Drupal. Falstone Paradise has identified that its IT operations team are spending too much time dealing with the effects of automated misuse, such as cleaning up data, resetting customer accounts and providing extra capacity during attacks. Furthermore, the unwanted automation is also causing some instabilities leading to negative feedback from customers. Therefore Falstone Paradise decides to go out to the security marketplace to identify, assess and select products or services that might help address these automation issues for all its websites. Their buying team works with their information technology colleagues to write the detailed requirements in an Invitation to Tender (ITT) document. This describes the types of attacks its web applications are receiving, their frequency of occurrence and their magnitudes. These are defined according to the '''OWASP Automated Threat Handbook''', so that vendors do not misunderstand the requirements, and each vendor's offering can be assessed against the particular automation threat events of concern.&lt;br /&gt;
&lt;br /&gt;
== Characterising vendor services ==&lt;br /&gt;
&lt;br /&gt;
Better Best Ltd has developed an innovative technology to help gaming companies defend against a range of automated threats that can otherwise permit cheating and distortion of the game, leading to disruption for normal players. The solution can be deployed on premises, but is also available in the cloud as a service. But Better Best is finding difficulty explaining its solution in the market place, especially since it does not fit into any conventional product category. Better Best decide to use the terminology and threat events listed in the '''OWASP Automated Threat Handbook''' to define their product's capabilities. They hope this will provide some clarity about their offering, and also demonstrate how their product can be used to replace more than one other conventional security device. Additionally, Better Best writes a white paper describing how their product has been successfully used by one of their reference customers Hollybush Challenge Games to protect against '''OAT-006 Expediting''', '''OAT-005 Scalping''', '''OAT-016 Skewing''' and '''OAT-013 Sniping'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Ontology=&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The list of [[:Category:Automated Threat|automated threat events]] and summary descriptions, defined in full in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf OWASP Automated Threat Handbook], is:&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-020'''	  Account Aggregation&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Use by an intermediary application that collects together multiple accounts and interacts on their behalf.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-019'''	  Account Creation&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Create multiple accounts for subsequent misuse.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-003'''	  Ad Fraud&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
False clicks and fraudulent display of web-placed advertisements.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-009'''	  CAPTCHA Defeat&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Solve anti-automation tests.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-010'''	  Card Cracking&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify missing start/expiry dates and security codes for stolen payment card data by trying different values.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-001'''	  Carding&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Multiple payment authorisation attempts used to verify the validity of bulk stolen payment card data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-012'''	  Cashing Out&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Buy goods or obtain cash utilising validated stolen payment card or other user account data.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-007'''	  Credential Cracking&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Identify valid login credentials by trying different values for usernames and/or passwords.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-008'''	  Credential Stuffing&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass log in attempts used to verify the validity of stolen username/password pairs.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-021'''	  Denial of Inventory&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Deplete goods or services stock without ever completing the purchase or committing to the transaction.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-015'''	  Denial of Service&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Target resources of the application and database servers, or individual user accounts, to achieve denial of service (DoS).&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-006'''	  Expediting&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Perform actions to hasten progress of usually slow, tedious or time-consuming actions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-004'''	  Fingerprinting&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Elicit information about the supporting software and framework types and versions.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-018'''	  Footprinting&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Probe and explore application to identify its constituents and properties.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-005'''	  Scalping&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Obtain limited-availability and/or preferred goods/services by unfair methods.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-011'''	  Scraping&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Collect application content and/or other data for use elsewhere.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-016'''	  Skewing&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Repeated link clicks, page requests or form submissions intended to alter some metric.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-013'''	  Sniping&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Last minute bid or offer for goods or services.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-017'''	  Spamming&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Malicious or questionable information addition that appears in public or private content, databases or user messages.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-002'''	  Token Cracking&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Mass enumeration of coupon numbers, voucher codes, discount tokens, etc.&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
'''OAT-014'''	  Vulnerability Scanning&lt;br /&gt;
   | align=&amp;quot;left&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
Crawl and fuzz application to identify weaknesses and possible vulnerabilities.&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
==Comparison with other dictionaries, taxonomies and lists==&lt;br /&gt;
&lt;br /&gt;
===[https://capec.mitre.org/ Common Attack Pattern Enumeration and Classification] (CAPEC)===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-capec-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
CAPEC is a dictionary and classification taxonomy of known attacks on software. Its primary classification structures are:&lt;br /&gt;
&lt;br /&gt;
* [https://capec.mitre.org/data/definitions/3000.html Domains of attack] (3000) - Social Engineering (403), [https://capec.mitre.org/data/definitions/437.html Supply Chain] (437), Communications (512), [https://capec.mitre.org/data/definitions/513.html Software] (513), Physical Security (514), Hardware (515)&lt;br /&gt;
* Mechanism of Attack (1000) - Gather Information (118), Deplete Resources (119), Injection (152), Deceptive Interactions (156), Manipulate Timing and State (172), Abuse of Functionality (210), Probabilistic Techniques (223), Exploitation of Authentication (225), Exploitation of Authorization (232), Manipulate Data Structures (255), Manipulate Resources (262), Analyze Target (281), Gain Physical Access (436), Malicious Code Execution (525), Alter System Components (526), Manipulate System Users (527)&lt;br /&gt;
&lt;br /&gt;
===[http://projects.webappsec.org/w/page/13246978/Threat%20Classification WASC Threat Classification]===&lt;br /&gt;
&lt;br /&gt;
[[File:Ontology-chart-wasc-wiki.png|link=]]&lt;br /&gt;
&lt;br /&gt;
The WASC Threat Classification classifies weaknesses and attacks that can lead to the compromise of a website, its data, or its users.&lt;br /&gt;
&lt;br /&gt;
===[[OWASP WASC Web Hacking Incidents Database Project]] (WHID)===&lt;br /&gt;
&lt;br /&gt;
WHID [https://www.google.com/fusiontables/DataSource?snapid=S1536501YnLo classifies] publicly known incidents using:&lt;br /&gt;
&lt;br /&gt;
* attack methods e.g. ARP spoofing, abuse of functionality, account compromise, administration error, automation, backdoor, banking trojan, brute force, clickjacking, code injection, content injection, content spoofing, credential/session prediction, cross site request forgery (CSRF), cross-site scripting (XSS), denial of service, directory traversal, domain hijacking, DNS hijacking, forceful browsing, HTTP response splitting, hidden parameter manipulation, hosting malicious code, information leakage, insufficient authentication, known vulnerability, local file inclusion (LFI), malvertising, malware, malware injection, mass assignment, misconfiguration, OS commanding, parameter manipulation, path traversal, phishing, predictable resource location, process automation, redirection, remote file inclusion (RFI), rogue 3rd party app, scaping, search engine poisoning, shell injection, social engineering, stolen credentials, SQL injection, unintentional information disclosure, weak password recovery validation, worm&lt;br /&gt;
* weakness e.g. abuse of functionality, application misconfiguration, directory indexing, improper filesystem permissions, improper input handling, improper output handling, information leakage, insecure indexing, insufficient anti-automation, insufficient authentication, insufficient authorization, insufficient entropy, insufficient password recovery, insufficient process validation, insufficient session expiration, insufficient transport layer protection, misconfiguration, predictable resource location, weak password&lt;br /&gt;
* outcome account hijacking, account takeover, botnet participation, chaos, credit card leakage, data loss, defacement, DDoS attacks, DNS hijacking, DNS redirection, disinformation, disclosure only, downtime, extortion, fraud, information warfare, leakage of information, link spam, loss of sales, malware distribution,  monetary loss, phishing, planting of malware, service disruption, session hijacking, spam, spam links, stolen credentials, worm&lt;br /&gt;
&lt;br /&gt;
Plus other/various/unknown.&lt;br /&gt;
&lt;br /&gt;
= Bibliography =&lt;br /&gt;
&lt;br /&gt;
The following academic, open source, commercial and news sources were used in the research on automated threats to web applications. OWASP is a worldwide not-for-profit charitable organization focused on improving the security of software.  We operate under a vendor neutral policy and we do not endorse products or services.&lt;br /&gt;
&lt;br /&gt;
* 10 years of Application Security, Denyall http://www.denyall.com/resources/whitepapers/?aliId=3438442&lt;br /&gt;
*	2012 Payment Card Threat Report	 https://www.securitymetrics.com/static/resources/orange/2012%20Payment%20Card%20Threat%20Report%20copy.pdf				&lt;br /&gt;
*	2014 Bot Traffic Report: Just the Droids You were Looking for	 http://www.incapsula.com/blog/bot-traffic-report-2014.html				&lt;br /&gt;
*	3 Types of ‘Return Fraud’ to Monitor this Holiday Season	 http://www.practicalecommerce.com/articles/3168-3-Types-of-%E2%80%98Return-Fraud-to-Monitor-this-Holiday-Season	&lt;br /&gt;
* 7 Ways Bots Hurt Your Website, Distil Networks http://www.distilnetworks.com/7-ways-bots-hurt-website-whitepaper/						&lt;br /&gt;
*	Abusing HTML 5 Structured Client-side Storage	2008	 http://packetstorm.wowhacker.com/papers/general/html5whitepaper.pdf		&lt;br /&gt;
* Acquiring Experience with Ontology and Vocabularies, Walt Melo, Risa Mayan and Jean Stanford, 2011  http://www.omg.org/news/meetings/workshops/SOA-HC/presentations-2011/13_SC-6_Melo_Stanford_Mayan.pdf	&lt;br /&gt;
*	An Anatomy of a SQL Injection Attack	 Hacker Intelligence Initiative	 Imperva	 	 http://www.imperva.com/docs/HII_An_Anatomy_of_a_SQL_Injection_Attack_SQLi.pdf	&lt;br /&gt;
*	The Anatomy of Clickbot.A	 https://www.usenix.org/legacy/event/hotbots07/tech/full_papers/daswani/daswani.pdf				&lt;br /&gt;
*	Anatomy of comment spam	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Anatomy_of_Comment_Spam.pdf		&lt;br /&gt;
*	Anti-Automation Monitoring and Prevention	2015	 https://www.clerkendweller.uk/2015/1/29/AntiAutomation-Monitoring-and-Prevention			&lt;br /&gt;
*	Anti-DDoS Solution for Internet Corporation	 http://www.nsfocus.com/uploadfile/Solution/NSFOCUS%20Anti-DDoS%20Solution%20for%20Internet%20Corporation.pdf				&lt;br /&gt;
*	Anti-Fraud Principles and Proposed Taxonomy	 Sep 2014	 http://www.iab.net/media/file/IAB_Anti_Fraud_Principles_and_Taxonomy.pdf			&lt;br /&gt;
*	Apache Security	 Ivan Ristic	 			&lt;br /&gt;
* Application Security Desk Reference, OWASP https://www.owasp.org/index.php/Category:OWASP_ASDR_Project&lt;br /&gt;
* Application Security Guide For CISOs, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-guide.pdf&lt;br /&gt;
* AppSensor, OWASP https://www.owasp.org/index.php/OWASP_AppSensor_Project&lt;br /&gt;
*	Attack &amp;amp; Defense Labs	 http://www.andlabs.org/html5.html				&lt;br /&gt;
*	Attack categories	 OWASP	 https://www.owasp.org/index.php/Category:Attack	&lt;br /&gt;
* Attack Trees, Schneier, Dr. Dobb's Journal, December 1999 https://www.schneier.com/paper-attacktrees-ddj-ft.html		&lt;br /&gt;
*	Attacking with HTML5	2010	 https://media.blackhat.com/bh-ad-10/Kuppan/Blackhat-AD-2010-Kuppan-Attacking-with-HTML5-wp.pdf			&lt;br /&gt;
*	Automated attacks	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Automation_of_Attacks.pdf		&lt;br /&gt;
*	Avoiding the Top 10 Software Security Design Flaws	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf				&lt;br /&gt;
*	Bad Bots On The Rise	 Dec 2014	 http://www.darkreading.com/informationweek-home/bad-bots-on-the-rise/d/d-id/1318276	&lt;br /&gt;
* Banking Botnets Persist Despite Takedowns, Dell SecureWorks, 2015 http://www.secureworks.com/cyber-threat-intelligence/threats/banking-botnets-persist-despite-takedowns/	&lt;br /&gt;
*	The Barracuda Web Application Firewall: XML Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_XML_Firewall.pdf	&lt;br /&gt;
*	Blocking Brute Force Attacks	 http://www.cs.virginia.edu/~csadmin/gen_support/brute_force.php				&lt;br /&gt;
*	Bot Traffic Growing Problem for Digital	 Oct 2014	 http://www.netnewscheck.com/article/36537/bot-traffic-growing-problem-for-digital			&lt;br /&gt;
*	BotoPedia	 Incapsula	 http://www.botopedia.org/			&lt;br /&gt;
*	Boy in the Browser	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/Boy_in_the_Browser	&lt;br /&gt;
* Business Logic Attacks - Bots and BATs, Eldad Chai, 2009 http://www.owasp.org/images/9/96/AppSecEU09_BusinessLogicAttacks_EldadChai.ppt		&lt;br /&gt;
*	Bypassing Client Application Protection Techniques	 http://www.securiteam.com/securityreviews/6S0030ABPE.html&lt;br /&gt;
*	A CAPTCHA in the Rye	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_a_CAPTCHA_in_the_Rye.pdf					&lt;br /&gt;
*	Characterizing Large Scale Click fraud	 http://cseweb.ucsd.edu/~voelker/pubs/za-ccs14.pdf	&lt;br /&gt;
* Charter Addition Proposal: &amp;quot;Trusted Code&amp;quot; for the Web https://lists.w3.org/Archives/Public/public-webappsec/2015Mar/0150.html&lt;br /&gt;
*	A cheesy Apache / IIS DoS vuln (+a question) 	 http://www.securityfocus.com/archive/1/456339/30/0/threaded	&lt;br /&gt;
* China's Man-on-the-Side Attack on GitHub http://www.netresec.com/?page=Blog&amp;amp;month=2015-03&amp;amp;post=China%27s-Man-on-the-Side-Attack-on-GitHub&lt;br /&gt;
* The CISO Survey and Report, OWASP, 2013 https://www.owasp.org/index.php/File:Owasp-ciso-report-2013-1.0.pdf&lt;br /&gt;
* Common Attack Pattern Enumeration and Classification (CAPEC), Mitre https://capec.mitre.org/			&lt;br /&gt;
*	Common Cyber Attacks: Reducing the Impact	 CERT-UK	 https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/400106/Common_Cyber_Attacks-Reducing_The_Impact.pdf			&lt;br /&gt;
*	Corporate espionage – the internet’s new growth industry	 http://www.itproportal.com/2015/03/19/corporate-espionage-internets-new-growth-industry/				&lt;br /&gt;
*	CSA Top Threats to Cloud Computing	 https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf				&lt;br /&gt;
*	CSRF vulnerability in GMail service	 http://seclists.org/fulldisclosure/2009/Mar/29		&lt;br /&gt;
* CWE/SANS Top 25 Most Dangerous Software Errors, 2011 http://cwe.mitre.org/top25/		&lt;br /&gt;
*	Cyber Fraud - Tactics	 Techniques and Procedures	 http://www.crcpress.com/product/isbn/9781420091274			&lt;br /&gt;
* Cybercrime Report: Q1 2015, ThreatMetrix, 2015 http://info.threatmetrix.com/WP-2015Q1CybercrimeReport_WP-LP.html&lt;br /&gt;
*	Data Breach Investigations Report (DBIR), 2014	 http://www.verizonenterprise.com/DBIR/2014/				&lt;br /&gt;
* Data Breach Investigations Report (DBIR), 2015 http://www.verizonenterprise.com/DBIR/2015/&lt;br /&gt;
*	Data Breaches Fuel Login Attacks	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2014-state-of-the-internet-threat-advisory-public-data-breaches-fuel-login-attacks.pdf		&lt;br /&gt;
*	Data Scraping	 Wikipedia	 http://en.wikipedia.org/wiki/Data_scraping			&lt;br /&gt;
*	DDoS Quick Guide	 https://www.us-cert.gov/sites/default/files/publications/DDoS%20Quick%20Guide.pdf	&lt;br /&gt;
* DDoS Threat Landscape Report, 2013-2014 http://lp.incapsula.com/rs/incapsulainc/images/2013-14_ddos_threat_landscape.pdf	&lt;br /&gt;
* Defending Against an Internet-based Attack on the Physical World http://avirubin.com/scripted.attacks.pdf		&lt;br /&gt;
*	Defending Against Application-Based DDoS Attacks with the Barracuda Web Application Firewall	 https://www.barracuda.com/assets/docs/White_Papers/Barracuda_Web_Application_Firewall_WP_Defending%20_Against_%20Application-Based_%20DDoS_%20Attacks.pdf				&lt;br /&gt;
*	Demystifying HTML 5 Attacks	 http://resources.infosecinstitute.com/demystifying-html-5-attacks/				&lt;br /&gt;
*	Denial of Service Attacks: A Comprehensive Guide to Trends	 Techniques	 and Technologies	 Hacker Intelligence Initiative	 Imperva	 http://www.imperva.com/docs/HII_Denial_of_Service_Attacks-Trends_Techniques_and_Technologies.pdf&lt;br /&gt;
*	Detecting and Blocking Site Scraping Attacks	 Imperva	 http://www.imperva.com/docs/WP_Detecting_and_Blocking_Site_Scraping_Attacks.pdf			&lt;br /&gt;
*	Detecting Automation of Twitter Accounts: Are you a human	 cyborg	 or a bot?	 http://www.cs.wm.edu/~hnw/paper/tdsc12b.pdf		&lt;br /&gt;
*	Detecting Malice	 Robert &amp;quot;RSnake&amp;quot; Hansen	2009	 http://www.detectmalice.com/		&lt;br /&gt;
*	Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) 	 http://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1414072277428&amp;amp;uri=CELEX:32002L0058				&lt;br /&gt;
*	Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data 	 http://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:31995L0046				&lt;br /&gt;
*	Distributed Denial-of-Service (DDoS) Cyber-Attacks	 Risk Mitigation	 and Additional Resources	 Federal Financial Institutions Examination Council	 http://www.ffiec.gov/press/PDF/FFIEC%20DDoS%20Joint%20Statement.pdf	&lt;br /&gt;
*	Do Evil - The Business of Social Media Bots	 Forbes	 http://www.forbes.com/sites/lutzfinger/2015/02/17/do-evil-the-business-of-social-media-bots/			&lt;br /&gt;
*	DoS and DDoS Glossary of Terms	 prolexic	 http://www.prolexic.com/knowledge-center-dos-and-ddos-glossary.html#layer-7-ddos-attack			&lt;br /&gt;
*	E-commerce Malware	 Trustwave	 https://gsr.trustwave.com/topics/placeholder-topic/e-commerce-malware/	&lt;br /&gt;
* Exploiting Software, G. Hoglund and G. McGraw, Addison-Wesley, 2004&lt;br /&gt;
* Five Trends to Track in E-Commerce Fraud, ThreatMetrix, 2013 http://info.threatmetrix.com/rs/threatmetrix/images/Five_Trends_eCommerce_Fraud_WP.pdf&lt;br /&gt;
* Hacker builds cheatbot for hit app Trivia Crack http://www.theregister.co.uk/2015/03/26/hacker_builds_trivia_crack_cheat_app/	&lt;br /&gt;
* Has Walmart opened itself up to “Denial of inventory” attacks?  https://arstechnica.com/business/2012/05/has-walmart-opened-itself-up-to-denial-of-inventory-attacks/	&lt;br /&gt;
* How Hoarder Bots Steal sales from Online Retailers https://www.internetretailer.com/mobile/2016/12/16/how-hoarder-bots-steal-sales-online-retailers&lt;br /&gt;
*	How to Defend Against DDoS Attacks - Strategies for the Network	 Transport	 and Application Layers	 Prolexic	 http://www.prolexic.com/kcresources/white-paper/strategies-for-the-network-transport-and-application-layers-412/Strategies_for_the_Network_Transport_and_Application_Layers_Prolexic_White_Paper_A4_082412.pdf	&lt;br /&gt;
* How to Defend Online Travel Websites in the Era of Site Scraping, Distil Networks http://www.distilnetworks.com/defend-online-travel-websites-era-site-scraping-download/&lt;br /&gt;
*	How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores	 http://research.microsoft.com/pubs/145858/caas-oakland-final.pdf				&lt;br /&gt;
*	HTML5 Overview	 A look at HTML5 Attack Scenarios	 Trend Micro	2011	 http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt_html5-attack-scenarios.pdf	&lt;br /&gt;
*	HTML5 Top 10 Threats Stealth Attacks and Silent Exploits	2012	 https://media.blackhat.com/bh-eu-12/shah/bh-eu-12-Shah_HTML5_Top_10-WP.pdf			&lt;br /&gt;
*	HTML5 web security	2011	 http://media.hacking-lab.com/hlnews/HTML5_Web_Security_v1.0.pdf			&lt;br /&gt;
*	HTTPPOST - Slow POST	 Wong Onn Chee	 OWASP AppSec DC 2010	 https://www.owasp.org/images/4/43/Layer_7_DDOS.pdf	&lt;br /&gt;
* If you've got @British_Airways account may make sense to change your password. Just had all my Avios cleared out! https://twitter.com/suttonnick/status/581556027948195840/photo/1	&lt;br /&gt;
* Internet Security Threat Report, Volume 19, 2014 http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf&lt;br /&gt;
*	An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks	 http://www.springer.com/gb/book/9788132202769	&lt;br /&gt;
*	Is Your Data Center Ready for Today’s DDoS Threats? DDoS attack types	 protection methods and testing your detection and mitigation defenses	 http://www.fortinet.com/sites/default/files/whitepapers/WP-DDoS-Testing.pdf			&lt;br /&gt;
*	Joomla Reflection DDoS-for-Hire	 Akamai	 Feb 2015	 http://www.stateoftheinternet.com/downloads/pdfs/2015-state-of-the-internet-threat-advisory-joomla-reflection-attack-ddos-for-hire.pdf		&lt;br /&gt;
*	Layer 7 DDOS – Blocking HTTP Flood Attacks	 http://blog.sucuri.net/2014/02/layer-7-ddos-blocking-http-flood-attacks.html				&lt;br /&gt;
*	Lenovo	 Superfish put smut on my system' – class-action lawsuit	 The Register	 http://www.theregister.co.uk/2015/02/23/lenovo_superfish_class_action_lawsuit/		&lt;br /&gt;
* List of Attack Vectors   Relative Vulnerability Rating TECAPI http://www.tecapi.com/public/relative-vulnerability-rating-gui.jsp#&lt;br /&gt;
*	Man in the Browser	 http://scisweb.ulster.ac.uk/~kevin/IJACI-Vol4No1-maninbrowser.pdf				&lt;br /&gt;
*	Man in the Browser Attack	 https://www.owasp.org/index.php/Man-in-the-browser_attack&lt;br /&gt;
* Mapping and Measuring Cybercrime, Oxford Internet Institute http://www.oii.ox.ac.uk/publications/FD18.pdf				&lt;br /&gt;
*	Massive Changes in the Criminal Landscape	 Europol	2015	 https://www.europol.europa.eu/content/massive-changes-criminal-landscape	&lt;br /&gt;
* Matching Attack Patterns to Security Vulnerabilities in Software-Intensive System Designs http://collaboration.csc.ncsu.edu/laurie/Papers/ICSE_Final_MCG_LW.pdf	&lt;br /&gt;
*	Mitigating DDoS Attacks with F5 Technology	 F5	 https://f5.com/resources/white-papers/mitigating-ddos-attacks-with-f5-technology			&lt;br /&gt;
* Mitigating the DoS/DDosS Threat, Radware, 2012 http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452061&lt;br /&gt;
* Modern Web Attacks, Sophos, 2007 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/modern-web-attacks.aspx&lt;br /&gt;
*	ModSecurity Advanced Topic of the Week: Mitigating Slow HTTP DoS Attacks	 https://www.trustwave.com/Resources/SpiderLabs-Blog/(Updated)-ModSecurity-Advanced-Topic-of-the-Week--Mitigating-Slow-HTTP-DoS-Attacks/	&lt;br /&gt;
* Most common attacks on web applications https://ipsec.pl/web-application-security/most-common-attacks-web-applications.html			&lt;br /&gt;
* Multi-dimensional Vulnerability Hierarchies Daniel Miessler  https://danielmiessler.com/study/multi-dimensional-vulnerability-hierarchies/&lt;br /&gt;
*	New Wave of DDoS Attacks Launched	 BankInfoSecurity.com	 Mar 2013	 http://www.bankinfosecurity.com/new-wave-ddos-attacks-launched-a-5584/op-1		&lt;br /&gt;
*	NOMAD: Toward Non-Invasive Moving Target Defense Against Web Bots	 http://faculty.cs.tamu.edu/guofei/paper/NOMAD_CNS13.pdf				&lt;br /&gt;
*	Online Ad Fraud Exposed: Advertisers Losing $6.3 Billion To $10 Billion Per Year	 Sep 2014	 http://www.darkreading.com/analytics/threat-intelligence/online-ad-fraud-exposed-advertisers-losing-$63-billion-to-$10-billion-per-year/d/d-id/1317979			&lt;br /&gt;
* Online Data Companies versus Bots: The Fight is on for Control of Online Data, Distil Networks http://www.distilnetworks.com/online-data-companies-vs-bots-download/&lt;br /&gt;
*	Optimal Airline Ticket Purchasing Using Automated User-Guided Feature Selection	 http://ijcai.org/papers13/Papers/IJCAI13-032.pdf				&lt;br /&gt;
*	Payment Checkout Flaws and Bugs	2014	 https://www.clerkendweller.uk/2014/11/4/Payment-Checkout-Flaws-and-Bugs			&lt;br /&gt;
*	PCI Compliance Report 2015	 Verizon	 http://www.verizonenterprise.com/pcireport/2015/			&lt;br /&gt;
*	Pixel Perfect Timing Attacks with HTML5	2013	 http://www.contextis.com/services/research/white-papers/pixel-perfect-timing-attacks-html5/			&lt;br /&gt;
*	Polymorphism as a Defense for Automated Attack of Websites	 http://link.springer.com/chapter/10.1007%2F978-3-319-07536-5_30				&lt;br /&gt;
*	Preventing Web Scraping: Best Practice 	 https://creativedigitalideas.files.wordpress.com/2014/11/best-practice-to-prevent-web-scraping.pdf				&lt;br /&gt;
*	Profile: Automated Credit Card Fraud	 http://old.honeynet.org/papers/profiles/cc-fraud.pdf				&lt;br /&gt;
* Protecting Against Web Floods, Radware http://www.radware.com/PleaseRegister.aspx?returnUrl=6442452968&lt;br /&gt;
*	Q4 2014 State of the Internet Security Report	 prolexic	 http://www.stateoftheinternet.com/downloads/pdfs/2014-internet-security-report-q4.pdf			&lt;br /&gt;
*	Reflection injection	 http://cybersecurity.ieee.org/images/files/images/pdf/CybersecurityInitiative-online.pdf		&lt;br /&gt;
* A Report on taxonomy and evaluation of existing inventories, ENISAhttp://ecrime-project.eu/wp-content/uploads/2015/02/E-Crime-Deliverable-2-1-20141128_FINAL.pdf			&lt;br /&gt;
* Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft, Dept of Justice http://www.justice.gov/criminal/cybercrime/docs/ip-victim-guide-and-checklist-march-2013.pdf&lt;br /&gt;
*	SANS Top 20 Critical Controls	 https://www.sans.org/critical-security-controls/		&lt;br /&gt;
* Securing Websites, Sophos, 2011 http://www.sophos.com/en-us/why-sophos/our-people/technical-papers/securing-websites.aspx		&lt;br /&gt;
*	Security Insights: Defending Against Automated Threats	 http://www.securityweek.com/security-insights-defending-against-automated-threats				&lt;br /&gt;
*	Server side DDoS	 Imperva	 http://www.imperva.com/DefenseCenter/ThreatAdvisories/DDOS_Attack_Method_Payload_05182010			&lt;br /&gt;
*	Slow Read Denial of Service attack	 https://code.google.com/p/slowhttptest/wiki/SlowReadTest				&lt;br /&gt;
*	Slow-Read DoS Attack	 https://www.trustwave.com/Resources/SpiderLabs-Blog/ModSecurity-Advanced-Topic-of-the-Week--Mitigation-of--Slow-Read--Denial-of-Service-Attack/				&lt;br /&gt;
*	Slowloris HTTP DoS	 http://ha.ckers.org/slowloris/	 	&lt;br /&gt;
* So what are the &amp;quot;most critical&amp;quot; application flaws? On new OWASP Top 10 https://ipsec.pl/application-security/2013/so-what-are-most-critical-application-flaws-new-owasp-top-10.html		&lt;br /&gt;
*	Social Media Bots Offer Phony Friends and Real Profit	 NY Times	 http://www.nytimes.com/2014/11/20/fashion/social-media-bots-offer-phony-friends-and-real-profit.html?_r=1			&lt;br /&gt;
* Software Vulnerability Analysis, Krsul, 1998 http://www.krsul.org/ivan/articles/main.pdf&lt;br /&gt;
*	Sophos Security Threat Report	 http://blogs.sophos.com/2014/12/11/our-top-10-predictions-for-security-threats-in-2015-and-beyond/&lt;br /&gt;
* SpoofedMe Social Login Attack Discovered by IBM X-Force Researchers http://securityintelligence.com/spoofedme-social-login-attack-discovered-by-ibm-x-force-researchers/#.VSuiEhPSngM				&lt;br /&gt;
* State of Software Security Report, Volume 5, Veracode, 2013 https://info.veracode.com/state-of-software-security-report-volume5.html&lt;br /&gt;
*	Stopping Automated Attack Tools	 http://www.technicalinfo.net/papers/StoppingAutomatedAttackTools.html&lt;br /&gt;
* Taxonomy on Online Game Security http://www.math.snu.ac.kr/~jhcheon/publications/2004/Taxonomy%20on%20online%20game%20security_EL.pdf	&lt;br /&gt;
* A Taxonomy of Computer Program Security Flaws, with Examples, Landwehr https://cwe.mitre.org/documents/sources/ATaxonomyofComputerProgramSecurityFlawswithExamples%5BLandwehr93%5D.pdf&lt;br /&gt;
* A Taxonomy of Security Faults in the UNIX Operating System, Aslam, 1995 https://cwe.mitre.org/documents/sources/ATaxonomyofSecurityFaultsintheUNIXOperatingSystem%5BAslam95%5D.pdf		&lt;br /&gt;
* Testing Guide, v4, OWASP, 2014 https://www.owasp.org/images/5/52/OWASP_Testing_Guide_v4.pdf								&lt;br /&gt;
*	The Bot Baseline: Fraud in Digital Advertising	 https://s3.amazonaws.com/whiteops-public/WO-ANA-Baseline-Study-of-Bot-Fraud.pdf							&lt;br /&gt;
*	The Internet Organised Crime Threat Assessment (iOCTA) 2014	 https://www.europol.europa.eu/content/internet-organised-crime-threat-assesment-iocta				&lt;br /&gt;
*	The Notorious Nine	 Cloud Computing Top Threats in 2013	 CSA	 https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf	&lt;br /&gt;
* The Risks of Content Management Systems, IBM, 2015 https://portal.sec.ibm.com/mss/html/en_US/support_resources/pdf/CMS_Threats_MSS_Threat_Report.pdf	&lt;br /&gt;
* The Spy in the Sandbox – Practical Cache Attacks in Javascript http://iss.oy.ne.ro/SpyInTheSandbox.pdf						&lt;br /&gt;
* Thousands of Hacked Uber Accounts Selling on Dark Web for $1 http://thehackernews.com/2015/03/thousands-of-hacked-uber-accounts_30.html?m=1&lt;br /&gt;
* Threat Intelligence Quarterly, IBM, 1Q 2015 https://www.ibm.com/services/forms/signup.do?source=swg-WW_Security_Organic&amp;amp;S_PKG=ov33510&amp;amp;S_TACT=C327017W&amp;amp;dynform=18101&lt;br /&gt;
* Threat Modeling: Designing for Security, Adam Shostack, Wiley, April 2014 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118809998.html&lt;br /&gt;
*	Threats and Mitigations: A Guide to Multi-Layered Web Security - eBook	 Prolexic	 	 http://www.prolexic.com/knowledge-center/prolexic-download/guide-multi-layered-web-security-ebook.pdf		&lt;br /&gt;
* Trapping Unknown Malware in a Context Web, Sophos http://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/HuqSzabo-VB2013.pdf?la=en.pdf&lt;br /&gt;
*	Trustwave Global Security Report	2014	 https://www2.trustwave.com/GSR2014.html?utm_source=redirect&amp;amp;utm_medium=web&amp;amp;utm_campaign=GSR2014			&lt;br /&gt;
*	TurboTax’s Anti-Fraud Efforts Under Scrutiny	 http://krebsonsecurity.com/2015/02/turbotaxs-anti-fraud-efforts-under-scrutiny/				&lt;br /&gt;
*	Two Security Vulnerabilities in the Spring Framework’s MVC pdf (from 2008)	 http://blog.diniscruz.com/2011/07/two-security-vulnerabilities-in-spring.html&lt;br /&gt;
*	The Underground Economy of Spam: A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns	 http://static.usenix.org/events/leet11/tech/full_papers/Stone-Gross.pdf					&lt;br /&gt;
*	Understanding Web Bots and How They Hurt Your Business	 Encapsula	 http://www.slideshare.net/Incapsula/understanding-web-bots-and-how-they-hurt-your-business		&lt;br /&gt;
* Use of A Taxonomy of Security Faults, Taimur Aslam, Ivan Krsul and Eugene H Spafford, 1996  http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=2304&amp;amp;context=cstech&lt;br /&gt;
*	The WASC Threat Classification v2.0	 http://projects.webappsec.org/w/page/13246978/Threat%20Classification	&lt;br /&gt;
* Warhol Worms: The Potential for Very Fast Internet Plagues http://www.iwar.org.uk/comsec/resources/worms/warhol-worm.htm	&lt;br /&gt;
*	Web Application Attack Report #5	 Imperva	 http://www.imperva.com/docs/HII_Web_Application_Attack_Report_Ed5.pdf	&lt;br /&gt;
* Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Ryan Barnett, Wiley, December 2012 http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118362187.html		&lt;br /&gt;
*	Web Attacks in the Wild	 Corsaire	 https://www.owasp.org/images/a/a7/Web_attacks_in_the_wild_-_ap.pdf			&lt;br /&gt;
*	Web Automation	 Friend or Foe?	 https://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf			&lt;br /&gt;
*	Web Spambot Detection Based on Web Navigation Behaviour 	 http://pedramhayati.com/papers/Web_Spambot_Detection_Based_on_Web_Usage_Behaviour.pdf		&lt;br /&gt;
* Website Security Statistics Report, 2014 http://info.whitehatsec.com/rs/whitehatsecurity/images/statsreport2014-20140410.pdf		&lt;br /&gt;
*	What is Zeus?	 http://www.sophos.com/medialibrary/pdfs/technical%20papers/sophos%20what%20is%20zeus%20tp.pdf				&lt;br /&gt;
*	When Web 2.0 Attacks! Understanding Ajax	 Flash and other highly interactive web technologies…	 https://www.owasp.org/images/f/fc/When_Web_2.0_Attacks_-_Understanding_Security_Implications_of_Highly_Interactive_Technologies-Rafal_Los.pdf			&lt;br /&gt;
*	Where have all of our Passwords Gone?	 Gartner	2015	 http://blogs.gartner.com/avivah-litan/2015/01/22/where-have-all-our-passwords-gone/		&lt;br /&gt;
*	WS-Attacks.org	 http://www.ws-attacks.org/index.php/Main_Page&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; What do you mean by &amp;quot;web&amp;quot;, &amp;quot;application&amp;quot; and &amp;quot;automated threat&amp;quot;?&lt;br /&gt;
: See the definitions in the project's {{#switchtablink:Project Scope and Definitions|glossary}}.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;ontology&amp;quot;?&lt;br /&gt;
: An ontology is a set of types, properties, and relationship. These together define a subject description language. This particular ontology is meant to represent what automated threats real world owners observe affecting their web applications in usual operations.&lt;br /&gt;
&lt;br /&gt;
; Isn't this another bug (vulnerability) list?&lt;br /&gt;
: No, none of the named automated threat events are implementation bugs - they relate to abuse of functionality using automated means.&lt;br /&gt;
&lt;br /&gt;
; I thought &amp;quot;so and so&amp;quot; already did that?&lt;br /&gt;
: We found that it did not exist. While many threats are mentioned in the sources researched, there was no overall list or definitions. We found the automated threat events tended to all be in a small number of definied items from Mitre CAPEC and WASC Threat Classification. If you know of other automated threat lists/taxonomies/ontologies, please share them.&lt;br /&gt;
&lt;br /&gt;
; What is an &amp;quot;oat&amp;quot;?&lt;br /&gt;
: It is our abbreviation for OWASP Automated Threat (OAT).&lt;br /&gt;
&lt;br /&gt;
; I am confused and don't know which OAT my problem is - how do I identify it?&lt;br /&gt;
: In 2017 we created a [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] to help identify the correct OAT, which can then be confirmed by reading the full description in the [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf handbook]. The short summaries are important explanations of each OAT name.&lt;br /&gt;
&lt;br /&gt;
; How can I help?&lt;br /&gt;
: Please join our mailing list, send ideas, contribute clarifications, corrections and improvement, and let other people know about the project and its handbook.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements and Sponsors =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
* Sumit Agarwal&lt;br /&gt;
* Jason Chan&lt;br /&gt;
* Mark Hall&lt;br /&gt;
* Omri Iluz&lt;br /&gt;
* Andrew van der Stock&lt;br /&gt;
* Roland Weber&lt;br /&gt;
* [mailto:colin.watson@owasp.org Colin Watson]&lt;br /&gt;
* [mailto:tin.zaw@owasp.org Tin Zaw]&lt;br /&gt;
&lt;br /&gt;
Additionally other professional colleagues and website owners and operators who provided feedback.&lt;br /&gt;
&lt;br /&gt;
==Reviewers==&lt;br /&gt;
&lt;br /&gt;
* Igor Andriushchenko&lt;br /&gt;
* Gabriel Mendez Justiniano&lt;br /&gt;
* Matt Tesauro&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
All OWASP Projects are run and developed by volunteers and rely on personal donations and sponsorship to continue their development. OWASP does not endorse or recommend commercial products or services, allowing our community to remain vendor neutral with the collective wisdom of the best minds in software security worldwide. This project has received the sponsorship part of their Corporate OWASP membership fees from Verizon Digital Media Services in 2016 and Distil Networks in 2017, which has already contributed to the v1.2 production design costs, and will also be utilised to help promote knowledge of the project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[file:Verizon_Digital_Medial_Logo.jpg|size=150x45px|link=https://www.verizondigitalmedia.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Distil-flat-logo-2.png|link=https://www.distilnetworks.com]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Can you help? The project is looking for information on the prevalence and types of automated threats seen by web application owners in the real world. This will be used to refine and organise the information gathered from research papers, whitepapers, security reports and industry news. Please use the project's mailing lists to keep up-to-date with what's going on, and to contribute your ideas, feedback, and experience:&lt;br /&gt;
&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/automated_threats_to_web_applications Mailing list]&lt;br /&gt;
&lt;br /&gt;
To share information confidentially, you can email the project leaders directly: [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:colin.watson@owasp.org Colin Watson].&lt;br /&gt;
&lt;br /&gt;
== Completed Outputs==&lt;br /&gt;
&lt;br /&gt;
* {{#switchtablink:Scope and Definitions|Glossary}}&lt;br /&gt;
* {{#switchtablink:Bibliography|Bibligraphy of information sources}}&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automated-threats.pdf summary chart] has been published summarising the information gathered and work to date&lt;br /&gt;
* Identifying automated threats to web applications, and determining the primary name used. This first part of the project intends to produce a consistent vocabulary for discussing the threats before moving onto other aspects&lt;br /&gt;
* The primary terms have now been defined and described for the ontology&lt;br /&gt;
* A [https://www.owasp.org/index.php/File:Automation-briefing.pdf briefing document] was produced in May 2015&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Automated Threat Handbook] July 2015 [https://www.owasp.org/index.php/File:Owasp-automated-threat-handbook-source-files.zip source files], updated in November 2016&lt;br /&gt;
* Release [https://www.owasp.org/index.php/File:Automation-project-briefing.pdf project overview flyer]  July 2015&lt;br /&gt;
* Release  [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] December 2016&lt;br /&gt;
&lt;br /&gt;
== Roadmap==&lt;br /&gt;
&lt;br /&gt;
The project's roadmap was updated in October 2017.&lt;br /&gt;
&lt;br /&gt;
===Q1 2015===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Feb 2015: Define scope and terminology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Mar 2015: Research prior work and reports about automated threats to web applications to create bibliography&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q2 2015===&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Assess threats/attacks and create ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;Apr 2015: Application owner interviews and creation of initial project outputs, to refine model&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Publication of outputs and request for review/data&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
*  &amp;lt;strike&amp;gt;May 2015: Summit session and survey at AppSec EU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun 2015 Write ontology document&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Write 2-page project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jun Publish project briefing&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul 2015: Publish v1.0 ontology&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q3 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Jul-Sep 2016: Gathering of additional contributions and update handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
===Q4 2016===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Nov 2016: Release updated handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec 2016: Threat identification chart&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q1 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Dec-Mar 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Check against changes to CAPEC v2.9&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q2 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Apr-Jun 2017: Further review and update to handbook&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecEU&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q3 2017 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Chase up ongoing project review&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
* &amp;lt;strike&amp;gt;Project summit at AppSecUS&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Q4 2017 ===&lt;br /&gt;
* Release v1.2 (now due 15 Feb 2018)&lt;br /&gt;
&lt;br /&gt;
=== Q1 2018 ===&lt;br /&gt;
* &amp;lt;strike&amp;gt;Create OAT wiki pages&amp;lt;/strike&amp;gt; Done&lt;br /&gt;
&lt;br /&gt;
=== Future ===&lt;br /&gt;
* Write executive summary&lt;br /&gt;
* Release executive summary document&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]] [[Category:SAMM-SR-2]] [[Category:SAMM-TA-1]] [[Category:SAMM-EG-2]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OAT-021_Denial_of_Inventory&amp;diff=237793</id>
		<title>OAT-021 Denial of Inventory</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OAT-021_Denial_of_Inventory&amp;diff=237793"/>
				<updated>2018-02-16T15:15:48Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Indicative Diagram */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
This is an automated threat. To view all automated threats, please see the [[:Category:Automated Threat|Automated Threat Category]] page. The OWASP Automated Threat Handbook - Wed Applications ([https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf pdf], print), an output of the [[OWASP Automated Threats to Web Applications|OWASP Automated Threats to Web Applications Project]], provides a fuller guide to  each threat, detection methods and countermeasures. The [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] helps to correctly identify the automated threat.&lt;br /&gt;
&lt;br /&gt;
== Definition ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Automated Threat (OAT) Identity Number ===&lt;br /&gt;
&lt;br /&gt;
OAT-021&lt;br /&gt;
&lt;br /&gt;
===Threat Event Name===&lt;br /&gt;
&lt;br /&gt;
Denial of Inventory&lt;br /&gt;
&lt;br /&gt;
=== Summary Defining Characteristics===&lt;br /&gt;
&lt;br /&gt;
Deplete goods or services stock without ever completing the purchase or committing to the transaction.&lt;br /&gt;
&lt;br /&gt;
===Indicative Diagram===&lt;br /&gt;
&lt;br /&gt;
[[File:OAT-021_Denial_of_Inventory.png|500px|link=]]&lt;br /&gt;
&lt;br /&gt;
=== Description ===&lt;br /&gt;
&lt;br /&gt;
Selection and holding of items from a limited inventory or stock, but which are never actually bought, or paid for, or confirmed, such that other users are unable to buy/ pay/confirm the items themselves. It differs from [[OAT-005 Scalping]] in that the goods or services are never actually acquired by the attacker.&lt;br /&gt;
&lt;br /&gt;
Denial of Inventory is most commonly thought of as taking ecommerce items out of circulation by adding many of them to a cart/basket; the attacker never actually proceeds to checkout to buy them but contributes to a possible stock-out condition. A variation of this automated threat event is making reservations (e.g. hotel rooms, restaurant tables, holiday bookings, flight seats), and/or click-and-collect without payment. But this exhaustion of inventory availability also occurs in other types of web application such as in the assignment of non-goods like service allocations, product rations, availability slots, queue positions, and budget apportionments.&lt;br /&gt;
&lt;br /&gt;
If server resources are reduced see [[OAT-015 Denial of Service]] instead. Like [[OAT-005 Scalping]] , Denial of Inventory also reduces the availability of goods or services.&lt;br /&gt;
&lt;br /&gt;
=== Other Names and Examples ===&lt;br /&gt;
&lt;br /&gt;
Hoarding; Hold all attack; Inventory depletion; Inventory exhaustion; Stock exhaustion&lt;br /&gt;
&lt;br /&gt;
=== See Also ===&lt;br /&gt;
&lt;br /&gt;
* [[OAT-005 Scalping]]&lt;br /&gt;
* [[OAT-013 Sniping]]&lt;br /&gt;
* [[OAT-015 Denial of Service]]&lt;br /&gt;
&lt;br /&gt;
== Cross-References ==&lt;br /&gt;
&lt;br /&gt;
=== CAPEC Category / Attack Pattern IDs ===&lt;br /&gt;
&lt;br /&gt;
* 210 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== CWE Base / Class / Variant IDs ===&lt;br /&gt;
&lt;br /&gt;
* 799 Improper Control of Interaction Frequency&lt;br /&gt;
* 841 Improper Enforcement of Behavioral Workflow&lt;br /&gt;
&lt;br /&gt;
=== WASC Threat IDs ===&lt;br /&gt;
&lt;br /&gt;
* 21 Insufficient Anti-Automation&lt;br /&gt;
* 42 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== OWASP Attack Category / Attack IDs ===&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Abuse of Functionality|Abuse of Functionality]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Automated Threat]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OAT-020_Account_Aggregation&amp;diff=237792</id>
		<title>OAT-020 Account Aggregation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OAT-020_Account_Aggregation&amp;diff=237792"/>
				<updated>2018-02-16T15:15:15Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Indicative Diagram */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
This is an automated threat. To view all automated threats, please see the [[:Category:Automated Threat|Automated Threat Category]] page. The OWASP Automated Threat Handbook - Wed Applications ([https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf pdf], print), an output of the [[OWASP Automated Threats to Web Applications|OWASP Automated Threats to Web Applications Project]], provides a fuller guide to  each threat, detection methods and countermeasures. The [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] helps to correctly identify the automated threat.&lt;br /&gt;
&lt;br /&gt;
== Definition ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Automated Threat (OAT) Identity Number ===&lt;br /&gt;
&lt;br /&gt;
OAT-020&lt;br /&gt;
&lt;br /&gt;
===Threat Event Name===&lt;br /&gt;
&lt;br /&gt;
Account Aggregation&lt;br /&gt;
&lt;br /&gt;
=== Summary Defining Characteristics===&lt;br /&gt;
&lt;br /&gt;
Use by an intermediary application that collects together multiple accounts and interacts on their behalf.&lt;br /&gt;
&lt;br /&gt;
===Indicative Diagram===&lt;br /&gt;
&lt;br /&gt;
[[File:OAT-020_Account_Aggregation.png|500px|link=]]&lt;br /&gt;
&lt;br /&gt;
=== Description ===&lt;br /&gt;
&lt;br /&gt;
Compilation of credentials and information from multiple application accounts into another system. This aggregation application may be used by a single user to merge information from multiple applications, or alternatively to merge information of many users of a single application. Commonly used for aggregating social media accounts, email accounts and financial accounts in order to obtain a consolidated overview, to provide integrated reporting and analysis, and to simplify usage and consumption by the user and/or their professional advisors. May include making changes to account properties and interacting with the aggregated application's functionality.&lt;br /&gt;
&lt;br /&gt;
For other forms of data harvesting, including the distribution of content, see [[OAT-011 Scraping]]. For hastening progress, see [[OAT-006 Expediting]] instead.&lt;br /&gt;
&lt;br /&gt;
=== Other Names and Examples ===&lt;br /&gt;
&lt;br /&gt;
Aggregator; Brokering; Client aggregator; Cloud services brokerage; Data aggregation; Financial account aggregator; Intermediarisation; Intermediation&lt;br /&gt;
&lt;br /&gt;
=== See Also ===&lt;br /&gt;
&lt;br /&gt;
* [[OAT-006 Expediting]]&lt;br /&gt;
* [[OAT-011 Scraping]]&lt;br /&gt;
* [[OAT-019 Account Creation]]&lt;br /&gt;
&lt;br /&gt;
== Cross-References ==&lt;br /&gt;
&lt;br /&gt;
=== CAPEC Category / Attack Pattern IDs ===&lt;br /&gt;
&lt;br /&gt;
* 167 Lifting Sensitive Data from the Client&lt;br /&gt;
* 210 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== CWE Base / Class / Variant IDs ===&lt;br /&gt;
&lt;br /&gt;
* 799 Improper Control of Interaction Frequency&lt;br /&gt;
&lt;br /&gt;
=== WASC Threat IDs ===&lt;br /&gt;
&lt;br /&gt;
* 21 Insufficient Anti-Automation&lt;br /&gt;
* 42 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== OWASP Attack Category / Attack IDs ===&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Abuse of Functionality|Abuse of Functionality]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Automated Threat]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OAT-019_Account_Creation&amp;diff=237791</id>
		<title>OAT-019 Account Creation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OAT-019_Account_Creation&amp;diff=237791"/>
				<updated>2018-02-16T15:14:34Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Indicative Diagram */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
This is an automated threat. To view all automated threats, please see the [[:Category:Automated Threat|Automated Threat Category]] page. The OWASP Automated Threat Handbook - Wed Applications ([https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf pdf], print), an output of the [[OWASP Automated Threats to Web Applications|OWASP Automated Threats to Web Applications Project]], provides a fuller guide to  each threat, detection methods and countermeasures. The [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] helps to correctly identify the automated threat.&lt;br /&gt;
&lt;br /&gt;
== Definition ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Automated Threat (OAT) Identity Number ===&lt;br /&gt;
&lt;br /&gt;
OAT-019&lt;br /&gt;
&lt;br /&gt;
===Threat Event Name===&lt;br /&gt;
&lt;br /&gt;
Account Creation&lt;br /&gt;
&lt;br /&gt;
=== Summary Defining Characteristics===&lt;br /&gt;
&lt;br /&gt;
Create multiple accounts for subsequent misuse.&lt;br /&gt;
&lt;br /&gt;
===Indicative Diagram===&lt;br /&gt;
&lt;br /&gt;
[[File:OAT-019_Account_Creation.png|500px|link=]]&lt;br /&gt;
&lt;br /&gt;
=== Description ===&lt;br /&gt;
&lt;br /&gt;
Bulk account creation, and sometimes profile population, by using the application's account sign-up processes. The accounts are subsequently misused for generating content spam, laundering cash and goods, spreading malware, a ecting reputation, causing mischief, and skewing search engine optimisation (SEO), reviews and surveys.&lt;br /&gt;
&lt;br /&gt;
Account Creation generates new accounts - see [[OAT-007 Credential Cracking]] and [[OAT-008 Credential Stuffing]] for threat events that use existing accounts.&lt;br /&gt;
&lt;br /&gt;
=== Other Names and Examples ===&lt;br /&gt;
&lt;br /&gt;
Account pharming; Fake account; Fake social media account creation; Impersonator bot; Massive account registration; New account creation; Registering many user accounts&lt;br /&gt;
&lt;br /&gt;
=== See Also ===&lt;br /&gt;
&lt;br /&gt;
* [[OAT-007 Credential Cracking]]&lt;br /&gt;
* [[OAT-008 Credential Stuffing]]&lt;br /&gt;
&lt;br /&gt;
== Cross-References ==&lt;br /&gt;
&lt;br /&gt;
=== CAPEC Category / Attack Pattern IDs ===&lt;br /&gt;
&lt;br /&gt;
* 210 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== CWE Base / Class / Variant IDs ===&lt;br /&gt;
&lt;br /&gt;
* 799 Improper Control of Interaction Frequency&lt;br /&gt;
* 837 Improper Enforcement of a Single, Unique Action&lt;br /&gt;
* 841 Improper Enforcement of Behavioral Workflow&lt;br /&gt;
&lt;br /&gt;
=== WASC Threat IDs ===&lt;br /&gt;
&lt;br /&gt;
* 21 Insufficient Anti-Automation&lt;br /&gt;
* 42 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== OWASP Attack Category / Attack IDs ===&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Abuse of Functionality|Abuse of Functionality]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Automated Threat]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OAT-018_Footprinting&amp;diff=237790</id>
		<title>OAT-018 Footprinting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OAT-018_Footprinting&amp;diff=237790"/>
				<updated>2018-02-16T15:13:58Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Indicative Diagram */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
This is an automated threat. To view all automated threats, please see the [[:Category:Automated Threat|Automated Threat Category]] page. The OWASP Automated Threat Handbook - Wed Applications ([https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf pdf], print), an output of the [[OWASP Automated Threats to Web Applications|OWASP Automated Threats to Web Applications Project]], provides a fuller guide to  each threat, detection methods and countermeasures. The [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] helps to correctly identify the automated threat.&lt;br /&gt;
&lt;br /&gt;
== Definition ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Automated Threat (OAT) Identity Number ===&lt;br /&gt;
&lt;br /&gt;
OAT-018&lt;br /&gt;
&lt;br /&gt;
===Threat Event Name===&lt;br /&gt;
&lt;br /&gt;
Footprinting&lt;br /&gt;
&lt;br /&gt;
=== Summary Defining Characteristics===&lt;br /&gt;
&lt;br /&gt;
Probe and explore application to identify its constituents and properties.&lt;br /&gt;
&lt;br /&gt;
===Indicative Diagram===&lt;br /&gt;
&lt;br /&gt;
[[File:OAT-018_Footprinting.png|500px|link=]]&lt;br /&gt;
&lt;br /&gt;
=== Description ===&lt;br /&gt;
&lt;br /&gt;
Information gathering with the objective of learning as much as possible about the composition, configuration and security mechanisms of the application. Unlike Scraping, Footprinting is an enumeration of the application itself, rather than the data. It is used to identify all the URL paths, parameters and values, and process sequences (i.e. to determine entry points, also collectively called the attack surface). As the application is explored, additional paths will be identified which in turn need to be examined.&lt;br /&gt;
&lt;br /&gt;
Footprinting can also include brute force, dictionary and guessing of file and directory names. Fuzzing may also be used to identify further application resources and capabilities. However, it does not include attempts to exploit weaknesses.&lt;br /&gt;
&lt;br /&gt;
=== Other Names and Examples ===&lt;br /&gt;
&lt;br /&gt;
Application analysis; API discovery; Application enumeration; Automated scanning; CGI scanning; Crawler; Crawling; Excavation; Forced browsing; Forceful browsing; Fuzzing; Micro service discovery; Scanning; Spidering; WSDL scanning&lt;br /&gt;
&lt;br /&gt;
=== See Also ===&lt;br /&gt;
&lt;br /&gt;
* [[OAT-004 Fingerprinting]]&lt;br /&gt;
* [[OAT-011 Scraping]]&lt;br /&gt;
&lt;br /&gt;
== Cross-References ==&lt;br /&gt;
&lt;br /&gt;
=== CAPEC Category / Attack Pattern IDs ===&lt;br /&gt;
&lt;br /&gt;
* 169 Footprinting&lt;br /&gt;
&lt;br /&gt;
=== CWE Base / Class / Variant IDs ===&lt;br /&gt;
&lt;br /&gt;
* 200 Information Exposure&lt;br /&gt;
&lt;br /&gt;
=== WASC Threat IDs ===&lt;br /&gt;
&lt;br /&gt;
* 45 Fingerprinting&lt;br /&gt;
&lt;br /&gt;
=== OWASP Attack Category / Attack IDs ===&lt;br /&gt;
&lt;br /&gt;
* -&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Automated Threat]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OAT-017_Spamming&amp;diff=237789</id>
		<title>OAT-017 Spamming</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OAT-017_Spamming&amp;diff=237789"/>
				<updated>2018-02-16T15:13:28Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Indicative Diagram */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
This is an automated threat. To view all automated threats, please see the [[:Category:Automated Threat|Automated Threat Category]] page. The OWASP Automated Threat Handbook - Wed Applications ([https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf pdf], print), an output of the [[OWASP Automated Threats to Web Applications|OWASP Automated Threats to Web Applications Project]], provides a fuller guide to  each threat, detection methods and countermeasures. The [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] helps to correctly identify the automated threat.&lt;br /&gt;
&lt;br /&gt;
== Definition ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Automated Threat (OAT) Identity Number ===&lt;br /&gt;
&lt;br /&gt;
OAT-017&lt;br /&gt;
&lt;br /&gt;
===Threat Event Name===&lt;br /&gt;
&lt;br /&gt;
Spamming&lt;br /&gt;
&lt;br /&gt;
=== Summary Defining Characteristics===&lt;br /&gt;
&lt;br /&gt;
Malicious or questionable information addition that appears in public or private content, databases or user messages.&lt;br /&gt;
&lt;br /&gt;
===Indicative Diagram===&lt;br /&gt;
&lt;br /&gt;
[[File:OAT-017_Spamming.png|500px|link=]]&lt;br /&gt;
&lt;br /&gt;
=== Description ===&lt;br /&gt;
&lt;br /&gt;
Malicious content can include malware, IFRAME distribution, photographs &amp;amp; videos, advertisements, referrer spam and tracking/surveillance code. The content might be less overtly malicious but be an attempt to cause mischief, undertake search engine optimisation (SEO) or to dilute/hide other posts.&lt;br /&gt;
&lt;br /&gt;
The mass abuse of broken form-to-email and form-to-SMS functions to send messages to unintended recipients is not included in this threat event, or any other in this ontology, since those are considered to be the exploitation of implementation flaws alone.&lt;br /&gt;
&lt;br /&gt;
For multiple use that distorts metrics, see [[OAT-016 Skewing]] instead.&lt;br /&gt;
&lt;br /&gt;
=== Other Names and Examples ===&lt;br /&gt;
&lt;br /&gt;
Blog spam; Bulletin board spam; Click-bait; Comment spam; Content spam; Content spoofing; Fake news; Form spam; Forum spam; Guestbook spam; Referrer spam; Review spam; SEO spam; Spam crawlers; Spam 2.0; Spambot; Twitter spam; Wiki spam&lt;br /&gt;
&lt;br /&gt;
=== See Also ===&lt;br /&gt;
&lt;br /&gt;
* [[OAT-015 Denial of Service]]&lt;br /&gt;
* [[OAT-016 Skewing]]&lt;br /&gt;
* [[OAT-019 Account Creation]]&lt;br /&gt;
&lt;br /&gt;
== Cross-References ==&lt;br /&gt;
&lt;br /&gt;
=== CAPEC Category / Attack Pattern IDs ===&lt;br /&gt;
&lt;br /&gt;
* 210 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== CWE Base / Class / Variant IDs ===&lt;br /&gt;
&lt;br /&gt;
* 506 Embedded Malicious Code&lt;br /&gt;
* 799 Improper Control of Interaction Frequency&lt;br /&gt;
* 837 Improper Enforcement of a Single, Unique Action&lt;br /&gt;
&lt;br /&gt;
=== WASC Threat IDs ===&lt;br /&gt;
&lt;br /&gt;
* 21 Insufficient Anti-Automation&lt;br /&gt;
* 42 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== OWASP Attack Category / Attack IDs ===&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Abuse of Functionality|Abuse of Functionality]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Automated Threat]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OAT-016_Skewing&amp;diff=237788</id>
		<title>OAT-016 Skewing</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OAT-016_Skewing&amp;diff=237788"/>
				<updated>2018-02-16T15:12:56Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
This is an automated threat. To view all automated threats, please see the [[:Category:Automated Threat|Automated Threat Category]] page. The OWASP Automated Threat Handbook - Wed Applications ([https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf pdf], print), an output of the [[OWASP Automated Threats to Web Applications|OWASP Automated Threats to Web Applications Project]], provides a fuller guide to  each threat, detection methods and countermeasures. The [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] helps to correctly identify the automated threat.&lt;br /&gt;
&lt;br /&gt;
== Definition ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Automated Threat (OAT) Identity Number ===&lt;br /&gt;
&lt;br /&gt;
OAT-016&lt;br /&gt;
&lt;br /&gt;
===Threat Event Name===&lt;br /&gt;
&lt;br /&gt;
Skewing&lt;br /&gt;
&lt;br /&gt;
=== Summary Defining Characteristics===&lt;br /&gt;
&lt;br /&gt;
Repeated link clicks, page requests or form submissions intended to alter some metric.&lt;br /&gt;
&lt;br /&gt;
===Indicative Diagram===&lt;br /&gt;
&lt;br /&gt;
[[File:OAT-016_Skewing.png|500px|link=]]&lt;br /&gt;
&lt;br /&gt;
=== Description ===&lt;br /&gt;
&lt;br /&gt;
Automated repeated clicking or requesting or submitting content, a ecting application-based metrics such as counts and measures of frequency and/or rate. The metric or measurement may be visible to users (e.g. betting odds, likes, market/ dynamic pricing, visitor count, poll results, reviews) or hidden (e.g. application usage statistics, business performance indicators). Metrics may affect individuals as well as the application owner, e.g. user reputation, influence others, gain fame, or undermine someone else's reputation.&lt;br /&gt;
&lt;br /&gt;
For malicious alteration of digital advertisement metrics, see [[OAT-003 Ad Fraud]] instead.&lt;br /&gt;
&lt;br /&gt;
=== Other Names and Examples ===&lt;br /&gt;
&lt;br /&gt;
Biasing KPIs; Boosting friends, visitors, and likes; Click fraud; Dynamic pricing hacking; Election fraud; Hit count fraud; Market distortion; Metric and statistic skewing; Page impression fraud; Poll fraud; Poll skewing; Poll/voting subversion; Rating/review skewing; SEO; Stock manipulation; Survey skewing&lt;br /&gt;
&lt;br /&gt;
=== See Also ===&lt;br /&gt;
&lt;br /&gt;
* [[OAT-003 Ad Fraud]]&lt;br /&gt;
* [[OAT-017 Spamming]]&lt;br /&gt;
* [[OAT-019 Account Creation]]&lt;br /&gt;
&lt;br /&gt;
== Cross-References ==&lt;br /&gt;
&lt;br /&gt;
=== CAPEC Category / Attack Pattern IDs ===&lt;br /&gt;
&lt;br /&gt;
* 210 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== CWE Base / Class / Variant IDs ===&lt;br /&gt;
&lt;br /&gt;
* 799 Improper Control of Interaction Frequency&lt;br /&gt;
* 837 Improper Enforcement of a Single, Unique Action&lt;br /&gt;
&lt;br /&gt;
=== WASC Threat IDs ===&lt;br /&gt;
&lt;br /&gt;
* 21 Insufficient Anti-Automation&lt;br /&gt;
* 42 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== OWASP Attack Category / Attack IDs ===&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Abuse of Functionality|Abuse of Functionality]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Automated Threat]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OAT-015_Denial_of_Service&amp;diff=237787</id>
		<title>OAT-015 Denial of Service</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OAT-015_Denial_of_Service&amp;diff=237787"/>
				<updated>2018-02-16T15:12:05Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Indicative Diagram */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
This is an automated threat. To view all automated threats, please see the [[:Category:Automated Threat|Automated Threat Category]] page. The OWASP Automated Threat Handbook - Wed Applications ([https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf pdf], print), an output of the [[OWASP Automated Threats to Web Applications|OWASP Automated Threats to Web Applications Project]], provides a fuller guide to  each threat, detection methods and countermeasures. The [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] helps to correctly identify the automated threat.&lt;br /&gt;
&lt;br /&gt;
== Definition ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Automated Threat (OAT) Identity Number ===&lt;br /&gt;
&lt;br /&gt;
OAT-015&lt;br /&gt;
&lt;br /&gt;
===Threat Event Name===&lt;br /&gt;
&lt;br /&gt;
Denial of Service&lt;br /&gt;
&lt;br /&gt;
=== Summary Defining Characteristics===&lt;br /&gt;
&lt;br /&gt;
Target resources of the application and database servers, or individual user accounts, to achieve denial of service (DoS).&lt;br /&gt;
&lt;br /&gt;
===Indicative Diagram===&lt;br /&gt;
&lt;br /&gt;
[[File:OAT-015_Denial_of_Service.png|500px|link=]]&lt;br /&gt;
&lt;br /&gt;
=== Description ===&lt;br /&gt;
&lt;br /&gt;
Usage may resemble legitimate application usage, but leads to exhaustion of resources such as file system, memory, processes, threads, CPU, and human or financial resources. The resources might be related to web, application or databases servers or other services supporting the application, such as third party APIs, included third-party hosted content, or content delivery networks (CDNs). The application may be affected as a whole, or the attack may be against individual users such as account lockout.&lt;br /&gt;
&lt;br /&gt;
This ontology’s scope excludes other forms of denial of service that a ect web applications, namely HTTP Flood DoS (GET, POST, Header with/without TLS), HTTP Slow DoS, IP layer 3 DoS, and TCP layer 4 DoS. Those protocol and lower layer aspects are covered adequately in other taxonomies and lists.&lt;br /&gt;
&lt;br /&gt;
=== Other Names and Examples ===&lt;br /&gt;
&lt;br /&gt;
Account lockout; App layer DDoS; Asymmetric resource consumption (amplification); Business logic DDoS; Cash overflow; Forced deadlock; Hash DoS; Inefficient code; Indexer DoS; Large files DoS; Resource depletion, locking or exhaustion; Sustained client engagement&lt;br /&gt;
&lt;br /&gt;
=== See Also ===&lt;br /&gt;
&lt;br /&gt;
* [[OAT-005 Scalping]]&lt;br /&gt;
* [[OAT-013 Sniping]]&lt;br /&gt;
* [[OAT-017 Spamming]]&lt;br /&gt;
* [[OAT-019 Account Creation]]&lt;br /&gt;
* [[OAT-021 Denial of Inventory]]&lt;br /&gt;
&lt;br /&gt;
== Cross-References ==&lt;br /&gt;
&lt;br /&gt;
=== CAPEC Category / Attack Pattern IDs ===&lt;br /&gt;
&lt;br /&gt;
* 2 Inducing Account Lockout&lt;br /&gt;
* 25 Forced Deadlock&lt;br /&gt;
* 119 Deplete Resources&lt;br /&gt;
&lt;br /&gt;
=== CWE Base / Class / Variant IDs ===&lt;br /&gt;
&lt;br /&gt;
* 399 Resource Management Errors&lt;br /&gt;
* 645 Overly Restrictive Account Lockout Mechanism&lt;br /&gt;
&lt;br /&gt;
=== WASC Threat IDs ===&lt;br /&gt;
&lt;br /&gt;
* 10 Denial of Service&lt;br /&gt;
&lt;br /&gt;
=== OWASP Attack Category / Attack IDs ===&lt;br /&gt;
&lt;br /&gt;
* Account Lockout Attack&lt;br /&gt;
* [[Cash Overflow]]&lt;br /&gt;
* [[Denial of Service]]&lt;br /&gt;
* [[:Category:Resource Depletion|Resource Depletion]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Automated Threat]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OAT-014_Vulnerability_Scanning&amp;diff=237786</id>
		<title>OAT-014 Vulnerability Scanning</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OAT-014_Vulnerability_Scanning&amp;diff=237786"/>
				<updated>2018-02-16T15:11:30Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Indicative Diagram */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
This is an automated threat. To view all automated threats, please see the [[:Category:Automated Threat|Automated Threat Category]] page. The OWASP Automated Threat Handbook - Wed Applications ([https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf pdf], print), an output of the [[OWASP Automated Threats to Web Applications|OWASP Automated Threats to Web Applications Project]], provides a fuller guide to  each threat, detection methods and countermeasures. The [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] helps to correctly identify the automated threat.&lt;br /&gt;
&lt;br /&gt;
== Definition ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Automated Threat (OAT) Identity Number ===&lt;br /&gt;
&lt;br /&gt;
OAT-014&lt;br /&gt;
&lt;br /&gt;
===Threat Event Name===&lt;br /&gt;
&lt;br /&gt;
Vulnerability Scanning&lt;br /&gt;
&lt;br /&gt;
=== Summary Defining Characteristics===&lt;br /&gt;
&lt;br /&gt;
Crawl and fuzz application to identify weaknesses and possible vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===Indicative Diagram===&lt;br /&gt;
&lt;br /&gt;
[[File:OAT-014_Vulnerability_Scanning.png|500px|link=]]&lt;br /&gt;
&lt;br /&gt;
=== Description ===&lt;br /&gt;
&lt;br /&gt;
Systematic enumeration and examination of identifiable, guessable and unknown content locations, paths, file names, parameters, in order to find weaknesses and points where a security vulnerability might exist. Vulnerability Scanning includes both malicious scanning and friendly scanning by an authorised vulnerability scanning engine. It differs from [[OAT-011 Scraping]] in that its aim is to identify potential vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The exploitation of individual vulnerabilities is not included in the scope of this ontology, but this process of scanning, along with [[OAT-018 Footprinting]], [[OAT-004 Fingerprinting]] and [[OAT-011 Scraping]] often form part of application penetration testing.&lt;br /&gt;
&lt;br /&gt;
=== Other Names and Examples ===&lt;br /&gt;
&lt;br /&gt;
Active/Passive scanning; Application-specific vulnerability discovery; Identifying vulnerable content management systems (CMS) and CMS components; Known vulnerability scanning; Malicious crawling; Vulnerability reconnaissance&lt;br /&gt;
&lt;br /&gt;
=== See Also ===&lt;br /&gt;
&lt;br /&gt;
* [[OAT-004 Fingerprinting]]&lt;br /&gt;
* [[OAT-011 Scraping]]&lt;br /&gt;
* [[OAT-018 Footprinting]]&lt;br /&gt;
&lt;br /&gt;
== Cross-References ==&lt;br /&gt;
&lt;br /&gt;
=== CAPEC Category / Attack Pattern IDs ===&lt;br /&gt;
&lt;br /&gt;
* -&lt;br /&gt;
&lt;br /&gt;
=== CWE Base / Class / Variant IDs ===&lt;br /&gt;
&lt;br /&gt;
* 799 Improper Control of Interaction Frequency&lt;br /&gt;
&lt;br /&gt;
=== WASC Threat IDs ===&lt;br /&gt;
&lt;br /&gt;
* 21 Insufficient Anti-Automation&lt;br /&gt;
&lt;br /&gt;
=== OWASP Attack Category / Attack IDs ===&lt;br /&gt;
&lt;br /&gt;
* -&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Automated Threat]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OAT-013_Sniping&amp;diff=237785</id>
		<title>OAT-013 Sniping</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OAT-013_Sniping&amp;diff=237785"/>
				<updated>2018-02-16T15:10:54Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Indicative Diagram */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
This is an automated threat. To view all automated threats, please see the [[:Category:Automated Threat|Automated Threat Category]] page. The OWASP Automated Threat Handbook - Wed Applications ([https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf pdf], print), an output of the [[OWASP Automated Threats to Web Applications|OWASP Automated Threats to Web Applications Project]], provides a fuller guide to  each threat, detection methods and countermeasures. The [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] helps to correctly identify the automated threat.&lt;br /&gt;
&lt;br /&gt;
== Definition ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Automated Threat (OAT) Identity Number ===&lt;br /&gt;
&lt;br /&gt;
OAT-013&lt;br /&gt;
&lt;br /&gt;
===Threat Event Name===&lt;br /&gt;
&lt;br /&gt;
Sniping&lt;br /&gt;
&lt;br /&gt;
=== Summary Defining Characteristics===&lt;br /&gt;
&lt;br /&gt;
Last minute bid or offer for goods or services.&lt;br /&gt;
&lt;br /&gt;
===Indicative Diagram===&lt;br /&gt;
&lt;br /&gt;
[[File:OAT-013_Sniping.png|500px|link=]]&lt;br /&gt;
&lt;br /&gt;
=== Description ===&lt;br /&gt;
&lt;br /&gt;
The defining characteristic of Sniping is an action undertaken at the latest opportunity to achieve a particular objective, leaving insufficient time for another user to bid/offer. Sniping can also be the automated exploitation of system latencies in the form of timing attacks. Careful timing and prompt action are necessary parts. It is most well known as auction sniping, but the same threat event can be used in other types of applications. Sniping normally leads to some disbenefit for other users, and sometimes that might be considered a form of denial of service.&lt;br /&gt;
&lt;br /&gt;
In contrast, [[OAT-005 Scalping]] is the acquisition of limited availability of sought-a er goods or services, and [[OAT-006 Expediting]] is the general hastening of progress.&lt;br /&gt;
&lt;br /&gt;
=== Other Names and Examples ===&lt;br /&gt;
&lt;br /&gt;
Auction sniping; Bid sniper; Front- running; Last look; Last minute bet; Timing attack&lt;br /&gt;
&lt;br /&gt;
=== See Also ===&lt;br /&gt;
&lt;br /&gt;
* [[OAT-005 Scalping]]&lt;br /&gt;
* [[OAT-006 Expediting]]&lt;br /&gt;
* [[OAT-015 Denial of Service]]&lt;br /&gt;
* [[OAT-021 Denial of Inventory]]&lt;br /&gt;
&lt;br /&gt;
== Cross-References ==&lt;br /&gt;
&lt;br /&gt;
=== CAPEC Category / Attack Pattern IDs ===&lt;br /&gt;
&lt;br /&gt;
* 210 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== CWE Base / Class / Variant IDs ===&lt;br /&gt;
&lt;br /&gt;
* -&lt;br /&gt;
&lt;br /&gt;
=== WASC Threat IDs ===&lt;br /&gt;
&lt;br /&gt;
* 21 Insu icient Anti-Automation&lt;br /&gt;
* 42 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== OWASP Attack Category / Attack IDs ===&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Abuse of Functionality|Abuse of Functionality]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Automated Threat]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OAT-012_Cashing_Out&amp;diff=237784</id>
		<title>OAT-012 Cashing Out</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OAT-012_Cashing_Out&amp;diff=237784"/>
				<updated>2018-02-16T15:10:11Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Indicative Diagram */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
This is an automated threat. To view all automated threats, please see the [[:Category:Automated Threat|Automated Threat Category]] page. The OWASP Automated Threat Handbook - Wed Applications ([https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf pdf], print), an output of the [[OWASP Automated Threats to Web Applications|OWASP Automated Threats to Web Applications Project]], provides a fuller guide to  each threat, detection methods and countermeasures. The [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] helps to correctly identify the automated threat.&lt;br /&gt;
&lt;br /&gt;
== Definition ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Automated Threat (OAT) Identity Number ===&lt;br /&gt;
&lt;br /&gt;
OAT-012&lt;br /&gt;
&lt;br /&gt;
===Threat Event Name===&lt;br /&gt;
&lt;br /&gt;
Cashing Out&lt;br /&gt;
&lt;br /&gt;
=== Summary Defining Characteristics===&lt;br /&gt;
&lt;br /&gt;
Buy goods or obtain cash utilising validated stolen payment card or other user account data.&lt;br /&gt;
&lt;br /&gt;
===Indicative Diagram===&lt;br /&gt;
&lt;br /&gt;
[[File:OAT-012_Cashing_Out.png|500px|link=]]&lt;br /&gt;
&lt;br /&gt;
=== Description ===&lt;br /&gt;
&lt;br /&gt;
Obtaining currency or higher-value merchandise via the application using stolen, previously validated payment cards or other account login credentials. Cashing Out sometimes may be undertaken in conjunction with product return fraud. For financial transactions, this is usually a transfer of funds to a mule’s account. For payment cards, this activity may occur following [[OAT-001 Carding]] of bulk stolen data, or [[OAT-010 Card Cracking]], and the goods are dropped at a reshipper's address. The refunding of payments via non-financial applications (e.g. tax refunds, claims payment) is also included in Cashing Out.&lt;br /&gt;
&lt;br /&gt;
Obtaining other information of value from the application is instead [[OAT-011 Scraping]].&lt;br /&gt;
&lt;br /&gt;
=== Other Names and Examples ===&lt;br /&gt;
&lt;br /&gt;
Deetsing; Money laundering; Online credit card fraud; Online payment card fraud; Refund fraud; Stolen identity refund fraud (SIRF)&lt;br /&gt;
&lt;br /&gt;
=== See Also ===&lt;br /&gt;
&lt;br /&gt;
* [[OAT-001 Carding]]&lt;br /&gt;
* [[OAT-011 Scraping]]&lt;br /&gt;
* [[OAT-010 Card Cracking]]&lt;br /&gt;
&lt;br /&gt;
== Cross-References ==&lt;br /&gt;
&lt;br /&gt;
=== CAPEC Category / Attack Pattern IDs ===&lt;br /&gt;
&lt;br /&gt;
* 210 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== CWE Base / Class / Variant IDs ===&lt;br /&gt;
&lt;br /&gt;
* 799 Improper Control of Interaction Frequency&lt;br /&gt;
* 837 Improper Enforcement of a Single, Unique Action&lt;br /&gt;
&lt;br /&gt;
=== WASC Threat IDs ===&lt;br /&gt;
&lt;br /&gt;
* 21 Insufficient Anti-Automation&lt;br /&gt;
* 42 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== OWASP Attack Category / Attack IDs ===&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Abuse of Functionality|Abuse of Functionality]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Automated Threat]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OAT-011_Scraping&amp;diff=237783</id>
		<title>OAT-011 Scraping</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OAT-011_Scraping&amp;diff=237783"/>
				<updated>2018-02-16T15:09:26Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Indicative Diagram */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
This is an automated threat. To view all automated threats, please see the [[:Category:Automated Threat|Automated Threat Category]] page. The OWASP Automated Threat Handbook - Wed Applications ([https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf pdf], print), an output of the [[OWASP Automated Threats to Web Applications|OWASP Automated Threats to Web Applications Project]], provides a fuller guide to  each threat, detection methods and countermeasures. The [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] helps to correctly identify the automated threat.&lt;br /&gt;
&lt;br /&gt;
== Definition ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Automated Threat (OAT) Identity Number ===&lt;br /&gt;
&lt;br /&gt;
OAT-011&lt;br /&gt;
&lt;br /&gt;
===Threat Event Name===&lt;br /&gt;
&lt;br /&gt;
Scraping&lt;br /&gt;
&lt;br /&gt;
=== Summary Defining Characteristics===&lt;br /&gt;
&lt;br /&gt;
Collect application content and/or other data for use elsewhere.&lt;br /&gt;
&lt;br /&gt;
===Indicative Diagram===&lt;br /&gt;
&lt;br /&gt;
[[File:OAT-011_Scraping.png|500px|link=]]&lt;br /&gt;
&lt;br /&gt;
=== Description ===&lt;br /&gt;
&lt;br /&gt;
Collecting accessible data and/or processed output from the application. Some scraping may use fake or compromised accounts, or the information may be accessible without authentication. The scraper may attempt to read all accessible paths and parameter values for web pages and APIs, collecting the responses and extracting data from them. Scraping may occur in real time, or be more periodic in nature. Some Scraping may be used to gain insight into how it is constructed and operates - perhaps for cryptanalysis, reverse engineering, or session analysis.&lt;br /&gt;
&lt;br /&gt;
When another application is being used as an intermediary between the user(s) and the real application, see [[OAT-020 Account Aggregation]]. If the intent is to obtain cash or goods, see [[OAT-012 Cashing Out]] instead.&lt;br /&gt;
&lt;br /&gt;
=== Other Names and Examples ===&lt;br /&gt;
&lt;br /&gt;
API provisioning; Bargain hunting; Comparative shopping; Content scraping; Data aggregation; Database scraping; Farming; Harvesting; Meta search scraper; Mining; Mirroring; Pagejacking; Powering APIs; Ripping; Scraper bot; Screen scraping; Search / social media bot&lt;br /&gt;
&lt;br /&gt;
=== See Also ===&lt;br /&gt;
&lt;br /&gt;
* [[OAT-012 Cashing Out]]&lt;br /&gt;
* [[OAT-018 Footprinting]]&lt;br /&gt;
* [[OAT-020 Account Aggregation]]&lt;br /&gt;
&lt;br /&gt;
== Cross-References ==&lt;br /&gt;
&lt;br /&gt;
=== CAPEC Category / Attack Pattern IDs ===&lt;br /&gt;
&lt;br /&gt;
* 167 Lifting Sensitive Data from the Client&lt;br /&gt;
* 210 Abuse of Functionality&lt;br /&gt;
* 281 Analyze Target&lt;br /&gt;
&lt;br /&gt;
=== CWE Base / Class / Variant IDs ===&lt;br /&gt;
&lt;br /&gt;
* 799 Improper Control of Interaction Frequency&lt;br /&gt;
&lt;br /&gt;
=== WASC Threat IDs ===&lt;br /&gt;
&lt;br /&gt;
* 21 Insufficient Anti-Automation&lt;br /&gt;
* 42 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== OWASP Attack Category / Attack IDs ===&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Abuse of Functionality|Abuse of Functionality]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Automated Threat]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OAT-010_Card_Cracking&amp;diff=237782</id>
		<title>OAT-010 Card Cracking</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OAT-010_Card_Cracking&amp;diff=237782"/>
				<updated>2018-02-16T15:08:49Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Indicative Diagram */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
This is an automated threat. To view all automated threats, please see the [[:Category:Automated Threat|Automated Threat Category]] page. The OWASP Automated Threat Handbook - Wed Applications ([https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf pdf], print), an output of the [[OWASP Automated Threats to Web Applications|OWASP Automated Threats to Web Applications Project]], provides a fuller guide to  each threat, detection methods and countermeasures. The [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] helps to correctly identify the automated threat.&lt;br /&gt;
&lt;br /&gt;
== Definition ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Automated Threat (OAT) Identity Number ===&lt;br /&gt;
&lt;br /&gt;
OAT-010&lt;br /&gt;
&lt;br /&gt;
===Threat Event Name===&lt;br /&gt;
&lt;br /&gt;
Card Cracking&lt;br /&gt;
&lt;br /&gt;
=== Summary Defining Characteristics===&lt;br /&gt;
&lt;br /&gt;
Identify missing start/expiry dates and security codes for stolen payment card data by trying different values.&lt;br /&gt;
&lt;br /&gt;
===Indicative Diagram===&lt;br /&gt;
&lt;br /&gt;
[[File:OAT-010_Card_Cracking.png|500px|link=]]&lt;br /&gt;
&lt;br /&gt;
=== Description ===&lt;br /&gt;
&lt;br /&gt;
Brute force attack against application payment card processes to identify the missing values for start date, expiry date and/or card security code (CSC), also referred to in many ways, including card validation number 2 (CVN2), card validation code (CVC), card verification value (CV2) and card identification number (CID).&lt;br /&gt;
&lt;br /&gt;
When these values are known as well as the Primary Account Number (PAN), [[OAT-001 Carding]] is used to validate the details, and [[OAT-012 Cashing Out]] to obtain goods or cash.&lt;br /&gt;
&lt;br /&gt;
=== Other Names and Examples ===&lt;br /&gt;
&lt;br /&gt;
Brute forcing credit card information; Card brute forcing; Credit card cracking; Distributed guessing attack&lt;br /&gt;
&lt;br /&gt;
=== See Also ===&lt;br /&gt;
&lt;br /&gt;
* [[OAT-001 Carding]]&lt;br /&gt;
* [[OAT-012 Cashing Out]]&lt;br /&gt;
&lt;br /&gt;
== Cross-References ==&lt;br /&gt;
&lt;br /&gt;
=== CAPEC Category / Attack Pattern IDs ===&lt;br /&gt;
&lt;br /&gt;
* 112 Brute Force&lt;br /&gt;
* 210 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== CWE Base / Class / Variant IDs ===&lt;br /&gt;
&lt;br /&gt;
* 799 Improper Control of Interaction Frequency&lt;br /&gt;
* 837 Improper Enforcement of a Single, Unique Action&lt;br /&gt;
&lt;br /&gt;
=== WASC Threat IDs ===&lt;br /&gt;
&lt;br /&gt;
* 11 Brute Force&lt;br /&gt;
* 21 Insufficient Anti-Automation&lt;br /&gt;
* 42 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== OWASP Attack Category / Attack IDs ===&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Abuse of Functionality|Abuse of Functionality]]&lt;br /&gt;
* [[Brute force attack|Brute Force Attack]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Automated Threat]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OAT-009_CAPTCHA_Defeat&amp;diff=237781</id>
		<title>OAT-009 CAPTCHA Defeat</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OAT-009_CAPTCHA_Defeat&amp;diff=237781"/>
				<updated>2018-02-16T15:08:06Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Indicative Diagram */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
This is an automated threat. To view all automated threats, please see the [[:Category:Automated Threat|Automated Threat Category]] page. The OWASP Automated Threat Handbook - Wed Applications ([https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf pdf], print), an output of the [[OWASP Automated Threats to Web Applications|OWASP Automated Threats to Web Applications Project]], provides a fuller guide to  each threat, detection methods and countermeasures. The [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] helps to correctly identify the automated threat.&lt;br /&gt;
&lt;br /&gt;
== Definition ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Automated Threat (OAT) Identity Number ===&lt;br /&gt;
&lt;br /&gt;
OAT-009&lt;br /&gt;
&lt;br /&gt;
===Threat Event Name===&lt;br /&gt;
&lt;br /&gt;
CAPTCHA Defeat&lt;br /&gt;
&lt;br /&gt;
=== Summary Defining Characteristics===&lt;br /&gt;
&lt;br /&gt;
Solve anti-automation tests.&lt;br /&gt;
&lt;br /&gt;
===Indicative Diagram===&lt;br /&gt;
&lt;br /&gt;
[[File:OAT-009_CAPTCHA_Defeat.png|500px|link=]]&lt;br /&gt;
&lt;br /&gt;
=== Description ===&lt;br /&gt;
&lt;br /&gt;
Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) challenges are used to distinguish normal users from bots. Automation is used in an attempt to analyse and determine the answer to visual and/or aural CAPTCHA tests and related puzzles. Apart from conventional visual and aural CAPTCHA, puzzle solving mini games or arithmetical exercises are sometimes used. Some of these may include context-specific challenges.&lt;br /&gt;
&lt;br /&gt;
The process that determines the answer may utilise tools to perform optical character recognition, or matching against a prepared database of pre-generated images, or using other machine reading, or human farms.&lt;br /&gt;
&lt;br /&gt;
=== Other Names and Examples ===&lt;br /&gt;
&lt;br /&gt;
Breaking CAPTCHA; CAPTCHA breaker; CAPTCHA breaking; CAPTCHA bypass; CAPTCHA decoding; CAPTCHA solver; CAPTCHA solving; Puzzle solving&lt;br /&gt;
&lt;br /&gt;
=== See Also ===&lt;br /&gt;
&lt;br /&gt;
* [[OAT-006 Expediting]]&lt;br /&gt;
* [[OAT-011 Scraping]]&lt;br /&gt;
&lt;br /&gt;
== Cross-References ==&lt;br /&gt;
&lt;br /&gt;
=== CAPEC Category / Attack Pattern IDs ===&lt;br /&gt;
&lt;br /&gt;
* -&lt;br /&gt;
&lt;br /&gt;
=== CWE Base / Class / Variant IDs ===&lt;br /&gt;
&lt;br /&gt;
* 804 Guessable CAPTCHA&lt;br /&gt;
* 841 Improper Enforcement of Behavioral Workflow&lt;br /&gt;
&lt;br /&gt;
=== WASC Threat IDs ===&lt;br /&gt;
&lt;br /&gt;
* 21 Insufficient Anti-Automation&lt;br /&gt;
* 42 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== OWASP Attack Category / Attack IDs ===&lt;br /&gt;
&lt;br /&gt;
* -&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Automated Threat]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OAT-008_Credential_Stuffing&amp;diff=237780</id>
		<title>OAT-008 Credential Stuffing</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OAT-008_Credential_Stuffing&amp;diff=237780"/>
				<updated>2018-02-16T15:07:21Z</updated>
		
		<summary type="html">&lt;p&gt;Clerkendweller: /* Indicative Diagram */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
This is an automated threat. To view all automated threats, please see the [[:Category:Automated Threat|Automated Threat Category]] page. The OWASP Automated Threat Handbook - Wed Applications ([https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf pdf], print), an output of the [[OWASP Automated Threats to Web Applications|OWASP Automated Threats to Web Applications Project]], provides a fuller guide to  each threat, detection methods and countermeasures. The [https://www.owasp.org/index.php/File:Oat-ontology-decision-chart.pdf threat identification chart] helps to correctly identify the automated threat.&lt;br /&gt;
&lt;br /&gt;
== Definition ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Automated Threat (OAT) Identity Number ===&lt;br /&gt;
&lt;br /&gt;
OAT-008&lt;br /&gt;
&lt;br /&gt;
===Threat Event Name===&lt;br /&gt;
&lt;br /&gt;
Credential Stuffing&lt;br /&gt;
&lt;br /&gt;
=== Summary Defining Characteristics===&lt;br /&gt;
&lt;br /&gt;
Mass log in attempts used to verify the validity of stolen username/password pairs.&lt;br /&gt;
&lt;br /&gt;
===Indicative Diagram===&lt;br /&gt;
&lt;br /&gt;
[[File:OAT-008_Credential_Stuffing.png|500px|link=]]&lt;br /&gt;
&lt;br /&gt;
=== Description ===&lt;br /&gt;
&lt;br /&gt;
Lists of authentication credentials stolen from elsewhere are tested against the application’s authentication mechanisms to identify whether users have re-used the same login credentials. The stolen usernames (often email addresses) and password pairs could have been sourced directly from another application by the attacker, purchased in a criminal marketplace, or obtained from publicly available breach data dumps.&lt;br /&gt;
&lt;br /&gt;
Unlike [[OAT-007 Credential Cracking]], Credential Stuffing does not involve any brute-forcing or guessing of values; instead credentials used in other applications are being tested for validity.&lt;br /&gt;
&lt;br /&gt;
=== Other Names and Examples ===&lt;br /&gt;
&lt;br /&gt;
Account checker attack; Account checking; Account takeover; Account takeover attack; Login Stuffing; Password list attack; Password re-use; Stolen credentials; Use of stolen credentials&lt;br /&gt;
&lt;br /&gt;
=== See Also ===&lt;br /&gt;
&lt;br /&gt;
* [[OAT-007 Credential Cracking]]&lt;br /&gt;
* [[OAT-019 Account Creation]]&lt;br /&gt;
&lt;br /&gt;
== Cross-References ==&lt;br /&gt;
&lt;br /&gt;
=== CAPEC Category / Attack Pattern IDs ===&lt;br /&gt;
&lt;br /&gt;
* 210 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== CWE Base / Class / Variant IDs ===&lt;br /&gt;
&lt;br /&gt;
* 799 Improper Control of Interaction Frequency&lt;br /&gt;
* 837 Improper Enforcement of a Single, Unique Action&lt;br /&gt;
&lt;br /&gt;
=== WASC Threat IDs ===&lt;br /&gt;
&lt;br /&gt;
* 21 Insufficient Anti-Automation&lt;br /&gt;
* 42 Abuse of Functionality&lt;br /&gt;
&lt;br /&gt;
=== OWASP Attack Category / Attack IDs ===&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Abuse of Functionality|Abuse of Functionality]]&lt;br /&gt;
* [[Credential stuffing|Credential Stuffing]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category: Automated Threat]]&lt;/div&gt;</summary>
		<author><name>Clerkendweller</name></author>	</entry>

	</feed>