<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cmartorella</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cmartorella"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Cmartorella"/>
		<updated>2026-04-18T10:22:57Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session052&amp;diff=104580</id>
		<title>Summit 2011 Working Sessions/Session052</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session052&amp;diff=104580"/>
				<updated>2011-02-09T12:20:33Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = Nishi Kumar&lt;br /&gt;
| summit_session_attendee_email1 = nishi.kumar@owasp.org&lt;br /&gt;
| summit_session_attendee_username1 = &lt;br /&gt;
| summit_session_attendee_company1= FIS&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = Cecil Su&lt;br /&gt;
| summit_session_attendee_email2 = cecil.su@owasp.org&lt;br /&gt;
| summit_session_attendee_username2 = &lt;br /&gt;
| summit_session_attendee_company2= GT&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = Lucas C. Ferreira&lt;br /&gt;
| summit_session_attendee_email3 = lucas.ferreira@owasp.org&lt;br /&gt;
| summit_session_attendee_username3 = &lt;br /&gt;
| summit_session_attendee_company3=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = Keith Turpin&lt;br /&gt;
| summit_session_attendee_email4 = keith.turpin@owasp.org&lt;br /&gt;
| summit_session_attendee_username4 = Keith_Turpin&lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = Achim Hoffmann&lt;br /&gt;
| summit_session_attendee_email5 = achim@owasp.org&lt;br /&gt;
| summit_session_attendee_username5 = Achim&lt;br /&gt;
| summit_session_attendee_company5= sic[!]sec&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = Tom Neaves&lt;br /&gt;
| summit_session_attendee_email6 = tom.neaves@verizonbusiness.com&lt;br /&gt;
| summit_session_attendee_username6 = &lt;br /&gt;
| summit_session_attendee_company6 = Verizon Business&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = Vishal Garg&lt;br /&gt;
| summit_session_attendee_email7 = vishalgrg@gmail.com&lt;br /&gt;
| summit_session_attendee_username7 = &lt;br /&gt;
| summit_session_attendee_company7= AppSecure Labs&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = Giorgio Fedon&lt;br /&gt;
| summit_session_attendee_email8 = giorgio.fedon@mindedsecurity.com&lt;br /&gt;
| summit_session_attendee_username8 = &lt;br /&gt;
| summit_session_attendee_company8= Minded Security&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = Stefano Di Paola&lt;br /&gt;
| summit_session_attendee_email9 = stefano@owasp.org&lt;br /&gt;
| summit_session_attendee_username9 = &lt;br /&gt;
| summit_session_attendee_company9= Minded Security&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = Pavol Luptak&lt;br /&gt;
| summit_session_attendee_email10 = pavol.luptak@nethemba.com&lt;br /&gt;
| summit_session_attendee_username10 = &lt;br /&gt;
| summit_session_attendee_company10= Nethemba&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = Andre Gironda&lt;br /&gt;
| summit_session_attendee_email11 = andregATthegmail&lt;br /&gt;
| summit_session_attendee_username11 = Dre&lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11= Will be available remotely&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = Edward Bonver&lt;br /&gt;
| summit_session_attendee_email12 = edward@owasp.org&lt;br /&gt;
| summit_session_attendee_username12 = Edward Bonver&lt;br /&gt;
| summit_session_attendee_company12= Symantec&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = Wojciech Dworakowski&lt;br /&gt;
| summit_session_attendee_email13 = wojciech.dworakowski@securing.pl&lt;br /&gt;
| summit_session_attendee_username13 = Wojciech Dworakowski&lt;br /&gt;
| summit_session_attendee_company13= SecuRing&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = Vlatko Kosturjak&lt;br /&gt;
| summit_session_attendee_email14 = vlatko.kosturjak@owasp.org&lt;br /&gt;
| summit_session_attendee_username14 = kost&lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = Antonio Fontes&lt;br /&gt;
| summit_session_attendee_email15 = antonio.fontes@owasp.org&lt;br /&gt;
| summit_session_attendee_username15 = &lt;br /&gt;
| summit_session_attendee_company15= L7 Sécurité&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = Christian Martorella&lt;br /&gt;
| summit_session_attendee_email16 = christian.martorella@verizonbusiness.com&lt;br /&gt;
| summit_session_attendee_username16 = &lt;br /&gt;
| summit_session_attendee_company16= Verizon Business&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_username17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_username18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_username19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_username20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._individual_projects.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._individual_projects.jpg]]&lt;br /&gt;
| summit_session_name = OWASP Testing Guide&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session052&lt;br /&gt;
| mailing_list =&lt;br /&gt;
|-&lt;br /&gt;
| short_working_session_description= We need to define:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;- an updated vulnerability list to test (from the OWASP Common Vulnerabiltity list)&lt;br /&gt;
&amp;lt;br&amp;gt;- Create a more readable guide, eliminating some sections that are not&lt;br /&gt;
really useful,&lt;br /&gt;
&amp;lt;br&amp;gt;- Insert new testing techniques: HTTP Verb tampering, HTTP Parameter&lt;br /&gt;
Pollutions, etc.,&lt;br /&gt;
&amp;lt;br&amp;gt;- Rationalize some sections as Session Management Testing,&lt;br /&gt;
&amp;lt;br&amp;gt;- Debate if create a new section: Client side security and Firefox&lt;br /&gt;
extensions testing.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = OWASP Testing Project&lt;br /&gt;
| related_project_url_1 = http://www.owasp.org/index.php/Category:OWASP_Testing_Project&lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = &lt;br /&gt;
| related_project_url_2 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= Show the v3, and debating what we need to create an excellent v4&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = TODO&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = The presence of participants on the Working Session [[Summit 2011 Working Sessions/Session085|'''Common structure and numbering for all guides''']] is advisable.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = An updated outline for the testing guide that is tied into the OWASP common numbering scheme&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = A short white paper with ideas for revisions to the Testing Guide for evaluation and discussion by the community at large.&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = A committed project manager who can reach out to experts to get the document completed.&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Matteo Meucci&lt;br /&gt;
| summit_session_leader_email1 = matteo.meucci@owasp.org&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = &lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
| summit_session_leader_username2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 = &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 = Giorgio Fedon&lt;br /&gt;
| operational_leader_email1 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session052&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session052&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Attendee/Attendee084&amp;diff=97665</id>
		<title>Summit 2011 Attendee/Attendee084</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Attendee/Attendee084&amp;diff=97665"/>
				<updated>2010-12-23T10:37:16Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP 2011 Global Summit Attendee Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_name1 = Christian Martorella&lt;br /&gt;
| summit_attendee_email1 = cmartorella@edge-security.com&lt;br /&gt;
| summit_attendee_wiki_username1 = cmartorella&lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_company = Verizon Business&lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_current_owasp_involvement_name1 =  Web Slayer Project Leader&lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_1 =     http://www.owasp.org/index.php/Category:OWASP_Webslayer_Project&lt;br /&gt;
| summit_attendee_current_owasp_involvement_name2 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_2 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_name3 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_3 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_name4 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_4 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_name5 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_5 = &lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name1 =  Owasp training&lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_1 = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session041&lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_1 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name2 = Metrics&lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_2 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_2 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name3 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_3 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_3 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name4 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_4 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_4 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name5 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_5 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_5 = &lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_owasp_sponsor = &lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_summit_time_paid_by_name1 = [[Image:VerizonB.jpeg |180x80 px| link=http://www.verizonbusiness.com]] &lt;br /&gt;
| summit_attendee_summit_time_paid_by_url_1 = &lt;br /&gt;
| summit_attendee_summit_time_paid_by_name2 =&lt;br /&gt;
| summit_attendee_summit_time_paid_by_url_2 =&lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_summit_expenses_paid_by_name1 = [[Image:VerizonB.jpeg |180x80 px| link=http://www.verizonbusiness.com]] &lt;br /&gt;
| summit_attendee_summit_expenses_paid_by_url_1 = &lt;br /&gt;
| summit_attendee_summit_expenses_paid_by_name2 = &lt;br /&gt;
| summit_attendee_summit_expenses_paid_by_url_2 =  &lt;br /&gt;
|-&lt;br /&gt;
| reason_for_sponsorship = &lt;br /&gt;
|-&lt;br /&gt;
| status = Confirmed, funded, not booked&lt;br /&gt;
|-&lt;br /&gt;
| letter sent to sponsor = &lt;br /&gt;
|-&lt;br /&gt;
| notes for Kate &lt;br /&gt;
|-&lt;br /&gt;
| attendee_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Attendee084&lt;br /&gt;
| attendee_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Attendee/Attendee084&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Verizon.gif&amp;diff=97664</id>
		<title>File:Verizon.gif</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Verizon.gif&amp;diff=97664"/>
				<updated>2010-12-23T10:34:27Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:VerizonB.jpeg&amp;diff=97663</id>
		<title>File:VerizonB.jpeg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:VerizonB.jpeg&amp;diff=97663"/>
				<updated>2010-12-23T10:29:50Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Verizonbusiness.jpg&amp;diff=97662</id>
		<title>File:Verizonbusiness.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Verizonbusiness.jpg&amp;diff=97662"/>
				<updated>2010-12-23T10:13:08Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Webslayer_Project&amp;diff=96424</id>
		<title>Project Information:template Webslayer Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Webslayer_Project&amp;diff=96424"/>
				<updated>2010-12-15T00:24:44Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Webslayer Project'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| &lt;br /&gt;
WebSlayer is a tool designed for brute forcing Web Applications, it can be used to discover not linked  resources (directories, servlets, scripts, etc), brute force GET and POST parameters, brute force forms parameters (User/Password),  fuzzing, etc.&lt;br /&gt;
&lt;br /&gt;
The tools has a powerful payload generator and a easy and flexible results analyzer.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:cmartorella(at)edge-security.com '''Christian Martorella''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;[mailto:cdelojo(at)edge-security.com '''Carlos del Ojo''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-webslayer-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:owasp-webslayer-project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:andres@neurofuzz.com '''Andres Andreu''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:name(at)name '''TBD''']&amp;lt;br&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
[http://www.edge-security.com/webslayer.php - The tool's url]&lt;br /&gt;
&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''RELATED PROJECTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* If any, add link.&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Sponsor name, if applicable  &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[:Category:OWASP Webslayer Project Roadmap|'''Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''First Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Not yet''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Webslayer Project - First Review - Self Evaluation - A|See&amp;amp;Edit: First Review/SelfEvaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Not yet''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Webslayer Project - First Review - First Reviewer - B|See&amp;amp;Edit: First Review/1st Reviewer (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Webslayer Project - First Review - Second Reviewer - C|See&amp;amp;Edit: First Review/2nd Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Webslayer Project - First Review - OWASP Board Member - D|See/Edit: First Review/Board Member (D)]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=96419</id>
		<title>Category:OWASP Webslayer Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=96419"/>
				<updated>2010-12-15T00:20:27Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project|Click here to return to OWASP Projects page.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:Project Information:template Webslayer Project|Click here to see (&amp;amp; edit, if wanted) the template.]] &lt;br /&gt;
{{:Project Information:template Webslayer Project}}&lt;br /&gt;
[[Category:OWASP Project|Webslayer Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
WebSlayer is a tool designed for brute forcing Web Applications, it can be used to discover not linked resources (directories, servlets, scripts, etc), brute force GET and POST parameters, brute force Forms parameters (User/Password), Fuzzing, etc. The tools has a payload generator and a easy and powerful results analyzer to aid the tester in all the brute force tests.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It's possible to perform attacks like:&lt;br /&gt;
&lt;br /&gt;
* Predictable resource locator (File and directories discovery)&lt;br /&gt;
* Login forms brute force&lt;br /&gt;
* Session brute force&lt;br /&gt;
* Parameters brute force&lt;br /&gt;
* Parameter fuzzing and Injection (XSS, SQL, etc)&lt;br /&gt;
* Basic and Ntml brute forcing  &lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
Some features are:&lt;br /&gt;
&lt;br /&gt;
* Encodings: 15 encodings supported&lt;br /&gt;
* All parameters attack: the tool will inject the payload in every parameter (Headers, Get, Post)&lt;br /&gt;
* Authentication: Webslayer supports Ntml and Basic authentication, also you can brute force the authentication&lt;br /&gt;
* Multiple payloads: you can use 2 paylods in different parts&lt;br /&gt;
* Proxy support (authentication supported)&lt;br /&gt;
* Live filters: You can change the filters as the attack is taking place&lt;br /&gt;
* Multiple threads: You can set how many threads to use in the attack&lt;br /&gt;
* Session import/export: Allows you to save the session and to continue working with the results&lt;br /&gt;
* Integrated web browser: a full fledge webkit browser is included to analyze the results&lt;br /&gt;
* Predefined dictionaries for predictable resource location, based on known servers (Thanks to Dark Raver, www.open-labs.org)&lt;br /&gt;
* Payload Generator (custom payload generator)&lt;br /&gt;
* Time delay between requests&lt;br /&gt;
* Attack balancing across multiple proxies&lt;br /&gt;
&lt;br /&gt;
===For Resource Location prediction===&lt;br /&gt;
&lt;br /&gt;
* Recursion: When discovering directories, you can set how deep to go&lt;br /&gt;
* Non standard code error checking: Webslayer will detect NoN Standard Code, to avoid presenting useless results&lt;br /&gt;
* Extensions: You can add a list of file extensions to a dictionary&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Results analysis==&lt;br /&gt;
&lt;br /&gt;
The power of Webslayer resides in the way you can work with the results, for every attack you will have all the responses, and for each ;&lt;br /&gt;
request you will have:&lt;br /&gt;
&lt;br /&gt;
* Html results&lt;br /&gt;
* Source code&lt;br /&gt;
* Headers&lt;br /&gt;
* Web browser view (it will replay the request via the browser)&lt;br /&gt;
&lt;br /&gt;
Multiple filters for improving the performance and for producing better results for the analyst&lt;br /&gt;
&lt;br /&gt;
* Return Code&lt;br /&gt;
* Characters length&lt;br /&gt;
* Words length&lt;br /&gt;
* Lines length&lt;br /&gt;
* MD5&lt;br /&gt;
* Regular expression&lt;br /&gt;
&lt;br /&gt;
Webslayer will maintain all the attacks in the session so you can work with them, compare, check later, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Webslayer-analysis.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Payload Generator==&lt;br /&gt;
&lt;br /&gt;
Another interesting feature of WebSlayer is the Payload Generator, with this tool you can create your custom payloads, for all your needs. It has some basic functions like:&lt;br /&gt;
&lt;br /&gt;
* Files: You can load dictionaries and encode the content.&lt;br /&gt;
* Numeric Ranges: Allow the creation of a numeric payload given a chosen range. Also allow to use a fixed width. Eg: &amp;quot;01&amp;quot;,&amp;quot;02&amp;quot;,..,&amp;quot;09&amp;quot;&lt;br /&gt;
* Block: You can create characters block, given a string or set of characters. Eg: &amp;quot;A&amp;quot; &amp;quot;AA&amp;quot; AAA&amp;quot; &amp;quot;AAAA&amp;quot; &lt;br /&gt;
* Permutation: Given a charset and a width it will create all possibles permutations. Eg: &amp;quot;ABC&amp;quot;, &amp;quot;ACB&amp;quot;, &amp;quot;BAC&amp;quot; ..., &amp;quot;CBA&amp;quot;&lt;br /&gt;
* Credit Cards: You can create well formed credit card numbers for testing shopping carts, and payment modules&lt;br /&gt;
* Usernames: Given some names, it will create all the possibles combinations used in account naming patterns. Eg: John Doe: &amp;quot;j.doe&amp;quot;,&amp;quot;john.doe&amp;quot;,&amp;quot;johndoe&amp;quot;, etc.&lt;br /&gt;
&lt;br /&gt;
After you have some Generators, you can concatenate and create your final Payload, in the screenshot we created a Permutation of &amp;quot;abcaeiou&amp;quot; with a width of 5 characters, and for the final payload we concatenated the word &amp;quot;-owasp08&amp;quot; to the generator. The pattern to create the Payload is: [@PPerm00@]-owasp08&lt;br /&gt;
Yo can drag'n'drop the temporal generator, to the Payload creator pattern:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Webslayer-payload.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Getting Started==&lt;br /&gt;
&lt;br /&gt;
===Downloading===&lt;br /&gt;
&lt;br /&gt;
At the moment WebSlayer is available in google code subversion:&lt;br /&gt;
&lt;br /&gt;
svn checkout http://webslayer.googlecode.com/svn/trunk/ webslayer-read-only&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Grab the latest version from here: http://code.google.com/p/webslayer/downloads/list&lt;br /&gt;
&lt;br /&gt;
===Installing===&lt;br /&gt;
&lt;br /&gt;
It works fine with the OWASP LIVE CD, and Backtrack R2, just make sure you install:&lt;br /&gt;
&lt;br /&gt;
python-qt4&lt;br /&gt;
python-pycurl&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Launching a basic attack===&lt;br /&gt;
&lt;br /&gt;
First of all, you must understand that the tool is based in replacing the Keyword &amp;quot;FUZZ&amp;quot; or &amp;quot;FUZ2Z&amp;quot; by the payload that you have chosen.&lt;br /&gt;
&lt;br /&gt;
So lets start  using the application for discovering directories in a website:&lt;br /&gt;
&lt;br /&gt;
* 1- In the Attack tab, insert the website URL that you want to brute force, with the keyword FUZZ in the end so WebSlayer will insert the content of the payload in that position. Eg:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://www.mysite.com/FUZZ&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
* 2- Next we are going to choose the payload type, we will leave &amp;quot;Dictionary&amp;quot;, and we are going to choose a dictionary file, in this case i recommend to use the file &amp;quot;common.txt&amp;quot;, which is located in the wordlists folder.&lt;br /&gt;
&lt;br /&gt;
* 3- Now click the &amp;quot;Start attack&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Future Developments==&lt;br /&gt;
&lt;br /&gt;
We are working on the new release of WebSlayer, which will have a complete engine redesign, and some changes in the GUI. &lt;br /&gt;
&lt;br /&gt;
Also we are working in:&lt;br /&gt;
&lt;br /&gt;
* Adding more generators in the Payload Generator&lt;br /&gt;
* The possibility to have more than 2 payloads&lt;br /&gt;
* Changing the payload keyword convention (instead of ussing FUZZ, we will allow the use of @mypayload@)&lt;br /&gt;
* Improving the logs&lt;br /&gt;
* Multiple target URLS, ip range support for massive attacks&lt;br /&gt;
* Responses diffing&lt;br /&gt;
* Check for backups of detected files (.bak,.old,.txt,etc) &lt;br /&gt;
&lt;br /&gt;
Also we are working in the release of packages for Linux and OS X&lt;br /&gt;
&lt;br /&gt;
==Contacting us==&lt;br /&gt;
&lt;br /&gt;
There are two ways of getting information on WebSlayer. The mailing list, and contacting the project leader directly.&lt;br /&gt;
&lt;br /&gt;
Mailing list: https://lists.owasp.org/mailman/listinfo/owasp-webslayer-project&lt;br /&gt;
&lt;br /&gt;
For content which is not appropriate for the public mailing list, you can alternatively contact Christian Martorella, at [cmartorella] at the [edge-security.com] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==FAQ's==&lt;br /&gt;
&lt;br /&gt;
* a) Once a panel is detached how can i attach it again? &lt;br /&gt;
       You can attach the panel again by double clicking on the title bar&lt;br /&gt;
&lt;br /&gt;
==Project Contributors==&lt;br /&gt;
&lt;br /&gt;
The WebSlayer project is run by Christian Martorella and Carlos del Ojo from Edge-Security&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP/Training/OWASP_Webslayer_Project&amp;diff=96406</id>
		<title>OWASP/Training/OWASP Webslayer Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP/Training/OWASP_Webslayer_Project&amp;diff=96406"/>
				<updated>2010-12-15T00:04:18Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Training Modules&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| Module_designation = [[Category:OWASP Webslayer Project|OWASP Webslayer Project]]&lt;br /&gt;
|  Module_Overview_Goal =&lt;br /&gt;
WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc.   &lt;br /&gt;
&lt;br /&gt;
The tools have a payload generator and a easy and powerful results analyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Some features are: &lt;br /&gt;
&lt;br /&gt;
* Encodings: 15 encodings supported&lt;br /&gt;
* All parameters attack: the tool will inject the payload in every parameter (Headers, Get, Post)&lt;br /&gt;
* Authentication: Webslayer supports Ntml and Basic authentication, also you can brute force the authentication &lt;br /&gt;
* Multiple payloads: you can use 2 paylods in different parts&lt;br /&gt;
* Proxy support (authentication supported) &lt;br /&gt;
* Live filters: You can change the filters as the attack is taking place&lt;br /&gt;
* Multiple threads: You can set how many threads to use in the attack&lt;br /&gt;
* Session import/export: Allows you to save the session and to continue working with the results &lt;br /&gt;
* Integrated web browser: a full fledge webkit browser is included to analyze the results &lt;br /&gt;
* Predefined dictionaries for predictable resource location, based on known servers (Thanks to Dark Raver, www.open-labs.org) &lt;br /&gt;
* Payload Generator (custom payload generator)&lt;br /&gt;
&lt;br /&gt;
| Content =&lt;br /&gt;
The training will show how to use the tool and will cover the following topics:&lt;br /&gt;
&lt;br /&gt;
*Interface overview&lt;br /&gt;
*Basic Payloads overview&lt;br /&gt;
*Basic directory discovery setup&lt;br /&gt;
*Advance directory and file discovery&lt;br /&gt;
*Login form brute force attack&lt;br /&gt;
*Basic authentication attack&lt;br /&gt;
*Custom payload generation&lt;br /&gt;
*Advanced uses&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
| Material = &lt;br /&gt;
The training is a hands on course, so it is recommended to bring your own laptop (it´s possible to follow the training without a computer)&lt;br /&gt;
&lt;br /&gt;
The latest version of Webslayer can be downloaded from google code subversion:&lt;br /&gt;
&lt;br /&gt;
*[http://code.google.com/p/webslayer/downloads/list Webslayer]&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP/Training/OWASP_Webslayer_Project&amp;diff=95639</id>
		<title>OWASP/Training/OWASP Webslayer Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP/Training/OWASP_Webslayer_Project&amp;diff=95639"/>
				<updated>2010-12-07T15:40:25Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Training Modules&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| Module_designation = [[Category:OWASP Webslayer Project|OWASP Webslayer Project]]&lt;br /&gt;
|  Module_Overview_Goal =&lt;br /&gt;
WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc.   &lt;br /&gt;
&lt;br /&gt;
The tools have a payload generator and a easy and powerful results analyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Some features are: &lt;br /&gt;
&lt;br /&gt;
* Encodings: 15 encodings supported&lt;br /&gt;
* All parameters attack: the tool will inject the payload in every parameter (Headers, Get, Post)&lt;br /&gt;
* Authentication: Webslayer supports Ntml and Basic authentication, also you can brute force the authentication &lt;br /&gt;
* Multiple payloads: you can use 2 paylods in different parts&lt;br /&gt;
* Proxy support (authentication supported) &lt;br /&gt;
* Live filters: You can change the filters as the attack is taking place&lt;br /&gt;
* Multiple threads: You can set how many threads to use in the attack&lt;br /&gt;
* Session import/export: Allows you to save the session and to continue working with the results &lt;br /&gt;
* Integrated web browser: a full fledge webkit browser is included to analyze the results &lt;br /&gt;
* Predefined dictionaries for predictable resource location, based on known servers (Thanks to Dark Raver, www.open-labs.org) &lt;br /&gt;
* Payload Generator (custom payload generator)&lt;br /&gt;
&lt;br /&gt;
| Content =&lt;br /&gt;
The training will show how to use the tool and will cover the following topics:&lt;br /&gt;
&lt;br /&gt;
-Interface overview&lt;br /&gt;
-Basic Payloads overview&lt;br /&gt;
-Basic directory discovery setup&lt;br /&gt;
-Advance directory and file discovery&lt;br /&gt;
-Login form brute force attack&lt;br /&gt;
-Basic authentication attack&lt;br /&gt;
-Custom payload generation&lt;br /&gt;
-Advanced uses&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
| Material = &lt;br /&gt;
The training is a hands on course, so it is recommended to bring your own laptop.&lt;br /&gt;
&lt;br /&gt;
The latest version of Webslayer can be downloaded from:&lt;br /&gt;
&lt;br /&gt;
[http://code.google.com/p/webslayer/downloads/list Webslayer]&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP/Training/OWASP_Webslayer_Project&amp;diff=95637</id>
		<title>OWASP/Training/OWASP Webslayer Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP/Training/OWASP_Webslayer_Project&amp;diff=95637"/>
				<updated>2010-12-07T15:26:20Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Training Modules&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| Module_designation = [[Category:OWASP Webslayer Project|OWASP Webslayer Project]]&lt;br /&gt;
| Module_Overview_Goal = &lt;br /&gt;
WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc.   &lt;br /&gt;
&lt;br /&gt;
The tools have a payload generator and a easy and powerful results analyzer.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
Some features are: &lt;br /&gt;
* Encodings: 15 encodings supported&lt;br /&gt;
* All parameters attack: the tool will inject the payload in every parameter (Headers, Get, Post)&lt;br /&gt;
* Authentication: Webslayer supports Ntml and Basic authentication, also you can brute force the authentication &lt;br /&gt;
* Multiple payloads: you can use 2 paylods in different parts&lt;br /&gt;
* Proxy support (authentication supported) &lt;br /&gt;
* Live filters: You can change the filters as the attack is taking place&lt;br /&gt;
* Multiple threads: You can set how many threads to use in the attack&lt;br /&gt;
* Session import/export: Allows you to save the session and to continue working with the results &lt;br /&gt;
* Integrated web browser: a full fledge webkit browser is included to analyze the results &lt;br /&gt;
* Predefined dictionaries for predictable resource location, based on known servers (Thanks to Dark Raver, www.open-labs.org) &lt;br /&gt;
* Payload Generator (custom payload generator) &lt;br /&gt;
&lt;br /&gt;
| Content =&lt;br /&gt;
The training will show how to use the tool and will cover the following topics:&lt;br /&gt;
&lt;br /&gt;
-Interface overview&lt;br /&gt;
-Basic Payloads overview&lt;br /&gt;
-Basic directory discovery setup&lt;br /&gt;
-Advance directory and file discovery&lt;br /&gt;
-Login form brute force attack&lt;br /&gt;
-Basic authentication attack&lt;br /&gt;
-Custom payload generation&lt;br /&gt;
-Advanced uses&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
| Material = &lt;br /&gt;
The training is a hands on course, so it is recommended to bring your own laptop.&lt;br /&gt;
&lt;br /&gt;
The latest version of Webslayer can be downloaded from:&lt;br /&gt;
&lt;br /&gt;
[http://code.google.com/p/webslayer/downloads/list Webslayer]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Cmartorella&amp;diff=94263</id>
		<title>User:Cmartorella</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Cmartorella&amp;diff=94263"/>
				<updated>2010-11-28T23:00:54Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Christian Martorella'''&lt;br /&gt;
&lt;br /&gt;
Christian Martorella has been working in the field of information security for the last 10 years, starting his career in Argentina IRS as security consultant, now he's Practice Leader in Threat and Vulnerability - EMEA in Verizon Business. He is cofounder an active member of Edge-Security team, where security tools and research is released. He has been speaker at What The Hack!, NoConName, FIST Conferences, OWASP Summit 2008 and OWASP Spain IV &amp;amp; VI, Source Conference Barcelona and Hack.LU. Christian has contributed with open source assessment tools like OWASP WebSlayer and Metagoofil. He likes all related to Information Gathering and Penetration testing. Christian currently holds the President position at the FIST Conferences board, and in the past taught Ethical Hacking at the IT Security Master of La Salle University.&lt;br /&gt;
&lt;br /&gt;
Contact: cmartorella_at_edge-security.com&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=45839</id>
		<title>Category:OWASP Webslayer Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=45839"/>
				<updated>2008-11-04T23:17:32Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project|Click here to return to OWASP Projects page.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:Project Information:template Webslayer Project|Click here to see (&amp;amp; edit, if wanted) the template.]] &lt;br /&gt;
{{:Project Information:template Webslayer Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc. The tools has a payload generator and a easy and powerful results analyzer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It's possible to perform attacks like:&lt;br /&gt;
&lt;br /&gt;
* Predictable resource locator (File and directories discovery)&lt;br /&gt;
* Login forms brute force&lt;br /&gt;
* Session brute force&lt;br /&gt;
* Parameters brute force&lt;br /&gt;
* Parameter fuzzing and Injection (XSS, SQL, etc)&lt;br /&gt;
* Basic and Ntml Bruteforcing  &lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
Some features are:&lt;br /&gt;
&lt;br /&gt;
* Encodings: 15 encodings supported&lt;br /&gt;
* All parameters attack: the tool will inject the payload in every parameter (Headers, Get, Post)&lt;br /&gt;
* Authentication: Webslayer supports Ntml and Basic authentication, also you can brute force the authentication&lt;br /&gt;
* Multiple payloads: you can use 2 paylods in different parts&lt;br /&gt;
* Proxy support (authentication supported)&lt;br /&gt;
* Live filters: You can change the filters as the attack is taking place&lt;br /&gt;
* Multiple threads: You can set how many threads to use in the attack&lt;br /&gt;
* Session import/export: Allows you to save the session and to continue working with the results&lt;br /&gt;
* Integrated web browser: a full fledge webkit browser is included to analyze the results&lt;br /&gt;
* Predefined dictionaries for predictable resource location, based on known servers (Thanks to Dark Raver, www.open-labs.org)&lt;br /&gt;
* Payload Generator (custom payload generator)&lt;br /&gt;
&lt;br /&gt;
===For Resource Location prediction===&lt;br /&gt;
&lt;br /&gt;
* Recursion: When discovering directories, you can set how deep to go&lt;br /&gt;
* Non standard code error checking: Webslayer will detect NoN Standard Code, to avoid presenting trash results&lt;br /&gt;
* Extensions: You can add a list of extensions to try with a dictionary&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Results analysis==&lt;br /&gt;
&lt;br /&gt;
The power of Webslayer resides in the way you can work with the results, for every attack you will have all the responses, and for each ;&lt;br /&gt;
request you will have:&lt;br /&gt;
&lt;br /&gt;
* Html results&lt;br /&gt;
* Source code&lt;br /&gt;
* Headers&lt;br /&gt;
* Web browser view (it will replay the request via the browser)&lt;br /&gt;
&lt;br /&gt;
Multiple filters for improving the performance and for producing better results for the analyst&lt;br /&gt;
&lt;br /&gt;
* Return Code&lt;br /&gt;
* Characters length&lt;br /&gt;
* Words length&lt;br /&gt;
* Lines length&lt;br /&gt;
* MD5&lt;br /&gt;
* Regular expression&lt;br /&gt;
&lt;br /&gt;
Webslayer will maintain all the attacks in the session so you can work with them, compare, check later, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Webslayer-analysis.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Payload Generator==&lt;br /&gt;
&lt;br /&gt;
Another interesting feature of WebSlayer is the Payload Generator, with this tool you can create your custom payloads, for all your needs. It has some basic functions like:&lt;br /&gt;
&lt;br /&gt;
* Files: You can load dictionaries and encode the content.&lt;br /&gt;
* Numeric Ranges: Allow the creation of a numeric payload given a chosen range. Also allow to use a fixed width. Eg: &amp;quot;01&amp;quot;,&amp;quot;02&amp;quot;,..,&amp;quot;09&amp;quot;&lt;br /&gt;
* Block: You can create characters block, given a string or set of characters. Eg: &amp;quot;A&amp;quot; &amp;quot;AA&amp;quot; AAA&amp;quot; &amp;quot;AAAA&amp;quot; &lt;br /&gt;
* Permutation: Given a charset and a width it will create all possibles permutations. Eg: &amp;quot;ABC&amp;quot;, &amp;quot;ACB&amp;quot;, &amp;quot;BAC&amp;quot; ..., &amp;quot;CBA&amp;quot;&lt;br /&gt;
* Credit Cards: You can create well formed credit card numbers for testing shopping carts, and payment modules&lt;br /&gt;
* Usernames: Given some names, it will create all the possibles combinations used in account naming patterns. Eg: John Doe: &amp;quot;j.doe&amp;quot;,&amp;quot;john.doe&amp;quot;,&amp;quot;johndoe&amp;quot;, etc.&lt;br /&gt;
&lt;br /&gt;
After you have some Generators, you can concatenate and create your final Payload, in the screenshot we created a Permutation of &amp;quot;abcaeiou&amp;quot; with a width of 5 characters, and for the final payload we concatenated the word &amp;quot;-owasp08&amp;quot; to the generator. The pattern to create the Payload is: [@PPerm00@]-owasp08&lt;br /&gt;
Yo can drag'n'drop the temporal generator, to the Payload creator pattern:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Webslayer-payload.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Getting Started==&lt;br /&gt;
&lt;br /&gt;
===Downloading===&lt;br /&gt;
&lt;br /&gt;
At the moment WebSlayer is available only for Windows platform as an installable, the source code will be available in the next release.&lt;br /&gt;
You can download the latest version from Google Code, and the current version has no dependencies.&lt;br /&gt;
&lt;br /&gt;
Grab the latest version from here: http://code.google.com/p/webslayer/downloads/list&lt;br /&gt;
&lt;br /&gt;
===Installing===&lt;br /&gt;
&lt;br /&gt;
There is a basic installation needed, just double click, select destination folder and it's done.&lt;br /&gt;
&lt;br /&gt;
===Launching a basic attack===&lt;br /&gt;
&lt;br /&gt;
First of all, you must understand that the tool is based in replacing the Keyword &amp;quot;FUZZ&amp;quot; or &amp;quot;FUZ2Z&amp;quot; by the payload that you have chosen.&lt;br /&gt;
&lt;br /&gt;
So lets start  using the application for discovering directories in a website:&lt;br /&gt;
&lt;br /&gt;
* 1- In the Attack tab, insert the website URL that you want to brute force, with the keyword FUZZ in the end so WebSlayer will insert the content of the payload in that position. Eg:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://www.mysite.com/FUZZ&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
* 2- Next we are going to choose the payload type, we will leave &amp;quot;Dictionary&amp;quot;, and we are going to choose a dictionary file, in this case i recommend to use the file &amp;quot;common.txt&amp;quot;, which is located in the wordlists folder.&lt;br /&gt;
&lt;br /&gt;
* 3- Now click the &amp;quot;Start attack&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Future Developments==&lt;br /&gt;
&lt;br /&gt;
We are working on the new release of WebSlayer, which will have a complete engine redesign, and some changes in the GUI. &lt;br /&gt;
&lt;br /&gt;
Also we are working in:&lt;br /&gt;
&lt;br /&gt;
* Adding more encoders/decoders&lt;br /&gt;
* Adding more generators in the Payload Generator&lt;br /&gt;
* The possibility to have more than 2 payloads&lt;br /&gt;
* Changing the payload keyword convention (instead of ussing FUZZ, we will allow the use of @mypayload@)&lt;br /&gt;
* Improving the logs&lt;br /&gt;
* Improving the session restoring&lt;br /&gt;
* Improving the Non standard code checking&lt;br /&gt;
* Multiple target URLS, ip range support for massive attacks&lt;br /&gt;
* Responses diffing&lt;br /&gt;
*  Check for backups of detected files (.bak,.old,.txt,etc)&lt;br /&gt;
*  GUI Redesign&lt;br /&gt;
*  Crawler for getting the estructure as a starting points&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One important area to work is the tailored dictionaries from know application/servers, it is important that the community participate providing new&lt;br /&gt;
dictionaries of known applications.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Also we are working in the release of packages for Linux and OS X&lt;br /&gt;
&lt;br /&gt;
==Contacting us==&lt;br /&gt;
&lt;br /&gt;
There are two ways of getting information on WebSlayer. The mailing list, and contacting the project lead directly.&lt;br /&gt;
&lt;br /&gt;
Mailing list: https://lists.owasp.org/mailman/listinfo/owasp-webslayer-project&lt;br /&gt;
&lt;br /&gt;
For content which is not appropriate for the public mailing list, you can alternatively contact Christian Martorella, at [cmartorella] at the [edge-security.com] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==FAQ's==&lt;br /&gt;
&lt;br /&gt;
* a) Once a panel is detached how can i attach it again? &lt;br /&gt;
       You can attach the panel again by double clicking on the title bar&lt;br /&gt;
&lt;br /&gt;
==Project Contributors==&lt;br /&gt;
&lt;br /&gt;
The WebSlayer project is run by Christian Martorella and Carlos del Ojo from Edge-Security&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=45578</id>
		<title>Category:OWASP Webslayer Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=45578"/>
				<updated>2008-11-02T22:42:20Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project|Click here to return to OWASP Projects page.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:Project Information:template Webslayer Project|Click here to see (&amp;amp; edit, if wanted) the template.]] &lt;br /&gt;
{{:Project Information:template Webslayer Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc. The tools has a payload generator and a easy and powerful results analyzer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It's possible to perform attacks like:&lt;br /&gt;
&lt;br /&gt;
* Predictable resource locator (File and directories discovery)&lt;br /&gt;
* Login forms brute force&lt;br /&gt;
* Session brute force&lt;br /&gt;
* Parameters brute force&lt;br /&gt;
* Parameter fuzzing and Injection (XSS, SQL, etc)&lt;br /&gt;
* Basic and Ntml Bruteforcing  &lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
Some features are:&lt;br /&gt;
&lt;br /&gt;
* Encodings: 15 encodings supported&lt;br /&gt;
* All parameters attack: the tool will inject the payload in every parameter (Headers, Get, Post)&lt;br /&gt;
* Authentication: Webslayer supports Ntml and Basic authentication, also you can brute force the authentication&lt;br /&gt;
* Multiple payloads: you can use 2 paylods in different parts&lt;br /&gt;
* Proxy support (authentication supported)&lt;br /&gt;
* Live filters: You can change the filters as the attack is taking place&lt;br /&gt;
* Multiple threads: You can set how many threads to use in the attack&lt;br /&gt;
* Session import/export: Allows you to save the session and to continue working with the results&lt;br /&gt;
* Integrated web browser: a full fledge webkit browser is included to analyze the results&lt;br /&gt;
* Predefined dictionaries for predictable resource location, based on known servers (Thanks to Dark Raver, www.open-labs.org)&lt;br /&gt;
* Payload Generator (custom payload generator)&lt;br /&gt;
&lt;br /&gt;
===For Resource Location prediction===&lt;br /&gt;
&lt;br /&gt;
* Recursion: When discovering directories, you can set how deep to go&lt;br /&gt;
* Non standard code error checking: Webslayer will detect NoN Standard Code, to avoid presenting trash results&lt;br /&gt;
* Extensions: You can add a list of extensions to try with a dictionary&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Results analysis==&lt;br /&gt;
&lt;br /&gt;
The power of Webslayer resides in the way you can work with the results, for every attack you will have all the responses, and for each ;&lt;br /&gt;
request you will have:&lt;br /&gt;
&lt;br /&gt;
* Html results&lt;br /&gt;
* Source code&lt;br /&gt;
* Headers&lt;br /&gt;
* Web browser view (it will replay the request via the browser)&lt;br /&gt;
&lt;br /&gt;
Multiple filters for improving the performance and for producing better results for the analyst&lt;br /&gt;
&lt;br /&gt;
* Return Code&lt;br /&gt;
* Characters length&lt;br /&gt;
* Words length&lt;br /&gt;
* Lines length&lt;br /&gt;
* MD5&lt;br /&gt;
* Regular expression&lt;br /&gt;
&lt;br /&gt;
Webslayer will maintain all the attacks in the session so you can work with them, compare, check later, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Webslayer-analysis.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Payload Generator==&lt;br /&gt;
&lt;br /&gt;
Another interesting feature of WebSlayer is the Payload Generator, with this tool you can create your custom payloads, for all your needs. It has some basic functions like:&lt;br /&gt;
&lt;br /&gt;
* Files: You can load dictionaries and encode the content.&lt;br /&gt;
* Numeric Ranges: Allow the creation of a numeric payload given a chosen range. Also allow to use a fixed width. Eg: &amp;quot;01&amp;quot;,&amp;quot;02&amp;quot;,..,&amp;quot;09&amp;quot;&lt;br /&gt;
* Block: You can create characters block, given a string or set of characters. Eg: &amp;quot;A&amp;quot; &amp;quot;AA&amp;quot; AAA&amp;quot; &amp;quot;AAAA&amp;quot; &lt;br /&gt;
* Permutation: Given a charset and a width it will create all possibles permutations. Eg: &amp;quot;ABC&amp;quot;, &amp;quot;ACB&amp;quot;, &amp;quot;BAC&amp;quot; ..., &amp;quot;CBA&amp;quot;&lt;br /&gt;
* Credit Cards: You can create well formed credit card numbers for testing shopping carts, and payment modules&lt;br /&gt;
* Usernames: Given some names, it will create all the possibles combinations used in account naming patterns. Eg: John Doe: &amp;quot;j.doe&amp;quot;,&amp;quot;john.doe&amp;quot;,&amp;quot;johndoe&amp;quot;, etc.&lt;br /&gt;
&lt;br /&gt;
After you have some Generators, you can concatenate and create your final Payload, in the screenshot we created a Permutation of &amp;quot;abcaeiou&amp;quot; with a width of 5 characters, and for the final payload we concatenated the word &amp;quot;-owasp08&amp;quot; to the generator. The pattern to create the Payload is: [@PPerm00@]-owasp08&lt;br /&gt;
Yo can drag'n'drop the temporal generator, to the Payload creator pattern:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Webslayer-payload.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Getting Started==&lt;br /&gt;
&lt;br /&gt;
===Downloading===&lt;br /&gt;
&lt;br /&gt;
At the moment WebSlayer is available only for Windows platform as an installable, the source code will be available in the next release.&lt;br /&gt;
You can download the latest version from Google Code, and the current version has no dependencies.&lt;br /&gt;
&lt;br /&gt;
Grab the latest version from here: http://code.google.com/p/webslayer/downloads/list&lt;br /&gt;
&lt;br /&gt;
===Installing===&lt;br /&gt;
&lt;br /&gt;
There is a basic installation needed, just double click, select destination folder and it's done.&lt;br /&gt;
&lt;br /&gt;
===Launching a basic attack===&lt;br /&gt;
&lt;br /&gt;
First of all, you must understand that the tool is based in replacing the Keyword &amp;quot;FUZZ&amp;quot; or &amp;quot;FUZ2Z&amp;quot; by the payload that you have chosen.&lt;br /&gt;
&lt;br /&gt;
So lets start  using the application for discovering directories in a website:&lt;br /&gt;
&lt;br /&gt;
* 1- In the Attack tab, insert the website URL that you want to brute force, with the keyword FUZZ in the end so WebSlayer will insert the content of the payload in that position. Eg:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://www.mysite.com/FUZZ&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
* 2- Next we are going to choose the payload type, we will leave &amp;quot;Dictionary&amp;quot;, and we are going to choose a dictionary file, in this case i recommend to use the file &amp;quot;common.txt&amp;quot;, which is located in the wordlists folder.&lt;br /&gt;
&lt;br /&gt;
* 3- Now click the &amp;quot;Start attack&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Future Developments==&lt;br /&gt;
&lt;br /&gt;
We are working on the new release of WebSlayer, which will have a complete engine redesign, and some changes in the GUI. &lt;br /&gt;
&lt;br /&gt;
Also we are working in:&lt;br /&gt;
&lt;br /&gt;
* Adding more encoders/decoders&lt;br /&gt;
* Adding more generators in the Payload Generator&lt;br /&gt;
* The possibility to have more than 2 payloads&lt;br /&gt;
* Changing the payload keyword convention (instead of ussing FUZZ, we will allow the use of @mypayload@)&lt;br /&gt;
* Improving the logs&lt;br /&gt;
* Improving the session restoring&lt;br /&gt;
* Improving the Non standard code checking&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One important area to work is the tailored dictionaries from know application/servers, it is important that the community participate providing new&lt;br /&gt;
dictionaries of known applications.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Also we are working in the release of packages for Linux and OS X&lt;br /&gt;
&lt;br /&gt;
==Contacting us==&lt;br /&gt;
&lt;br /&gt;
There are two ways of getting information on WebSlayer. The mailing list, and contacting the project lead directly.&lt;br /&gt;
&lt;br /&gt;
Mailing list: https://lists.owasp.org/mailman/listinfo/owasp-webslayer-project&lt;br /&gt;
&lt;br /&gt;
For content which is not appropriate for the public mailing list, you can alternatively contact Christian Martorella, at [cmartorella] at the [edge-security.com] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==FAQ's==&lt;br /&gt;
&lt;br /&gt;
* a) Once a panel is detached how can i attach it again? &lt;br /&gt;
       You can attach the panel again by double clicking on the title bar&lt;br /&gt;
&lt;br /&gt;
==Project Contributors==&lt;br /&gt;
&lt;br /&gt;
The WebSlayer project is run by Christian Martorella and Carlos del Ojo from Edge-Security&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Webslayer_Project&amp;diff=45577</id>
		<title>Project Information:template Webslayer Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Webslayer_Project&amp;diff=45577"/>
				<updated>2008-11-02T22:33:01Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Webslayer Project'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| &lt;br /&gt;
WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding  not linked  resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password),  Fuzzing, etc.&lt;br /&gt;
&lt;br /&gt;
The tools has a payload generator and a easy and powerful results analyzer.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:cmartorella(at)edge-security.com '''Christian Martorella''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;[mailto:cdelojo(at)edge-security.com '''Carlos del Ojo''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-webslayer-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:owasp-webslayer-project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:andres@neurofuzz.com '''Andres Andreu''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:name(at)name '''TBD''']&amp;lt;br&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
[http://www.edge-security.com/webslayer.php - The tool's url]&lt;br /&gt;
&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''RELATED PROJECTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* If any, add link.&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Sponsor name, if applicable  &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[:Category:OWASP Webslayer Project Roadmap|'''Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''First Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Not yet''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Webslayer Project - First Review - Self Evaluation - A|See&amp;amp;Edit: First Review/SelfEvaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Not yet''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Webslayer Project - First Review - First Reviewer - B|See&amp;amp;Edit: First Review/1st Reviewer (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Webslayer Project - First Review - Second Reviewer - C|See&amp;amp;Edit: First Review/2nd Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Webslayer Project - First Review - OWASP Board Member - D|See/Edit: First Review/Board Member (D)]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=45576</id>
		<title>Category:OWASP Webslayer Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=45576"/>
				<updated>2008-11-02T22:32:16Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project|Click here to return to OWASP Projects page.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:Project Information:template Webslayer Project|Click here to see (&amp;amp; edit, if wanted) the template.]] &lt;br /&gt;
{{:Project Information:template Webslayer Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc. The tools has a payload generator and a easy and powerful results analyzer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It's possible to perform attacks like:&lt;br /&gt;
&lt;br /&gt;
* Predictable resource locator (File and directories discovery)&lt;br /&gt;
* Login forms brute force&lt;br /&gt;
* Session brute force&lt;br /&gt;
* Parameters brute force&lt;br /&gt;
* Parameter fuzzing and Injection (XSS, SQL, etc)&lt;br /&gt;
* Basic and Ntml Bruteforcing  &lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
Some features are:&lt;br /&gt;
&lt;br /&gt;
* Encodings: 15 encodings supported&lt;br /&gt;
* All parameters attack: the tool will inject the payload in every parameter (Headers, Get, Post)&lt;br /&gt;
* Authentication: Webslayer supports Ntml and Basic authentication, also you can brute force the authentication&lt;br /&gt;
* Multiple payloads: you can use 2 paylods in different parts&lt;br /&gt;
* Proxy support (authentication supported)&lt;br /&gt;
* Live filters: You can change the filters as the attack is taking place&lt;br /&gt;
* Multiple threads: You can set how many threads to use in the attack&lt;br /&gt;
* Session import/export: Allows you to save the session and to continue working with the results&lt;br /&gt;
* Integrated web browser: a full fledge webkit browser is included to analyze the results&lt;br /&gt;
* Predefined dictionaries for predictable resource location, based on known servers (Thanks to Dark Raver, www.open-labs.org)&lt;br /&gt;
* Payload Generator (custom payload generator)&lt;br /&gt;
&lt;br /&gt;
===For Resource Location prediction===&lt;br /&gt;
&lt;br /&gt;
* Recursion: When discovering directories, you can set how deep to go&lt;br /&gt;
* Non standard code error checking: Webslayer will detect NoN Standard Code, to avoid presenting trash results&lt;br /&gt;
* Extensions: You can add a list of extensions to try with a dictionary&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Results analysis==&lt;br /&gt;
&lt;br /&gt;
The power of Webslayer resides in the way you can work with the results, for every attack you will have all the responses, and for each ;&lt;br /&gt;
request you will have:&lt;br /&gt;
&lt;br /&gt;
* Html results&lt;br /&gt;
* Source code&lt;br /&gt;
* Headers&lt;br /&gt;
* Web browser view (it will replay the request via the browser)&lt;br /&gt;
&lt;br /&gt;
Multiple filters for improving the performance and for producing better results for the analyst&lt;br /&gt;
&lt;br /&gt;
* Return Code&lt;br /&gt;
* Characters length&lt;br /&gt;
* Words length&lt;br /&gt;
* Lines length&lt;br /&gt;
* MD5&lt;br /&gt;
* Regular expression&lt;br /&gt;
&lt;br /&gt;
Webslayer will maintain all the attacks in the session so you can work with them, compare, check later, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Webslayer-analysis.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Payload Generator==&lt;br /&gt;
&lt;br /&gt;
Another interesting feature of WebSlayer is the Payload Generator, with this tool you can create your custom payloads, for all your needs. It has some basic functions like:&lt;br /&gt;
&lt;br /&gt;
* Files: You can load dictionaries and encode the content.&lt;br /&gt;
* Numeric Ranges: Allow the creation of a numeric payload given a chosen range. Also allow to use a fixed width. Eg: &amp;quot;01&amp;quot;,&amp;quot;02&amp;quot;,..,&amp;quot;09&amp;quot;&lt;br /&gt;
* Block: You can create characters block, given a string or set of characters. Eg: &amp;quot;A&amp;quot; &amp;quot;AA&amp;quot; AAA&amp;quot; &amp;quot;AAAA&amp;quot; &lt;br /&gt;
* Permutation: Given a charset and a width it will create all possibles permutations. Eg: &amp;quot;ABC&amp;quot;, &amp;quot;ACB&amp;quot;, &amp;quot;BAC&amp;quot; ..., &amp;quot;CBA&amp;quot;&lt;br /&gt;
* Credit Cards: You can create well formed credit card numbers for testing shopping carts, and payment modules&lt;br /&gt;
* Usernames: Given some names, it will create all the possibles combinations used in account naming patterns. Eg: John Doe: &amp;quot;j.doe&amp;quot;,&amp;quot;john.doe&amp;quot;,&amp;quot;johndoe&amp;quot;, etc.&lt;br /&gt;
&lt;br /&gt;
After you have some Generators, you can concatenate and create your final Payload, in the screenshot we created a Permutation of &amp;quot;abcaeiou&amp;quot; with a width of 5 characters, and for the final payload we concatenated the word &amp;quot;-owasp08&amp;quot; to the generator. The pattern to create the Payload is: [@PPerm00@]-owasp08&lt;br /&gt;
Yo can drag'n'drop the temporal generator, to the Payload creator pattern:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Webslayer-payload.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Getting Started==&lt;br /&gt;
&lt;br /&gt;
===Downloading===&lt;br /&gt;
&lt;br /&gt;
At the moment WebSlayer is available only for Windows platform as an installable, the source code will be available in the next release.&lt;br /&gt;
You can download the latest version from Google Code, and the current version has no dependencies.&lt;br /&gt;
&lt;br /&gt;
Grab the latest version from here: http://code.google.com/p/webslayer/downloads/list&lt;br /&gt;
&lt;br /&gt;
===Installing===&lt;br /&gt;
&lt;br /&gt;
There is a basic installation needed, just double click, select destination folder and it's done.&lt;br /&gt;
&lt;br /&gt;
===Launching a basic attack===&lt;br /&gt;
&lt;br /&gt;
First of all, you must understand that the tool is based in replacing the Keyword &amp;quot;FUZZ&amp;quot; or &amp;quot;FUZ2Z&amp;quot; by the payload that you have chosen.&lt;br /&gt;
&lt;br /&gt;
So lets start  using the application for discovering directories in a website:&lt;br /&gt;
&lt;br /&gt;
* 1- In the Attack tab, insert the website URL that you want to brute force, with the keyword FUZZ in the end so WebSlayer will insert the content of the payload in that position. Eg:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://www.mysite.com/FUZZ&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
* 2- Next we are going to choose the payload type, we will leave &amp;quot;Dictionary&amp;quot;, and we are going to choose a dictionary file, in this case i recommend to use the file &amp;quot;common.txt&amp;quot;, which is located in the wordlists folder.&lt;br /&gt;
&lt;br /&gt;
* 3- Now click the &amp;quot;Start attack&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Contacting us==&lt;br /&gt;
&lt;br /&gt;
There are two ways of getting information on WebSlayer. The mailing list, and contacting the project lead directly.&lt;br /&gt;
&lt;br /&gt;
Mailing list: https://lists.owasp.org/mailman/listinfo/owasp-webslayer-project&lt;br /&gt;
&lt;br /&gt;
For content which is not appropriate for the public mailing list, you can alternatively contact Christian Martorella, at [cmartorella] at the [edge-security.com] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==FAQ's==&lt;br /&gt;
&lt;br /&gt;
* a) Once a panel is detached how can i attach it again? &lt;br /&gt;
       You can attach the panel again by double clicking on the title bar&lt;br /&gt;
&lt;br /&gt;
==Project Contributors==&lt;br /&gt;
&lt;br /&gt;
The WebSlayer project is run by Christian Martorella and Carlos del Ojo from Edge-Security&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Webslayer-payload.jpg&amp;diff=45575</id>
		<title>File:Webslayer-payload.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Webslayer-payload.jpg&amp;diff=45575"/>
				<updated>2008-11-02T22:14:43Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=45574</id>
		<title>Category:OWASP Webslayer Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=45574"/>
				<updated>2008-11-02T22:13:04Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project|Click here to return to OWASP Projects page.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:Project Information:template Webslayer Project|Click here to see (&amp;amp; edit, if wanted) the template.]] &lt;br /&gt;
{{:Project Information:template Webslayer Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc. The tools has a payload generator and a easy and powerful results analyzer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It's possible to perform attacks like:&lt;br /&gt;
&lt;br /&gt;
* Predictable resource locator (File and directories discovery)&lt;br /&gt;
* Login forms brute force&lt;br /&gt;
* Session brute force&lt;br /&gt;
* Parameters brute force&lt;br /&gt;
* Parameter fuzzing and Injection (XSS, SQL, etc)&lt;br /&gt;
* Basic and Ntml Bruteforcing  &lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
Some features are:&lt;br /&gt;
&lt;br /&gt;
* Encodings: 15 encodings supported&lt;br /&gt;
* All parameters attack: the tool will inject the payload in every parameter (Headers, Get, Post)&lt;br /&gt;
* Authentication: Webslayer supports Ntml and Basic authentication, also you can brute force the authentication&lt;br /&gt;
* Multiple payloads: you can use 2 paylods in different parts&lt;br /&gt;
* Proxy support (authentication supported)&lt;br /&gt;
* Live filters: You can change the filters as the attack is taking place&lt;br /&gt;
* Multiple threads: You can set how many threads to use in the attack&lt;br /&gt;
* Session import/export: Allows you to save the session and to continue working with the results&lt;br /&gt;
* Integrated web browser: a full fledge webkit browser is included to analyze the results&lt;br /&gt;
* Predefined dictionaries for predictable resource location, based on known servers (Thanks to Dark Raver, www.open-labs.org)&lt;br /&gt;
* Payload Generator (custom payload generator)&lt;br /&gt;
&lt;br /&gt;
===For Resource Location prediction===&lt;br /&gt;
&lt;br /&gt;
* Recursion: When discovering directories, you can set how deep to go&lt;br /&gt;
* Non standard code error checking: Webslayer will detect NoN Standard Code, to avoid presenting trash results&lt;br /&gt;
* Extensions: You can add a list of extensions to try with a dictionary&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Results analysis==&lt;br /&gt;
&lt;br /&gt;
The power of Webslayer resides in the way you can work with the results, for every attack you will have all the responses, and for each ;&lt;br /&gt;
request you will have:&lt;br /&gt;
&lt;br /&gt;
* Html results&lt;br /&gt;
* Source code&lt;br /&gt;
* Headers&lt;br /&gt;
* Web browser view (it will replay the request via the browser)&lt;br /&gt;
&lt;br /&gt;
Multiple filters for improving the performance and for producing better results for the analyst&lt;br /&gt;
&lt;br /&gt;
* Return Code&lt;br /&gt;
* Characters length&lt;br /&gt;
* Words length&lt;br /&gt;
* Lines length&lt;br /&gt;
* MD5&lt;br /&gt;
* Regular expression&lt;br /&gt;
&lt;br /&gt;
Webslayer will maintain all the attacks in the session so you can work with them, compare, check later, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Webslayer-analysis.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Getting Started==&lt;br /&gt;
&lt;br /&gt;
===Downloading===&lt;br /&gt;
&lt;br /&gt;
At the moment WebSlayer is available only for Windows platform as an installable, the source code will be available in the next release.&lt;br /&gt;
You can download the latest version from Google Code, and the current version has no dependencies.&lt;br /&gt;
&lt;br /&gt;
Grab the latest version from here: http://code.google.com/p/webslayer/downloads/list&lt;br /&gt;
&lt;br /&gt;
===Installing===&lt;br /&gt;
&lt;br /&gt;
There is a basic installation needed, just double click, select destination folder and it's done.&lt;br /&gt;
&lt;br /&gt;
===Launching a basic attack===&lt;br /&gt;
&lt;br /&gt;
First of all, you must understand that the tool is based in replacing the Keyword &amp;quot;FUZZ&amp;quot; or &amp;quot;FUZ2Z&amp;quot; by the payload that you have chosen.&lt;br /&gt;
&lt;br /&gt;
So lets start  using the application for discovering directories in a website:&lt;br /&gt;
&lt;br /&gt;
* 1- In the Attack tab, insert the website URL that you want to brute force, with the keyword FUZZ in the end so WebSlayer will insert the content of the payload in that position. Eg:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://www.mysite.com/FUZZ&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
* 2- Next we are going to choose the payload type, we will leave &amp;quot;Dictionary&amp;quot;, and we are going to choose a dictionary file, in this case i recommend to use the file &amp;quot;common.txt&amp;quot;, which is located in the wordlists folder.&lt;br /&gt;
&lt;br /&gt;
* 3- Now click the &amp;quot;Start attack&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Contacting us==&lt;br /&gt;
&lt;br /&gt;
There are two ways of getting information on WebSlayer. The mailing list, and contacting the project lead directly.&lt;br /&gt;
&lt;br /&gt;
Mailing list: https://lists.owasp.org/mailman/listinfo/owasp-webslayer-project&lt;br /&gt;
&lt;br /&gt;
For content which is not appropriate for the public mailing list, you can alternatively contact Christian Martorella, at [cmartorella] at the [edge-security.com] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==FAQ's==&lt;br /&gt;
&lt;br /&gt;
* a) Once a panel is detached how can i attach it again? &lt;br /&gt;
       You can attach the panel again by double clicking on the title bar&lt;br /&gt;
&lt;br /&gt;
==Project Contributors==&lt;br /&gt;
&lt;br /&gt;
The WebSlayer project is run by Christian Martorella and Carlos del Ojo from Edge-Security&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Webslayer-analysis.jpg&amp;diff=45572</id>
		<title>File:Webslayer-analysis.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Webslayer-analysis.jpg&amp;diff=45572"/>
				<updated>2008-11-02T22:11:17Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=45571</id>
		<title>Category:OWASP Webslayer Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=45571"/>
				<updated>2008-11-02T22:06:19Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project|Click here to return to OWASP Projects page.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:Project Information:template Webslayer Project|Click here to see (&amp;amp; edit, if wanted) the template.]] &lt;br /&gt;
{{:Project Information:template Webslayer Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc. The tools has a payload generator and a easy and powerful results analyzer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It's possible to perform attacks like:&lt;br /&gt;
&lt;br /&gt;
* Predictable resource locator (File and directories discovery)&lt;br /&gt;
* Login forms brute force&lt;br /&gt;
* Session brute force&lt;br /&gt;
* Parameters brute force&lt;br /&gt;
* Parameter fuzzing and Injection (XSS, SQL, etc)&lt;br /&gt;
* Basic and Ntml Bruteforcing  &lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
Some features are:&lt;br /&gt;
&lt;br /&gt;
* Encodings: 15 encodings supported&lt;br /&gt;
* All parameters attack: the tool will inject the payload in every parameter (Headers, Get, Post)&lt;br /&gt;
* Authentication: Webslayer supports Ntml and Basic authentication, also you can brute force the authentication&lt;br /&gt;
* Multiple payloads: you can use 2 paylods in different parts&lt;br /&gt;
* Proxy support (authentication supported)&lt;br /&gt;
* Live filters: You can change the filters as the attack is taking place&lt;br /&gt;
* Multiple threads: You can set how many threads to use in the attack&lt;br /&gt;
* Session import/export: Allows you to save the session and to continue working with the results&lt;br /&gt;
* Integrated web browser: a full fledge webkit browser is included to analyze the results&lt;br /&gt;
* Predefined dictionaries for predictable resource location, based on known servers (Thanks to Dark Raver, www.open-labs.org)&lt;br /&gt;
* Payload Generator (custom payload generator)&lt;br /&gt;
&lt;br /&gt;
===For Resource Location prediction===&lt;br /&gt;
&lt;br /&gt;
* Recursion: When discovering directories, you can set how deep to go&lt;br /&gt;
* Non standard code error checking: Webslayer will detect NoN Standard Code, to avoid presenting trash results&lt;br /&gt;
* Extensions: You can add a list of extensions to try with a dictionary&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Results analysis==&lt;br /&gt;
&lt;br /&gt;
The power of Webslayer resides in the way you can work with the results, for every attack you will have all the responses, and for each ;&lt;br /&gt;
request you will have:&lt;br /&gt;
&lt;br /&gt;
* Html results&lt;br /&gt;
* Source code&lt;br /&gt;
* Headers&lt;br /&gt;
* Web browser view (it will replay the request via the browser)&lt;br /&gt;
&lt;br /&gt;
Multiple filters for improving the performance and for producing better results for the analyst&lt;br /&gt;
&lt;br /&gt;
* Return Code&lt;br /&gt;
* Characters length&lt;br /&gt;
* Words length&lt;br /&gt;
* Lines length&lt;br /&gt;
* MD5&lt;br /&gt;
* Regular expression&lt;br /&gt;
&lt;br /&gt;
Webslayer will maintain all the attacks in the session so you can work with them, compare, check later, etc.&lt;br /&gt;
&lt;br /&gt;
==Getting Started==&lt;br /&gt;
&lt;br /&gt;
===Downloading===&lt;br /&gt;
&lt;br /&gt;
At the moment WebSlayer is available only for Windows platform as an installable, the source code will be available in the next release.&lt;br /&gt;
You can download the latest version from Google Code, and the current version has no dependencies.&lt;br /&gt;
&lt;br /&gt;
Grab the latest version from here: &amp;lt;a href=&amp;quot;http://code.google.com/p/webslayer/downloads/list&amp;quot;&amp;gt;Google code&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Installing===&lt;br /&gt;
&lt;br /&gt;
There is a basic installation needed, just double click, select destination folder and it's done.&lt;br /&gt;
&lt;br /&gt;
===Launching a basic attack===&lt;br /&gt;
&lt;br /&gt;
First of all, you must understand that the tool is based in replacing the Keyword &amp;quot;FUZZ&amp;quot; or &amp;quot;FUZ2Z&amp;quot; by the payload that you have chosen.&lt;br /&gt;
&lt;br /&gt;
So lets start  using the application for discovering directories in a website:&lt;br /&gt;
&lt;br /&gt;
* 1- In the Attack tab, insert the website URL that you want to brute force, with the keyword FUZZ in the end so WebSlayer will insert the content of the payload in that position. Eg:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://www.mysite.com/FUZZ&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
* 2- Next we are going to choose the payload type, we will leave &amp;quot;Dictionary&amp;quot;, and we are going to choose a dictionary file, in this case i recommend to use the file &amp;quot;common.txt&amp;quot;, which is located in the wordlists folder.&lt;br /&gt;
&lt;br /&gt;
* 3- Now click the &amp;quot;Start attack&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Contacting us==&lt;br /&gt;
&lt;br /&gt;
There are two ways of getting information on WebSlayer. The mailing list, and contacting the project lead directly.&lt;br /&gt;
&lt;br /&gt;
Mailing list: &amp;lt;a href=&amp;quot;https://lists.owasp.org/mailman/listinfo/owasp-webslayer-project&amp;quot;&amp;gt;https://lists.owasp.org/mailman/listinfo/owasp-webslayer-project&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For content which is not appropriate for the public mailing list, you can alternatively contact Christian Martorella, at [cmartorella] at the [edge-security.com] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==FAQ's==&lt;br /&gt;
&lt;br /&gt;
* a) Once a panel is detached how can i attach it again? &lt;br /&gt;
       You can attach the panel again by double clicking on the title bar&lt;br /&gt;
&lt;br /&gt;
==Project Contributors==&lt;br /&gt;
&lt;br /&gt;
The WebSlayer project is run by Christian Martorella and Carlos del Ojo from Edge-Security&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=45570</id>
		<title>Category:OWASP Webslayer Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=45570"/>
				<updated>2008-11-02T21:59:25Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project|Click here to return to OWASP Projects page.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:Project Information:template Webslayer Project|Click here to see (&amp;amp; edit, if wanted) the template.]] &lt;br /&gt;
{{:Project Information:template Webslayer Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc. The tools has a payload generator and a easy and powerful results analyzer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It's possible to perform attacks like:&lt;br /&gt;
&lt;br /&gt;
* Predictable resource locator (File and directories discovery)&lt;br /&gt;
* Login forms brute force&lt;br /&gt;
* Session brute force&lt;br /&gt;
* Parameters brute force&lt;br /&gt;
* Parameter fuzzing and Injection (XSS, SQL, etc)&lt;br /&gt;
* Basic and Ntml Bruteforcing  &lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
Some features are:&lt;br /&gt;
&lt;br /&gt;
* Encodings: 15 encodings supported&lt;br /&gt;
* All parameters attack: the tool will inject the payload in every parameter (Headers, Get, Post)&lt;br /&gt;
* Authentication: Webslayer supports Ntml and Basic authentication, also you can brute force the authentication&lt;br /&gt;
* Multiple payloads: you can use 2 paylods in different parts&lt;br /&gt;
* Proxy support (authentication supported)&lt;br /&gt;
* Live filters: You can change the filters as the attack is taking place&lt;br /&gt;
* Multiple threads: You can set how many threads to use in the attack&lt;br /&gt;
* Session import/export: Allows you to save the session and to continue working with the results&lt;br /&gt;
* Integrated web browser: a full fledge webkit browser is included to analyze the results&lt;br /&gt;
* Predefined dictionaries for predictable resource location, based on known servers (Thanks to Dark Raver, www.open-labs.org)&lt;br /&gt;
* Payload Generator (custom payload generator)&lt;br /&gt;
&lt;br /&gt;
===For Resource Location prediction===&lt;br /&gt;
&lt;br /&gt;
* Recursion: When discovering directories, you can set how deep to go&lt;br /&gt;
* Non standard code error checking: Webslayer will detect NoN Standard Code, to avoid presenting trash results&lt;br /&gt;
* Extensions: You can add a list of extensions to try with a dictionary&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Results analysis==&lt;br /&gt;
&lt;br /&gt;
The power of Webslayer resides in the way you can work with the results, for every attack you will have all the responses, and for each ;&lt;br /&gt;
request you will have:&lt;br /&gt;
&lt;br /&gt;
* Html results&lt;br /&gt;
* Source code&lt;br /&gt;
* Headers&lt;br /&gt;
* Web browser view (it will replay the request via the browser)&lt;br /&gt;
&lt;br /&gt;
Multiple filters for improving the performance and for producing better results for the analyst&lt;br /&gt;
&lt;br /&gt;
* Return Code&lt;br /&gt;
* Characters length&lt;br /&gt;
* Words length&lt;br /&gt;
* Lines length&lt;br /&gt;
* MD5&lt;br /&gt;
* Regular expression&lt;br /&gt;
&lt;br /&gt;
Webslayer will maintain all the attacks in the session so you can work with them, compare, check later, etc.&lt;br /&gt;
&lt;br /&gt;
==Getting Started==&lt;br /&gt;
&lt;br /&gt;
===Downloading===&lt;br /&gt;
&lt;br /&gt;
At the moment WebSlayer is available only for Windows platform as an installable, the source code will be available in the next release.&lt;br /&gt;
You can download the latest version from Google Code, and the current version has no dependencies.&lt;br /&gt;
&lt;br /&gt;
===Installing===&lt;br /&gt;
&lt;br /&gt;
There is a basic installation needed, just double click, select destination folder and it's done.&lt;br /&gt;
&lt;br /&gt;
===Launching a basic attack===&lt;br /&gt;
&lt;br /&gt;
First of all, you must understand that the tool is based in replacing the Keyword &amp;quot;FUZZ&amp;quot; or &amp;quot;FUZ2Z&amp;quot; by the payload that you have chosen.&lt;br /&gt;
&lt;br /&gt;
So lets start  using the application for discovering directories in a website:&lt;br /&gt;
&lt;br /&gt;
* 1- In the Attack tab, insert the website URL that you want to brute force, with the keyword FUZZ in the end so WebSlayer will insert the content of the payload in that position. Eg:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://www.mysite.com/FUZZ&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
* 2- Next we are going to choose the payload type, we will leave &amp;quot;Dictionary&amp;quot;, and we are going to choose a dictionary file, in this case i recommend to use the file &amp;quot;common.txt&amp;quot;, which is located in the wordlists folder.&lt;br /&gt;
&lt;br /&gt;
* 3- Now click the &amp;quot;Start attack&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Contacting us==&lt;br /&gt;
&lt;br /&gt;
There are two ways of getting information on WebSlayer. The mailing list, and contacting the project lead directly.&lt;br /&gt;
&lt;br /&gt;
Mailing list: &amp;lt;a href=&amp;quot;https://lists.owasp.org/mailman/listinfo/owasp-webslayer-project&amp;quot;&amp;gt;https://lists.owasp.org/mailman/listinfo/owasp-webslayer-project&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For content which is not appropriate for the public mailing list, you can alternatively contact Christian Martorella, at [cmartorella] at the [edge-security.com] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==FAQ's==&lt;br /&gt;
&lt;br /&gt;
* a) Once a panel is detached how can i attach it again? &lt;br /&gt;
       You can attach the panel again by double clicking on the title bar&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=45568</id>
		<title>Category:OWASP Webslayer Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=45568"/>
				<updated>2008-11-02T21:39:48Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project|Click here to return to OWASP Projects page.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:Project Information:template Webslayer Project|Click here to see (&amp;amp; edit, if wanted) the template.]] &lt;br /&gt;
{{:Project Information:template Webslayer Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc. The tools has a payload generator and a easy and powerful results analyzer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It's possible to perform attacks like:&lt;br /&gt;
&lt;br /&gt;
* Predictable resource locator (File and directories discovery)&lt;br /&gt;
* Login forms brute force&lt;br /&gt;
* Session brute force&lt;br /&gt;
* Parameters brute force&lt;br /&gt;
* Parameter fuzzing and Injection (XSS, SQL, etc)&lt;br /&gt;
* Basic and Ntml Bruteforcing  &lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
Some features are:&lt;br /&gt;
&lt;br /&gt;
* Encodings: 15 encodings supported&lt;br /&gt;
* All parameters attack: the tool will inject the payload in every parameter (Headers, Get, Post)&lt;br /&gt;
* Authentication: Webslayer supports Ntml and Basic authentication, also you can brute force the authentication&lt;br /&gt;
* Multiple payloads: you can use 2 paylods in different parts&lt;br /&gt;
* Proxy support (authentication supported)&lt;br /&gt;
* Live filters: You can change the filters as the attack is taking place&lt;br /&gt;
* Multiple threads: You can set how many threads to use in the attack&lt;br /&gt;
* Session import/export: Allows you to save the session and to continue working with the results&lt;br /&gt;
* Integrated web browser: a full fledge webkit browser is included to analyze the results&lt;br /&gt;
* Predefined dictionaries for predictable resource location, based on known servers (Thanks to Dark Raver, www.open-labs.org)&lt;br /&gt;
* Payload Generator (custom payload generator)&lt;br /&gt;
&lt;br /&gt;
===For Resource Location prediction, it supports:===&lt;br /&gt;
&lt;br /&gt;
* Recursion: When discovering directories, you can set how deep to go&lt;br /&gt;
* Non standard code error checking: Webslayer will detect NoN Standard Code, to avoid presenting trash results&lt;br /&gt;
* Extensions: You can add a list of extensions to try with a dictionary&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Results analysis==&lt;br /&gt;
&lt;br /&gt;
The power of Webslayer resides in the way you can work with the results, for every attack you will have all the responses, and for each ;&lt;br /&gt;
request you will have:&lt;br /&gt;
&lt;br /&gt;
* Html results&lt;br /&gt;
* Source code&lt;br /&gt;
* Headers&lt;br /&gt;
* Web browser view (it will replay the request via the browser)&lt;br /&gt;
&lt;br /&gt;
Multiple filters for improving the performance and for producing better results for the analyst&lt;br /&gt;
&lt;br /&gt;
* Return Code&lt;br /&gt;
* Characters length&lt;br /&gt;
* Words length&lt;br /&gt;
* Lines length&lt;br /&gt;
* MD5&lt;br /&gt;
* Regular expression&lt;br /&gt;
&lt;br /&gt;
Webslayer will maintain all the attacks in the session so you can work with them, compare, check later, etc.&lt;br /&gt;
&lt;br /&gt;
==Getting Started==&lt;br /&gt;
&lt;br /&gt;
===Downloading===&lt;br /&gt;
&lt;br /&gt;
At the moment WebSlayer is available only for Windows platform as an installable, the source code will be available in the next release.&lt;br /&gt;
You can download the latest version from Google Code, and the current version has no dependencies.&lt;br /&gt;
&lt;br /&gt;
===Installing===&lt;br /&gt;
&lt;br /&gt;
There is a basic installation needed, just double click, select destination folder and it's done.&lt;br /&gt;
&lt;br /&gt;
===Launching a basic attack===&lt;br /&gt;
&lt;br /&gt;
First of all, you must understand that the tool is based in replacing the Keyword &amp;quot;FUZZ&amp;quot; or &amp;quot;FUZ2Z&amp;quot; by the payload that you have chosen.&lt;br /&gt;
&lt;br /&gt;
So lets start  using the application for discovering directories in a website:&lt;br /&gt;
&lt;br /&gt;
* 1- In the Attack tab, insert the website URL that you want to brute force, with the keyword FUZZ in the end so WebSlayer will insert the content of the payload in that position. Eg:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://www.mysite.com/FUZZ&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
* 2- Next we are going to choose the payload type, we will leave &amp;quot;Dictionary&amp;quot;, and we are going to choose a dictionary file, in this case i recommend to use the file &amp;quot;common.txt&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* 3- Now click the &amp;quot;Start attack&amp;quot; button&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Contacting us==&lt;br /&gt;
&lt;br /&gt;
There are two ways of getting information on WebSlayer. The mailing list, and contacting the project lead directly.&lt;br /&gt;
&lt;br /&gt;
Mailing list: &amp;lt;a href=&amp;quot;https://lists.owasp.org/mailman/listinfo/owasp-webslayer-project&amp;quot;&amp;gt;https://lists.owasp.org/mailman/listinfo/owasp-webslayer-project&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For content which is not appropriate for the public mailing list, you can alternatively contact Christian Martorella, at [cmartorella] at the [edge-security.com] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==FAQ's==&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=45552</id>
		<title>Category:OWASP Webslayer Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Webslayer_Project&amp;diff=45552"/>
				<updated>2008-11-02T21:04:39Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Category:OWASP Project|Click here to return to OWASP Projects page.]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:Project Information:template Webslayer Project|Click here to see (&amp;amp; edit, if wanted) the template.]] &lt;br /&gt;
{{:Project Information:template Webslayer Project}}&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc. The tools has a payload generator and a easy and powerful results analyzer.&lt;br /&gt;
&lt;br /&gt;
It's possible to perform attacks like:&lt;br /&gt;
&lt;br /&gt;
* Predictable resource locator (File and directories discovery)&lt;br /&gt;
* Login forms brute force&lt;br /&gt;
* Session brute force&lt;br /&gt;
* Parameters brute force&lt;br /&gt;
* Parameter fuzzing and Injection (XSS, SQL, etc)&lt;br /&gt;
* Basic and Ntml Bruteforcing  &lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
Some features are:&lt;br /&gt;
&lt;br /&gt;
* Encodings: 15 encodings supported&lt;br /&gt;
* All parameters attack: the tool will inject the payload in every parameter (Headers, Get, Post)&lt;br /&gt;
* Authentication: Webslayer supports Ntml and Basic authentication, also you can brute force the authentication&lt;br /&gt;
* Multiple payloads: you can use 2 paylods in different parts&lt;br /&gt;
* Proxy support (authentication supported)&lt;br /&gt;
* Live filters: You can change the filters as the attack is taking place&lt;br /&gt;
* Multiple threads: You can set how many threads to use in the attack&lt;br /&gt;
* Session import/export: Allows you to save the session and to continue working with the results&lt;br /&gt;
* Integrated web browser: a full fledge webkit browser is included to analyze the results&lt;br /&gt;
* Predefined dictionaries for predictable resource location, based on known servers (Thanks to Dark Raver, www.open-labs.org)&lt;br /&gt;
* Payload Generator (custom payload generator)&lt;br /&gt;
&lt;br /&gt;
===For Resource Location prediction, it supports:===&lt;br /&gt;
&lt;br /&gt;
* Recursion: When discovering directories, you can set how deep to go&lt;br /&gt;
* Non standard code error checking: Webslayer will detect NoN Standard Code, to avoid presenting trash results&lt;br /&gt;
* Extensions: You can add a list of extensions to try with a dictionary&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Results analysis==&lt;br /&gt;
&lt;br /&gt;
The power of Webslayer resides in the way you can work with the results, for every attack you will have all the responses, and for each ;&lt;br /&gt;
request you will have:&lt;br /&gt;
&lt;br /&gt;
* Html results&lt;br /&gt;
* Source code&lt;br /&gt;
* Headers&lt;br /&gt;
* Web browser view (it will replay the request via the browser)&lt;br /&gt;
&lt;br /&gt;
Multiple filters for improving the performance and for producing better results for the analyst&lt;br /&gt;
&lt;br /&gt;
* Return Code&lt;br /&gt;
* Characters length&lt;br /&gt;
* Words length&lt;br /&gt;
* Lines length&lt;br /&gt;
* MD5&lt;br /&gt;
* Regular expression&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Webslayer will maintain all the attacks in the session so you can work with them, compare, check later, etc.&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Working_Session_Top_10_2009&amp;diff=44880</id>
		<title>OWASP Working Session Top 10 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Working_Session_Top_10_2009&amp;diff=44880"/>
				<updated>2008-10-27T21:13:38Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#b3b3b3; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Working Sessions Operational Rules''' - [[:Working Sessions Methodology|'''Please see here the general frame of rules''']].&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Work Session Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Top 10 2009'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Work Session Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Aims to provide a key awareness document for web application security.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects (if any)''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[[:Category:OWASP Top Ten Project|OWASP Top Ten Project]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Chair'''&amp;lt;br&amp;gt;[mailto:dave.wichers(at)owasp.org '''Dave Wichers''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secretary'''&amp;lt;br&amp;gt;[mailto:jeff.williams(at)owasp.org '''Jeff Williams''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp-topten '''Subscription Page''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
* Discuss current Top10 structure and objectives,&lt;br /&gt;
* Identify which information sources will be considered for analysis, Eg:&lt;br /&gt;
** MITRE&lt;br /&gt;
** Compromise DB's (Attrition, WASC etc) and bias due to reporting&lt;br /&gt;
** Anonomised penetration test results and the difficulty in obtaining&lt;br /&gt;
* Define methodology to collect attacks statistics,&lt;br /&gt;
* Define prioritisation approach&lt;br /&gt;
** Agree weighting between current or emerging threats&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue/Date&amp;amp;Time/Model'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue'''&amp;lt;br&amp;gt;[[:OWASP EU Summit 2008|OWASP EU Summit Portugal 2008]] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Date&amp;amp;Time'''&amp;lt;br&amp;gt;November 5 &amp;amp; 7, 2008&amp;lt;br&amp;gt;Time TBD&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Discussion Model'''&amp;lt;br&amp;gt;&amp;quot;Participants + Attendees&amp;quot;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION OPERATIONAL RESOURCES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Please add here, ASAP, any needed relevant resources, e.g. data-show, boards, laptops, etc.&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION ADDITIONAL DETAILS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Please add here, any additional notes, links, ideas, guidelines, etc... The objective is to help the working sessions participants and attendees to prepare their participation/contribution.&lt;br /&gt;
&lt;br /&gt;
Potential Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://cve.mitre.org/cve/ MITRE's Common Vulnerability Enumeration (CVE) Database]&lt;br /&gt;
&lt;br /&gt;
* The [http://www.webappsec.org/projects/whid/whid.shtml WASC Web Hacking Incidents Database]&lt;br /&gt;
&lt;br /&gt;
* The [http://www.webappsec.org/projects/statistics/ 2007 WASC Web Application Security Statistics Report]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|'''WORKING SESSION OUTCOMES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|Statements, Initiatives or Decisions &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Proposed by Working Group''' &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Approved by OWASP Board'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|The sources of input for the 2009 Top 10 will be identified.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|The ordering scheme for the Top 10 will be determined.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Discussion of whether the existing document structure should be maintained or adjusted.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
  |}&lt;br /&gt;
== Working Session Participants ==&lt;br /&gt;
(Add your name by editing this table. On the right, just above this frame, you have the option to edit)&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION PARTICIPANTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Name'''&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Company'''&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Notes &amp;amp; reason for participating, issues to be discussed/addressed'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|1&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Paolo Perego&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Spike Reply&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|As penetration tester it woud be great to me to participating in writing the new Top 10. As code reviewer and Orizon project leader it would be very interesting in scouting dynamic threats in order to add some dynamic feature to my tool.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|2&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|David Campbell&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Denver&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|3&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Robert Mann&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|RBS / ABN AMRO&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|4&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Troy Leach&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://www.pcisecuritystandards.org/ PCI Security Standards Council]&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Technical Director&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|5&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Eoin Keary&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Ernst &amp;amp; Young. Long time OWASP member (Code and Testing guides)&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|6&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Matteo Meucci&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Minded Security&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| I'd like to discuss about a new way to create the Top10 from the OWASP Community&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|7&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Giorgio Fedon&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Minded Security&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|8&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Andrea Cogliati&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Rochester, NY&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|I volunteered as a technical writer&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|9&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Christian Martorella&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|S21sec&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Interested in participating on the creating the Top 10, share some ideas.&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|10&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
If needed add here more lines.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Working_Session]]&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Working_Session_Winter_of_Code_2009&amp;diff=44879</id>
		<title>Working Session Winter of Code 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Working_Session_Winter_of_Code_2009&amp;diff=44879"/>
				<updated>2008-10-27T21:12:10Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#b3b3b3; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Working Sessions Operational Rules''' - [[:Working Sessions Methodology|'''Please see here the general frame of rules''']].&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Work Session Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Winter of Code 2009'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Work Session Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Aims to define the next OWASP Season of Code frame.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects (if any)''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
*[[:OWASP Summer of Code 2008|OWASP Summer of Code 2008]],&lt;br /&gt;
*[[:OWASP Spring Of Code 2007|OWASP Spring Of Code 2007]], &lt;br /&gt;
*[[:OWASP Autumn Of Code 2006|OWASP Autumn Of Code 2006]].&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Chair'''&amp;lt;br&amp;gt;[mailto:dinis.cruz(at)owasp.org '''Dinis Cruz'''], [mailto:seba(at)owasp.org '''Sebastien Deleersnyder'''] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secretary'''&amp;lt;br&amp;gt;[mailto:paulo.coimbra(at)owasp.org '''Paulo Coimbra''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp-winter-of-code-2009 '''Subscription Page''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
*  Define the operation model for the next OWASP Season of Code (the Winter of Code 08),&lt;br /&gt;
* Identify which areas should receive priority selection,&lt;br /&gt;
* Create 'virtual teams' from the attendees and allocate them to key projects,&lt;br /&gt;
* Discuss sponsoring models. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue/Date&amp;amp;Time/Model'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue'''&amp;lt;br&amp;gt;[[:OWASP EU Summit 2008|OWASP EU Summit Portugal 2008]] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Date&amp;amp;Time'''&amp;lt;br&amp;gt;November 4 &amp;amp; 7, 2008 &amp;lt;br&amp;gt;Time TBD&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Discussion Model'''&amp;lt;br&amp;gt;&amp;quot;Everybody is a Participant&amp;quot;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION OPERATIONAL RESOURCES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Please add here, ASAP, any needed relevant resources, e.g. data-show, boards, laptops, etc.&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION ADDITIONAL DETAILS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Please add here, any additional notes, links, ideas, guidelines, etc... The objective is to help the working sessions participants and attendees to prepare their participation/contribution&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|'''WORKING SESSION OUTCOMES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|Statements, Initiatives or Decisions &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Proposed by Working Group''' &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Approved by OWASP Board'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|Initiative &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Winter of Code 08 plan.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|Decision &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Set of projects for immediate approval (assuming the proposal is ready).&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Fill in here.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
  |}&lt;br /&gt;
== Working Session Participants ==&lt;br /&gt;
(Add you name by editing this table. On your the right, just above the this frame, you have the option to edit)&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION PARTICIPANTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Name'''&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Company'''&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Notes &amp;amp; reason for participating, issues to be discussed/addressed'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|1&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Eduardo Vianna de Camargo Neves&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Conviso IT Security&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Understand how we can help the initiative and participate to continue the Positive Security project.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|2&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Leonardo Cavallari Militelli&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|E-VAL Tecnologia&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Share feelings from other 2 season of code, discuss improvements for WoC and continue ASDR development.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|3&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Matt Tesauro&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Live CD 2008 Project Lead&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Discuss what worked and didn't work with the SoC.&amp;lt;br&amp;gt;  Give some input on how to spread the word about OWASP's XoC's&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|4&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Matteo Meucci&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Minded Security, OWASP Testing Guide&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Discuss new ideas about projects. Should OWASP says which projects develop?&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|5&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Carlo Pelliccioni&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Symantec, OWASP Backend Security Project&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Discuss about the next OWASP sponsorship to share new ideas.&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|6&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Christian Martorella&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Edge-Security, WebSlayer Project&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Interested in the topic&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|7&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|8&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|9&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|10&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
If needed add here more lines.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Working_Session]]&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Working_Session_-_OWASP_Certification&amp;diff=44878</id>
		<title>OWASP Working Session - OWASP Certification</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Working_Session_-_OWASP_Certification&amp;diff=44878"/>
				<updated>2008-10-27T21:09:01Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#b3b3b3; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Working Sessions Operational Rules''' - [[:Working Sessions Methodology|'''Please see here the general frame of rules''']].&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Work Session Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Certification'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Work Session Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|TBD&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects (if any)''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* [[:Category:OWASP Certification Requirements|OWASP Certification Requirements]]&lt;br /&gt;
* [[:Category:OWASP Certification Project|OWASP Certification Project]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Chair'''&amp;lt;br&amp;gt;[mailto:name(at)name '''TBD'''] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secretary'''&amp;lt;br&amp;gt;TBD&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/OWASP-cert '''Subscription Page''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
* Discuss and review current proposal and survey results,&lt;br /&gt;
* Identify risks of offering a certification program. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue/Date&amp;amp;Time/Model'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue'''&amp;lt;br&amp;gt;[[:OWASP EU Summit 2008|OWASP EU Summit Portugal 2008]] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Date&amp;amp;Time'''&amp;lt;br&amp;gt;November 5 &amp;amp; 7, 2008 &amp;lt;br&amp;gt;Time TBD&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Discussion Model'''&amp;lt;br&amp;gt;&amp;quot;Everybody is a Participant&amp;quot;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION OPERATIONAL RESOURCES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Please add here, ASAP, any needed relevant resources, e.g. data-show, boards, laptops, etc.&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION ADDITIONAL DETAILS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Please add here, any additional notes, links, ideas, guidelines, etc... The objective is to help the working sessions participants and attendees to prepare their participation/contribution.&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|'''WORKING SESSION OUTCOMES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|Statements, Initiatives or Decisions &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Proposed by Working Group''' &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Approved by OWASP Board'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Fill in here. &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Fill in here. &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
  |}&lt;br /&gt;
== Working Session Participants ==&lt;br /&gt;
(Add you name by editing this table. On your the right, just above the this frame, you have the option to edit)&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION PARTICIPANTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Name'''&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Company'''&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Notes &amp;amp; reason for participating, issues to be discussed/addressed'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|1&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Dinis Cruz&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| OWASP&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Want to share a number of ideas and see how I can help to make this happen&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|2&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Matteo Meucci&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Minded Security&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Thinking at the OWASP Certifications from many time. Would like to understand which kind of certification is better for the OWASP Community.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|3&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Rex Booth&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Grant Thornton&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Interest in the cert topic.&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|4&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Pavol Luptak&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Nethemba s.r.o.&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Interest in the cert topic.&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|5&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|David Campbell&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP &lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Cert skeptic&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|6&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Andrzej Targosz&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|PROIDEA&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Interest in the topic.&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|7&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Giorgio Fedon&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Minded Security&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Share Ideas and talking about the need for a Certification&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|8&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Esteban Ribicic&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|HP&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Interested on the topic&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|9&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Christian Martorella&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|S21sec&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Interested in the topic, and share ideas.&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|10&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
If needed add here more lines.&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Working_Session_-_OWASP_Tools_Projects&amp;diff=44391</id>
		<title>OWASP Working Session - OWASP Tools Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Working_Session_-_OWASP_Tools_Projects&amp;diff=44391"/>
				<updated>2008-10-22T15:28:17Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#b3b3b3; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Working Sessions Operational Rules''' - [[:Working Sessions Methodology|'''Please see here the general frame of rules''']].&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Work Session Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Tools Projects'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Work Session Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The working session for OWASP Tools will address standards for Tool development at OWASP. This is will include standards for documentation, supporting tools via Books, How-Tos, Webcasts, Podcasts. We will also dive deep into the OWASP Project Assessment.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects (if any)''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project|OWASP Tools Projects]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Chair'''&amp;lt;br&amp;gt;[mailto:mark.roxberry(at)owasp.org '''Mark Roxberry'''] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secretary'''&amp;lt;br&amp;gt;[mailto:mtesauro(at)gmail.com '''Matt Tesauro''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp-tools-projects '''Subscription Page''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
*  Discuss documentation procedures.&lt;br /&gt;
* Book creation procedure.&lt;br /&gt;
* Review OWASP Project Assessment.    &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue/Date&amp;amp;Time/Model'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue'''&amp;lt;br&amp;gt;[[:OWASP EU Summit 2008|OWASP EU Summit Portugal 2008]] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Date&amp;amp;Time'''&amp;lt;br&amp;gt;November 4 &amp;amp; 7, 2008 &amp;lt;br&amp;gt;Time TBD&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Discussion Model'''&amp;lt;br&amp;gt;&amp;quot;Participants + Attendees&amp;quot;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION OPERATIONAL RESOURCES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Please add here, ASAP, any needed relevant resources, e.g. data-show, boards, laptops, etc.&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION ADDITIONAL DETAILS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Please add here, any additional notes, links, ideas, guidelines, etc... The objective is to help the working sessions participants and attendees to prepare their participation/contribution.&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|'''WORKING SESSION OUTCOMES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|Statements, Initiatives or Decisions &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Proposed by Working Group''' &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Approved by OWASP Board'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Fill in here.  &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Fill in here.  &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
  |}&lt;br /&gt;
== Working Session Participants ==&lt;br /&gt;
(Add you name by editing this table. On your the right, just above the this frame, you have the option to edit)&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION PARTICIPANTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Name'''&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Company'''&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Notes &amp;amp; reason for participating, issues to be discussed/addressed'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|1&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Paulo Coimbra&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Has contributed to the current OWASP Assessment Criteria. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|2&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Rogan Dawes&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Corsaire&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|WebScarab lead &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|3&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Andrew Petukhov&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Moscow State University&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Access Control Rules Tester lead&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|4&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Christian Martorella&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Edge-Security&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|WebSlayer lead&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|5&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|6&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|7&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|8&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|9&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|10&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|11&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
If needed add here more lines.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Working_Session]]&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Webslayer_Project&amp;diff=44316</id>
		<title>Project Information:template Webslayer Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Webslayer_Project&amp;diff=44316"/>
				<updated>2008-10-21T18:35:20Z</updated>
		
		<summary type="html">&lt;p&gt;Cmartorella: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Webslayer Project'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| &lt;br /&gt;
WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding  not linked  resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password),  Fuzzing, etc.&lt;br /&gt;
&lt;br /&gt;
The tools has a payload generator and a easy and powerful results analyzer.&lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:cmartorella(at)edge-security.com '''Christian Martorella''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;[mailto:cdelojo(at)edge-security.com '''Carlos del Ojo''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-webslayer-project '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:owasp-webslayer-project@lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:andres@neurofuzz.com '''Andres Andreu''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:name(at)name '''TBD''']&amp;lt;br&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
[http://www.edge-security.com/webslayer.php- The tool's url]&lt;br /&gt;
&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''RELATED PROJECTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* If any, add link.&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Sponsor name, if applicable  &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[:Category:OWASP Webslayer Project Roadmap|'''Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''First Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Not yet''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Webslayer Project - First Review - Self Evaluation - A|See&amp;amp;Edit: First Review/SelfEvaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Not yet''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Webslayer Project - First Review - First Reviewer - B|See&amp;amp;Edit: First Review/1st Reviewer (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Webslayer Project - First Review - Second Reviewer - C|See&amp;amp;Edit: First Review/2nd Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Webslayer Project - First Review - OWASP Board Member - D|See/Edit: First Review/Board Member (D)]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Cmartorella</name></author>	</entry>

	</feed>