<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Conpap</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Conpap"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Conpap"/>
		<updated>2026-05-15T16:23:23Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Workshop_FinalV.pdf&amp;diff=239959</id>
		<title>File:OWASP Workshop FinalV.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Workshop_FinalV.pdf&amp;diff=239959"/>
				<updated>2018-04-16T21:43:52Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Greece&amp;diff=239958</id>
		<title>Greece</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Greece&amp;diff=239958"/>
				<updated>2018-04-16T21:27:52Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: /* Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Greekchapterlogo.gif]] &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Greece|extra=The chapter leader is [mailto:konstantinos@owasp.org Konstantinos Papapanagiotou]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-greece|emailarchives=http://lists.owasp.org/pipermail/owasp-greece}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Greece&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Greek Chapter Committee ==&lt;br /&gt;
&lt;br /&gt;
Chapter Leader: [mailto:conpapATowasp.gr Konstantinos Papapanagiotou]&lt;br /&gt;
&lt;br /&gt;
Committee Members: [mailto:manosATowasp.gr Emmanouel Kellinis], [mailto:steliosATowasp.gr Stelios Tigkas], [mailto:vsvlachosATowasp.gr Vasileios Vlachos]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Τι είναι το OWASP  ==&lt;br /&gt;
&lt;br /&gt;
Το ΟWASP (Open Web Application Security Project – http://www.owasp.org) αποτελεί μία πρωτοβουλία που αποσκοπεί στον εντοπισμό και στην καταπολέμηση των τρωτών σημείων του λογισμικού τέτοιων εφαρμογών. Όντας ένας μη κερδοσκοπικός οργανισμός, ακολουθεί την ιδεολογία του Ελεύθερου/Ανοικτού λογισμικού, παρέχοντας δωρεάν αλλά επαγγελματικής ποιότητας έγγραφα, εργαλεία και πρότυπα. Παράλληλα, ενισχύει τη διοργάνωση συνεδρίων και τοπικών ομάδων εργασίας (local chapters), τη δημοσίευση άρθρων και συγγραμμάτων, καθώς και την ανταλλαγή απόψεων μέσα από forums και mailing lists. Το OWASP απαριθμεί μέλη σε όλο τον πλανήτη, συμπεριλαμβανομένων μεγάλων οργανισμών και εταιριών του χώρου όπως VISA, Deloitte, Unisys, Foundstone, και άλλες. &lt;br /&gt;
&lt;br /&gt;
== Η Ελληνική Κοινότητα ==&lt;br /&gt;
&lt;br /&gt;
Η ελληνική ομάδα εργασίας του OWASP δημιουργήθηκε το 2005, με κύριο στόχο την ενημέρωση και την αφύπνιση της ελληνικής κοινότητας αναφορικά με τους κινδύνους ασφαλείας στις διαδικτυακές εφαρμογές. Αφορμή για τη δημιουργία της αποτέλεσαν ουσιαστικά τα ολοένα αυξανόμενα περιστατικά ασφαλείας στο διαδίκτυο, όπως τα κρούσματα phishing σε ελληνικές τράπεζες. &lt;br /&gt;
&lt;br /&gt;
Σήμερα, η ελληνική ομάδα του OWASP δραστηριοποιείται σε προγράμματα Ελεύθερου/Ανοικτού λογισμικού καθώς και μεταφράσεις κειμένων του OWASP στα ελληνικά, προωθώντας την ιδέα του OWASP σε τοπικό επίπεδο. Παράλληλα, μέσα από τη mailing list της ενημερώνει και προκαλεί συζητήσεις σχετικά με επίκαιρα θέματα ασφάλειας στο διαδίκτυο, ενώ εκδίδει και μηνιαίο newsletter.&lt;br /&gt;
&lt;br /&gt;
'''Η Ελληνική Ομάδα Εργασίας του OWASP χρησιμοποιεί για τις εκτυπώσεις της τον [http://www8.hp.com/in/en/products/printers/product-detail.html?oid=5261595#!tab=features HP Deskjet Ink Advantage 4625], επιτυγχάνοντας μεγάλη οικονομία στα μελάνια εκτύπωσης.'''&lt;br /&gt;
&lt;br /&gt;
== Συμμετοχή  ==&lt;br /&gt;
&lt;br /&gt;
Η ελληνική κοινότητα του OWASP επιθυμεί να φέρει σε επαφή όλους όσους ενδιαφέρονται και προβληματίζονται για την ασφάλεια των διαδικτυακών εφαρμογών. Ταυτόχρονα, ευπρόσδεκτοι είναι και εθελοντές που προτίθενται να δουλέψουν σε προγράμματα Ελεύθερου/Ανοιχτού λογισμικού που συντονίζει το OWASP. Σας προσκαλούμε να μοιραστείτε μαζί μας ιδέες, σκέψεις και προβληματισμούς σχετικά με επιθέσεις, μεθόδους άμυνας και αντιμετώπισης, εργαλεία και βέλτιστες πρακτικές ασφάλειας στο διαδίκτυο. Ανεξάρτητα από το τεχνικό επίπεδο, το βάθος της προσέγγισης και τις χρησιμοποιούμενες μεθόδους, θα χαρούμε ιδιαίτερα αν έρθετε σε επαφή μαζί μας. &lt;br /&gt;
&lt;br /&gt;
Για να εγγραφείτε στη '''mailing list''' της ελληνικής ομάδας εργασίας επισκεφθείτε [http://lists.owasp.org/mailman/listinfo/owasp-greece αυτή τη σελίδα]. &lt;br /&gt;
&lt;br /&gt;
== Ευχαριστίες  ==&lt;br /&gt;
&lt;br /&gt;
Θα θέλαμε να ευχαριστήσουμε το [http://www.di.uoa.gr Τμήμα Πληροφορικής και Τηλεπικοινωνιών] του Πανεπιστημίου Αθηνών για τη βοήθεια που παρέχει στην ελληνική ομάδα εργασίας. &lt;br /&gt;
&lt;br /&gt;
[[Image:Universityofathenslogo.gif]] &lt;br /&gt;
&lt;br /&gt;
Επίσης θα θέλαμε να ευχαριστήσουμε θερμά το περιοδικό [http://www.linuxinside.gr/ Linux Inside] για την υποστήριξη και την προβολή καθώς και το [http://www.zero.gr zero.gr].&lt;br /&gt;
&lt;br /&gt;
[[Image:Linuxinside-logo.png]] [[Image:zerologo.png]]&lt;br /&gt;
&lt;br /&gt;
==== News ====&lt;br /&gt;
&lt;br /&gt;
== Ομάδες Εργασίας  ==&lt;br /&gt;
&lt;br /&gt;
Αυτήν την περίοδο ψάχνουμε για νέες project ιδέες. Εάν έχεις καινούρια ίδεα για κάποιο εργαλείο, στατιστικά στοιχεία για το πόσο σοβαρά λαμβάνουν στην Ελλάδα το application security οι προγραμματιστές, εταιρίες λογισμικού κτλ ή αν έχεις οποιάδηποτε άλλη ιδέα με κεντρικό θέμα το application security επικοινωνήστε μαζί μας. &lt;br /&gt;
&lt;br /&gt;
== Νέα  ==&lt;br /&gt;
&lt;br /&gt;
'''16/3/2011''' - Η πρώτη συνάντηση θα πραγματοποιηθεί στο [http://www.colabworkspace.com/ CoLab Athens Workspace]. Περισσότερες πληφορορίες και εγγραφές [http://owaspgr01.eventbrite.com/ εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''20/9/2009''' - Ο [mailto:vsvlachosATowasp.gr Βασίλης Βλάχος], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, θα συντονίσει στις 26/9/2009 τη συνεδρία με θέμα Web Application Security που συνδιοργανώνει το OWASP.gr στα πλάισια του συνεδρίου 4th Mediterranean Conference on Information Systems ([http://www.mcis2009.org MCIS 2009]). Η συνεδρία θα πραγματοποιηθεί στις 26 Σεπτεμβρίου 2009 και ώρα 15:30 στο Οικονομικό Πανεπιστήμιο Αθηνών. &lt;br /&gt;
&lt;br /&gt;
'''5/3/2009''' - Ο [mailto:conpapATowasp.gr Κωνσταντίνος Παπαπαναγιώτου], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, θα συντονίσει στις 18 Μαρτίου την ενότητα &amp;quot;Πρότυπα και Νομικές Απαιτήσεις&amp;quot; στα πλαίσια της [http://www.tsomokos.gr/projects2.php EXPOSEC 2009], που διεξάγεται στις 17 και 18 Μαρτίου στο Ζάππειο Μέγαρο. &lt;br /&gt;
&lt;br /&gt;
'''3/2/2009''' - Ο [mailto:conpapATowasp.gr Κωνσταντίνος Παπαπαναγιώτου], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, έδωσε ζωντανή συνέντευξη στην εκπομπή Ατζέντα+ της ψηφιακής πλατφόρμας της ΕΡΤ (κανάλι Σπορ+/Info+), όπου μίλησε για τις δραστηριότητες του OWASP στην Ελλάδα και έδωσε απλές συμβουλές για την ασφάλεια στο Internet. Μπορείτε να παρακολουθήσετε το βίντεο της συνέντευξης [http://www.youtube.com/watch?v=q0RPKaPGICI εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''10/10/2008''' - Το OWASP.gr συμμετέχει στο Athens Digital Week που πραγματοποιείται από τις 13 ως τις 19 Οκτωβρίου στη Τεχνόπολη στο Γκάζι (http://conf.ellak.gr). &lt;br /&gt;
&lt;br /&gt;
'''30/9/2008''' - Το OWASP.gr παρουσιάζει το πρώτο Ελληνικό blog με θέμα την ασφάλεια των διαδικτυακών εφαρμογών αλλά και των υπολογιστικών συστημάτων γενικότερα. Επισκεφθείτε το επίσημο blog της Ελληνικής ομάδας εργασίας του OWASP στο: http://blog.owasp.gr. &lt;br /&gt;
&lt;br /&gt;
'''5/6/2008''' - Η παρουσίαση του OWASP.gr στο 3ο Συνέδριο ΕΛ/ΛΑΚ είναι διαθέσιμη μέσα από την ενότητα [https://www.owasp.org/index.php/OWASP_Education_Presentation#Chapter_Presentations Chapter Presentations] και συγκεκριμένα [http://www.owasp.org/images/e/e5/OWASP_ellak-Greece.ppt εδώ]. Επίσης, βίντεο της παρουσίασης μπορείτε να βρείτε [http://conf.ellak.gr/2008/index.php?option=com_eventlist&amp;amp;Itemid=119&amp;amp;func=details&amp;amp;did=19 εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''26/5/2008''' - Το OWASP.gr αναπτύσσει έναν Web Vulnerability Scanner. Μπορείτε να κατεβάσετε την beta έκδοσή του από [https://www.owasp.org/images/6/65/WVS_beta-0.2.1.zip εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''15/5/2008''' - Το OWASP.gr συμμετέχει στο 3ο Συνέδριο ΕΛ/ΛΑΚ που πραγματοποιείται στις 27 και 28 Μαΐου στο Εθνικό Μετσόβιο Πολυτεχνείο (http://conf.ellak.gr). &lt;br /&gt;
&lt;br /&gt;
'''20/2/2008''' - Το OWASP.gr συμμετέχει στο 1ο Συνέδριο Κοινοτήτων Ελεύθερου Λογισμικού/Λογισμικού Ανοιχτού Κώδικα που διοργανώνεται στις 21 και 22 Μαρτίου στο Εθνικό Μετσόβειο Πολυτεχνείο (http://www.fosscomm.gr/). &lt;br /&gt;
&lt;br /&gt;
'''2/2/2008''' - Το OWASP.gr συμμετέχει στην παρουσίαση της ομάδας IA4 του E-Business Forum (Προπαρασκευαστικές δράσεις για τη δημιουργία Ελληνικού Κέντρου Επείγουσας Αντιμετώπισης Ψηφιακών Απειλών GR-CERT) στα πλαίσια του Money Show 2008 στις 2/2/2008 στην Αίγλη Ζαππείου. &lt;br /&gt;
&lt;br /&gt;
'''18/4/2007''' - Το E-Βusiness Forum (http://www.ebusinessforum.gr/) έχει δημιουργήσει μία ομάδα εργασίας η οποία έχει αναλάβει τις &amp;quot;'''Προπαρασκευαστικές δράσεις για τη δημιουργία Ελληνικού Κέντρου Επείγουσας Αντιμετώπισης Ψηφιακών Απειλών (GR-CERT)'''&amp;quot;. Πληροφορίες σχετικά με τους στόχους και τις δραστηριότητες της ομάδας υπάρχουν [http://www.ebusinessforum.gr/teams/teamsall/view/index.php?ctn=102&amp;amp;language=el εδώ] αλλά και [http://sense.dmst.aueb.gr/ia4/index.php/Main_Page εδώ]. Όποιος ενδιαφέρεται και μπορεί να βοηθήσει να δηλώσει συμμετοχή στις παραπάνω σελίδες ή να απευθυνθεί στο κ. Βασίλειο Βλάχο (στοιχεία επικοινωνίας υπάρχουν στα παραπάνω site). &lt;br /&gt;
&lt;br /&gt;
Καταχωρήθηκε το [http://www.owasp.gr OWASP.gr]! &lt;br /&gt;
&lt;br /&gt;
Με τη βοήθεια του Αναστάσιου Καζακώνη μετέφράστηκαν το &amp;quot;OWASP Top Ten Vulnerabilties in Web Application Security&amp;quot; και το OWASP AppSec FAQ στα Ελληνικά. Έτσι είναι πλέον διαθέσιμες οι ελληνικές εκδόσεις του [http://www.owasp.org/images/8/8b/OWASP_Top_Ten_2004_Greek.pdf OWASP Top Ten] και του [http://www.owasp.org/images/e/ed/OWASP_faq_Greek.pdf OWASP AppSec FAQ]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meetings ====&lt;br /&gt;
&lt;br /&gt;
== Call for Presentations ==&lt;br /&gt;
Anything related to '''Application''' or '''Information Security'''&lt;br /&gt;
*Secure Coding Practices&lt;br /&gt;
*Secure Application Development Lifecycle&lt;br /&gt;
*Penetration Testing and Exploitation&lt;br /&gt;
*Code Reviewing&lt;br /&gt;
*Projects and Tools&lt;br /&gt;
*Methodologies&lt;br /&gt;
*Best Practices&lt;br /&gt;
&lt;br /&gt;
Send:&lt;br /&gt;
*Title&lt;br /&gt;
*Abstract&lt;br /&gt;
*Name and affiliation&lt;br /&gt;
*Short Bio&lt;br /&gt;
To: [mailto:konstantinos@owasp.org konstantinos@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== Meetings ==&lt;br /&gt;
&lt;br /&gt;
=== '''26/4/2018''' ===&lt;br /&gt;
Χώρος: Υπουργείο Ψηφιακής Πολιτικής / Φραγκούδη 11 &amp;amp; Αλεξάνδρου Πάντου, Καλλιθέα&lt;br /&gt;
&lt;br /&gt;
Περιγραφή: https://drive.google.com/file/d/1oPO_1VMcHTi_PjRaGTdDBH0OUxRVoqRA/view&lt;br /&gt;
&lt;br /&gt;
=== 23/2/2017 ===&lt;br /&gt;
Χώρος: Lambda Space / Θεσσαλονίκη&lt;br /&gt;
&lt;br /&gt;
Περιγραφή: https://www.facebook.com/events/1431147080237811&lt;br /&gt;
&lt;br /&gt;
* '''Securing your WebApp Workshop by OWASP''' - Antonis Manaras (OWASP) &lt;br /&gt;
&lt;br /&gt;
=== 19/4/2013 ===&lt;br /&gt;
Χώρος: PWC / Κηφισίας 260, Χαλάνδρι&lt;br /&gt;
&lt;br /&gt;
Περιγραφή: https://www.owasp.org/images/e/e0/Training_19.04.13_ISACA_OWASP.pdf&lt;br /&gt;
&lt;br /&gt;
* '''Being a spammer for 40 minutes: how spam works, why it's slowly going away and why it won't disappear''' - '''Martijn Grooten''' (Virus Bulletin) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 5/5/2011 ===&lt;br /&gt;
Χώρος: [http://www.di.uoa.gr/ Τμήμα Πληροφορικής και Τηλεπικοινωνιών/ΕΚΠΑ]&lt;br /&gt;
&lt;br /&gt;
Περιγραφή: http://owaspgr02.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
* '''Welcome and OWASP News''' - '''Konstantinos Papapanagiotou''' (OWASP Greek Chapter Leader/Syntax IT Inc) '''([[Media:OWASP_gr_meeting_2011_02.pdf‎|PDF]])'''&lt;br /&gt;
* '''Protecting the Core: Kernel Exploitation Mitigations''' - '''Patroklos Argyroudis and Dimitris Glynos''' (Census) '''([http://census.gr/media/bheu-2011-slides.pdf PDF])'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 16/3/2011 ===&lt;br /&gt;
Χώρος: [http://www.colabworkspace.com/ coLab Athens Workspace]&lt;br /&gt;
&lt;br /&gt;
Περιγραφή: http://owaspgr01.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
* '''Welcome and Intro to OWASP Meetings''' '''([[Media:OWASP_gr_meeting_2011_01_intro.pdf‎‎|PDF]])'''&lt;br /&gt;
* '''Application Security for the Masses''' - '''Konstantinos Papapanagiotou''' (OWASP Greek Chapter Leader/Syntax IT Inc) '''([[Media:OWASP gr meeting 2011 01 appsec masses.pdf|PDF]])'''&lt;br /&gt;
* '''Cyberdefense and the Kobayashi Maru''' - '''Yiorgos Adamopoulos''' (TEE) '''([[Media:Adamopoulos_Cyberdefense_and_the_Kobayashi_Maru.pdf‎|PDF]])'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Events ====&lt;br /&gt;
&lt;br /&gt;
'''26/9/2009''' - Το OWASP.gr συνδιοργανώνει ένα session με θέμα Web Application Security στα πλαίσια του 4th Mediterranean Conference on Information Systems ([http://www.mcis2009.org MCIS 2009]) στις 26 Σεπτεμβρίου 2009 και ώρα 15:30 στο Οικονομικό Πανεπιστήμιο Αθηνών. Το αναλυτικό πρόγραμμα του συνεδρίου καθώς και περισσότερες πληροφορίες υπάρχουν [http://www.mcis2009.org εδώ]. Το session θα συντονίζει ο [mailto:vsvlachosATowasp.gr Βασίλης Βλάχος], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα. &lt;br /&gt;
&lt;br /&gt;
'''18/3/2009''' - Συμμετοχή του OWASP.gr στην [http://www.tsomokos.gr/projects2.php EXPOSEC 2009] που θα πραγματοποιηθεί στις 17 και 18 Μαρτίου στο Ζάππειο Μέγαρο. Ο [mailto:conpapATowasp.gr Κωνσταντίνος Παπαπαναγιώτου], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, θα συντονίσει στις 18 Μαρτίου την ενότητα &amp;quot;Πρότυπα και Νομικές Απαιτήσεις&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
'''17 και 18/10/2008''' - Παρουσίαση του OWASP.gr στα πλαίσια του '''Athens Digital Week''' που πραγματοποιείται από τις 13 ως τις 19 Οκτωβρίου στην Τεχνόπολη στο Γκάζι (http://www.athensdigitalweek.gr). Σύμφωνα με το [http://www.athensdigitalweek.gr/el/the-core/talk-zone πρόγραμμα], η παρουσίαση θα γίνει την Παρασκευή, 17 Οκτωβρίου 2008 και ώρα 16:30 καθώς και το Σάββατο, 18 Οκτωβρίου 2008 και ώρα 18:00. &lt;br /&gt;
&lt;br /&gt;
'''27/5/2008''' - Παρουσίαση του OWASP.gr στα πλαίσια του '''3ου Συνεδρίου Ελεύθερου Λογισμικού / Λογισμικού Ανοιχτού Κώδικα''' που πραγματοποιείται στις 27 και 28 Μαΐου στο Εθνικό Μετσόβειο Πολυτεχνείο (http://conf.ellak.gr). Σύμφωνα με το [http://conf.ellak.gr/2008/index.php?option=com_jcalpro&amp;amp;Itemid=138&amp;amp;extmode=week&amp;amp;date=2008-05-25 πρόγραμμα] του συνεδρίου, η παρουσίαση θα γίνει την Τρίτη, 27 Μαΐου 2008 και ώρα 11:15. &lt;br /&gt;
&lt;br /&gt;
'''22/3/2008''' - Παρουσίαση του OWASP.gr στα πλαίσια του '''1ου Συνέδριο Κοινοτήτων Ελεύθερου Λογισμικού/Λογισμικού Ανοιχτού Κώδικα''' που διοργανώνεται στις 21 και 22 Μαρτίου στο Εθνικό Μετσόβειο Πολυτεχνείο (http://www.fosscomm.gr/). Σύμφωνα με το [http://www.fosscomm.gr/xoops20171/htdocs/uploads/programma_synedriou.html πρόγραμμα], η παρουσίαση θα γίνει στις 17:50. &lt;br /&gt;
&lt;br /&gt;
'''2/2/2008''' - Παρουσίαση της ομάδας IA4 του E-Business Forum (Προπαρασκευαστικές δράσεις για τη δημιουργία Ελληνικού Κέντρου Επείγουσας Αντιμετώπισης Ψηφιακών Απειλών GR-CERT) στα πλαίσια του '''Money Show 2008'''. &lt;br /&gt;
&lt;br /&gt;
==== Archive  ====&lt;br /&gt;
&lt;br /&gt;
== Μηνιαίο Ενημερωτικό Δελτίο  ==&lt;br /&gt;
&lt;br /&gt;
Καλώς ήλθατε στο μηνιαίο ενημερωτικό δελτίο της Ελληνικής ομάδας εργασίας του OWASP. Στόχος μας είναι η ενημέρωση γύρω από τα θέματα της ελληνικής επικαιρότητας που αφορούν στην ασφάλεια των εφαρμογών διαδικτύου αλλά και στην ασφάλεια γενικότερα. Αν και στο Internet υπάρχουν ήδη πολλές πηγές ενημέρωσης γύρω από θέματα ασφάλειας (π.χ. securityfocus, cryptogram, blogs, κλπ), αυτές επικεντρώνονται συνήθως στη διεθνή επικαιρότητα. Έτσι, μοιραία η ενημέρωση για τα security θέματα που αφορούν στην Ελλάδα προέρχεται από τα τοπικά ειδησεογραφικά site και μέσα. &lt;br /&gt;
&lt;br /&gt;
Με το μηνιαίο αυτό newsletter στοχεύουμε στην αποτύπωση των κυριότερων θεμάτων ασφάλειας που απασχολούν την Ελληνική επικαιρότητα κάθε μήνα, αλλά και σημαντικών νέων από τη διεθνή infosec επικαιρότητα που κρίνουμε πως πρέπει να σχολιάσουμε. Παράλληλα, θα υπάρχουν ενδιαφέροντα επιστημονικά θέματα αλλά και ενημέρωση γύρω από τη δραστηριότητα του OWASP. Το newsletter θα διαμοιράζεται μέσω της mailing list του OWASP.gr, ενώ ταυτόχρονα θα δημοσιεύεται και εδώ σε μορφή pdf. Υπεύθυνος για την έκδοσή του είναι ο συνεργάτης του OWASP.gr Γιάννης Αναστασόπουλος. &lt;br /&gt;
&lt;br /&gt;
Ελπίζουμε πως θα βρείτε το newsletter αυτό ενδιαφέρον και χρήσιμο. Φυσικά, βρίσκεται σε… εμβρυικό στάδιο. Για το λόγο αυτό κάθε συνεισφορά σας στη δημιουργία του θα ήταν ιδιαίτερα σημαντική, για να γίνει το newsletter πιο χρήσιμο για όλους. Έτσι, για οποιαδήποτε σχόλια, προσθήκες, προτάσεις, παρατηρήσεις ή συζητήσεις μπορείτε να απευθύνεστε στη mailing list του OWASP.gr ([mailto:owasp-greece@lists.owasp.org owasp-greece@lists.owasp.org]). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; [http://www.owasp.org/images/2/21/OWASP_gr_newsletter_1.pdf Ενημερωτικό Δελτίο νο1 - Δεκέμβριος 2006] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/0/0a/OWASP_gr_newsletter_2.pdf Ενημερωτικό Δελτίο νο2 - Ιανουάριος 2007] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/4/4e/OWASP_gr_newsletter_3.pdf Ενημερωτικό Δελτίο νο3 - Φεβρουάριος 2007] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/b/b1/OWASP_gr_newsletter_4.pdf Ενημερωτικό Δελτίο νο4 - Μάρτιος-Απρίλιος 2007] &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/1/11/OWASP_gr_newsletter_5.pdf Ενημερωτικό Δελτίο νο5 - Ιανουάριος 2008] &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/3/3f/OWASP_gr_newsletter_6.pdf Ενημερωτικό Δελτίο νο6 - Φεβρουάριος 2008] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Greece&amp;diff=227564</id>
		<title>Greece</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Greece&amp;diff=227564"/>
				<updated>2017-03-17T07:06:52Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: /* Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Greekchapterlogo.gif]] &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Greece|extra=The chapter leader is [mailto:konstantinos@owasp.org Konstantinos Papapanagiotou]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-greece|emailarchives=http://lists.owasp.org/pipermail/owasp-greece}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Greece&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Greek Chapter Committee ==&lt;br /&gt;
&lt;br /&gt;
Chapter Leader: [mailto:conpapATowasp.gr Konstantinos Papapanagiotou]&lt;br /&gt;
&lt;br /&gt;
Committee Members: [mailto:manosATowasp.gr Emmanouel Kellinis], [mailto:steliosATowasp.gr Stelios Tigkas], [mailto:vsvlachosATowasp.gr Vasileios Vlachos]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Τι είναι το OWASP  ==&lt;br /&gt;
&lt;br /&gt;
Το ΟWASP (Open Web Application Security Project – http://www.owasp.org) αποτελεί μία πρωτοβουλία που αποσκοπεί στον εντοπισμό και στην καταπολέμηση των τρωτών σημείων του λογισμικού τέτοιων εφαρμογών. Όντας ένας μη κερδοσκοπικός οργανισμός, ακολουθεί την ιδεολογία του Ελεύθερου/Ανοικτού λογισμικού, παρέχοντας δωρεάν αλλά επαγγελματικής ποιότητας έγγραφα, εργαλεία και πρότυπα. Παράλληλα, ενισχύει τη διοργάνωση συνεδρίων και τοπικών ομάδων εργασίας (local chapters), τη δημοσίευση άρθρων και συγγραμμάτων, καθώς και την ανταλλαγή απόψεων μέσα από forums και mailing lists. Το OWASP απαριθμεί μέλη σε όλο τον πλανήτη, συμπεριλαμβανομένων μεγάλων οργανισμών και εταιριών του χώρου όπως VISA, Deloitte, Unisys, Foundstone, και άλλες. &lt;br /&gt;
&lt;br /&gt;
== Η Ελληνική Κοινότητα ==&lt;br /&gt;
&lt;br /&gt;
Η ελληνική ομάδα εργασίας του OWASP δημιουργήθηκε το 2005, με κύριο στόχο την ενημέρωση και την αφύπνιση της ελληνικής κοινότητας αναφορικά με τους κινδύνους ασφαλείας στις διαδικτυακές εφαρμογές. Αφορμή για τη δημιουργία της αποτέλεσαν ουσιαστικά τα ολοένα αυξανόμενα περιστατικά ασφαλείας στο διαδίκτυο, όπως τα κρούσματα phishing σε ελληνικές τράπεζες. &lt;br /&gt;
&lt;br /&gt;
Σήμερα, η ελληνική ομάδα του OWASP δραστηριοποιείται σε προγράμματα Ελεύθερου/Ανοικτού λογισμικού καθώς και μεταφράσεις κειμένων του OWASP στα ελληνικά, προωθώντας την ιδέα του OWASP σε τοπικό επίπεδο. Παράλληλα, μέσα από τη mailing list της ενημερώνει και προκαλεί συζητήσεις σχετικά με επίκαιρα θέματα ασφάλειας στο διαδίκτυο, ενώ εκδίδει και μηνιαίο newsletter.&lt;br /&gt;
&lt;br /&gt;
'''Η Ελληνική Ομάδα Εργασίας του OWASP χρησιμοποιεί για τις εκτυπώσεις της τον [http://www8.hp.com/in/en/products/printers/product-detail.html?oid=5261595#!tab=features HP Deskjet Ink Advantage 4625], επιτυγχάνοντας μεγάλη οικονομία στα μελάνια εκτύπωσης.'''&lt;br /&gt;
&lt;br /&gt;
== Συμμετοχή  ==&lt;br /&gt;
&lt;br /&gt;
Η ελληνική κοινότητα του OWASP επιθυμεί να φέρει σε επαφή όλους όσους ενδιαφέρονται και προβληματίζονται για την ασφάλεια των διαδικτυακών εφαρμογών. Ταυτόχρονα, ευπρόσδεκτοι είναι και εθελοντές που προτίθενται να δουλέψουν σε προγράμματα Ελεύθερου/Ανοιχτού λογισμικού που συντονίζει το OWASP. Σας προσκαλούμε να μοιραστείτε μαζί μας ιδέες, σκέψεις και προβληματισμούς σχετικά με επιθέσεις, μεθόδους άμυνας και αντιμετώπισης, εργαλεία και βέλτιστες πρακτικές ασφάλειας στο διαδίκτυο. Ανεξάρτητα από το τεχνικό επίπεδο, το βάθος της προσέγγισης και τις χρησιμοποιούμενες μεθόδους, θα χαρούμε ιδιαίτερα αν έρθετε σε επαφή μαζί μας. &lt;br /&gt;
&lt;br /&gt;
Για να εγγραφείτε στη '''mailing list''' της ελληνικής ομάδας εργασίας επισκεφθείτε [http://lists.owasp.org/mailman/listinfo/owasp-greece αυτή τη σελίδα]. &lt;br /&gt;
&lt;br /&gt;
== Ευχαριστίες  ==&lt;br /&gt;
&lt;br /&gt;
Θα θέλαμε να ευχαριστήσουμε το [http://www.di.uoa.gr Τμήμα Πληροφορικής και Τηλεπικοινωνιών] του Πανεπιστημίου Αθηνών για τη βοήθεια που παρέχει στην ελληνική ομάδα εργασίας. &lt;br /&gt;
&lt;br /&gt;
[[Image:Universityofathenslogo.gif]] &lt;br /&gt;
&lt;br /&gt;
Επίσης θα θέλαμε να ευχαριστήσουμε θερμά το περιοδικό [http://www.linuxinside.gr/ Linux Inside] για την υποστήριξη και την προβολή καθώς και το [http://www.zero.gr zero.gr].&lt;br /&gt;
&lt;br /&gt;
[[Image:Linuxinside-logo.png]] [[Image:zerologo.png]]&lt;br /&gt;
&lt;br /&gt;
==== News ====&lt;br /&gt;
&lt;br /&gt;
== Ομάδες Εργασίας  ==&lt;br /&gt;
&lt;br /&gt;
Αυτήν την περίοδο ψάχνουμε για νέες project ιδέες. Εάν έχεις καινούρια ίδεα για κάποιο εργαλείο, στατιστικά στοιχεία για το πόσο σοβαρά λαμβάνουν στην Ελλάδα το application security οι προγραμματιστές, εταιρίες λογισμικού κτλ ή αν έχεις οποιάδηποτε άλλη ιδέα με κεντρικό θέμα το application security επικοινωνήστε μαζί μας. &lt;br /&gt;
&lt;br /&gt;
== Νέα  ==&lt;br /&gt;
&lt;br /&gt;
'''16/3/2011''' - Η πρώτη συνάντηση θα πραγματοποιηθεί στο [http://www.colabworkspace.com/ CoLab Athens Workspace]. Περισσότερες πληφορορίες και εγγραφές [http://owaspgr01.eventbrite.com/ εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''20/9/2009''' - Ο [mailto:vsvlachosATowasp.gr Βασίλης Βλάχος], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, θα συντονίσει στις 26/9/2009 τη συνεδρία με θέμα Web Application Security που συνδιοργανώνει το OWASP.gr στα πλάισια του συνεδρίου 4th Mediterranean Conference on Information Systems ([http://www.mcis2009.org MCIS 2009]). Η συνεδρία θα πραγματοποιηθεί στις 26 Σεπτεμβρίου 2009 και ώρα 15:30 στο Οικονομικό Πανεπιστήμιο Αθηνών. &lt;br /&gt;
&lt;br /&gt;
'''5/3/2009''' - Ο [mailto:conpapATowasp.gr Κωνσταντίνος Παπαπαναγιώτου], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, θα συντονίσει στις 18 Μαρτίου την ενότητα &amp;quot;Πρότυπα και Νομικές Απαιτήσεις&amp;quot; στα πλαίσια της [http://www.tsomokos.gr/projects2.php EXPOSEC 2009], που διεξάγεται στις 17 και 18 Μαρτίου στο Ζάππειο Μέγαρο. &lt;br /&gt;
&lt;br /&gt;
'''3/2/2009''' - Ο [mailto:conpapATowasp.gr Κωνσταντίνος Παπαπαναγιώτου], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, έδωσε ζωντανή συνέντευξη στην εκπομπή Ατζέντα+ της ψηφιακής πλατφόρμας της ΕΡΤ (κανάλι Σπορ+/Info+), όπου μίλησε για τις δραστηριότητες του OWASP στην Ελλάδα και έδωσε απλές συμβουλές για την ασφάλεια στο Internet. Μπορείτε να παρακολουθήσετε το βίντεο της συνέντευξης [http://www.youtube.com/watch?v=q0RPKaPGICI εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''10/10/2008''' - Το OWASP.gr συμμετέχει στο Athens Digital Week που πραγματοποιείται από τις 13 ως τις 19 Οκτωβρίου στη Τεχνόπολη στο Γκάζι (http://conf.ellak.gr). &lt;br /&gt;
&lt;br /&gt;
'''30/9/2008''' - Το OWASP.gr παρουσιάζει το πρώτο Ελληνικό blog με θέμα την ασφάλεια των διαδικτυακών εφαρμογών αλλά και των υπολογιστικών συστημάτων γενικότερα. Επισκεφθείτε το επίσημο blog της Ελληνικής ομάδας εργασίας του OWASP στο: http://blog.owasp.gr. &lt;br /&gt;
&lt;br /&gt;
'''5/6/2008''' - Η παρουσίαση του OWASP.gr στο 3ο Συνέδριο ΕΛ/ΛΑΚ είναι διαθέσιμη μέσα από την ενότητα [https://www.owasp.org/index.php/OWASP_Education_Presentation#Chapter_Presentations Chapter Presentations] και συγκεκριμένα [http://www.owasp.org/images/e/e5/OWASP_ellak-Greece.ppt εδώ]. Επίσης, βίντεο της παρουσίασης μπορείτε να βρείτε [http://conf.ellak.gr/2008/index.php?option=com_eventlist&amp;amp;Itemid=119&amp;amp;func=details&amp;amp;did=19 εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''26/5/2008''' - Το OWASP.gr αναπτύσσει έναν Web Vulnerability Scanner. Μπορείτε να κατεβάσετε την beta έκδοσή του από [https://www.owasp.org/images/6/65/WVS_beta-0.2.1.zip εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''15/5/2008''' - Το OWASP.gr συμμετέχει στο 3ο Συνέδριο ΕΛ/ΛΑΚ που πραγματοποιείται στις 27 και 28 Μαΐου στο Εθνικό Μετσόβιο Πολυτεχνείο (http://conf.ellak.gr). &lt;br /&gt;
&lt;br /&gt;
'''20/2/2008''' - Το OWASP.gr συμμετέχει στο 1ο Συνέδριο Κοινοτήτων Ελεύθερου Λογισμικού/Λογισμικού Ανοιχτού Κώδικα που διοργανώνεται στις 21 και 22 Μαρτίου στο Εθνικό Μετσόβειο Πολυτεχνείο (http://www.fosscomm.gr/). &lt;br /&gt;
&lt;br /&gt;
'''2/2/2008''' - Το OWASP.gr συμμετέχει στην παρουσίαση της ομάδας IA4 του E-Business Forum (Προπαρασκευαστικές δράσεις για τη δημιουργία Ελληνικού Κέντρου Επείγουσας Αντιμετώπισης Ψηφιακών Απειλών GR-CERT) στα πλαίσια του Money Show 2008 στις 2/2/2008 στην Αίγλη Ζαππείου. &lt;br /&gt;
&lt;br /&gt;
'''18/4/2007''' - Το E-Βusiness Forum (http://www.ebusinessforum.gr/) έχει δημιουργήσει μία ομάδα εργασίας η οποία έχει αναλάβει τις &amp;quot;'''Προπαρασκευαστικές δράσεις για τη δημιουργία Ελληνικού Κέντρου Επείγουσας Αντιμετώπισης Ψηφιακών Απειλών (GR-CERT)'''&amp;quot;. Πληροφορίες σχετικά με τους στόχους και τις δραστηριότητες της ομάδας υπάρχουν [http://www.ebusinessforum.gr/teams/teamsall/view/index.php?ctn=102&amp;amp;language=el εδώ] αλλά και [http://sense.dmst.aueb.gr/ia4/index.php/Main_Page εδώ]. Όποιος ενδιαφέρεται και μπορεί να βοηθήσει να δηλώσει συμμετοχή στις παραπάνω σελίδες ή να απευθυνθεί στο κ. Βασίλειο Βλάχο (στοιχεία επικοινωνίας υπάρχουν στα παραπάνω site). &lt;br /&gt;
&lt;br /&gt;
Καταχωρήθηκε το [http://www.owasp.gr OWASP.gr]! &lt;br /&gt;
&lt;br /&gt;
Με τη βοήθεια του Αναστάσιου Καζακώνη μετέφράστηκαν το &amp;quot;OWASP Top Ten Vulnerabilties in Web Application Security&amp;quot; και το OWASP AppSec FAQ στα Ελληνικά. Έτσι είναι πλέον διαθέσιμες οι ελληνικές εκδόσεις του [http://www.owasp.org/images/8/8b/OWASP_Top_Ten_2004_Greek.pdf OWASP Top Ten] και του [http://www.owasp.org/images/e/ed/OWASP_faq_Greek.pdf OWASP AppSec FAQ]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meetings ====&lt;br /&gt;
&lt;br /&gt;
== Call for Presentations ==&lt;br /&gt;
Anything related to '''Application''' or '''Information Security'''&lt;br /&gt;
*Secure Coding Practices&lt;br /&gt;
*Secure Application Development Lifecycle&lt;br /&gt;
*Penetration Testing and Exploitation&lt;br /&gt;
*Code Reviewing&lt;br /&gt;
*Projects and Tools&lt;br /&gt;
*Methodologies&lt;br /&gt;
*Best Practices&lt;br /&gt;
&lt;br /&gt;
Send:&lt;br /&gt;
*Title&lt;br /&gt;
*Abstract&lt;br /&gt;
*Name and affiliation&lt;br /&gt;
*Short Bio&lt;br /&gt;
To: [mailto:konstantinos@owasp.org konstantinos@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== Meetings ==&lt;br /&gt;
&lt;br /&gt;
=== 23/2/2017 ===&lt;br /&gt;
Χώρος: Lambda Space / Θεσσαλονίκη&lt;br /&gt;
&lt;br /&gt;
Περιγραφή: https://www.facebook.com/events/1431147080237811&lt;br /&gt;
&lt;br /&gt;
* '''Securing your WebApp Workshop by OWASP''' - Antonis Manaras (OWASP) &lt;br /&gt;
&lt;br /&gt;
=== 19/4/2013 ===&lt;br /&gt;
Χώρος: PWC / Κηφισίας 260, Χαλάνδρι&lt;br /&gt;
&lt;br /&gt;
Περιγραφή: https://www.owasp.org/images/e/e0/Training_19.04.13_ISACA_OWASP.pdf&lt;br /&gt;
&lt;br /&gt;
* '''Being a spammer for 40 minutes: how spam works, why it's slowly going away and why it won't disappear''' - '''Martijn Grooten''' (Virus Bulletin) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 5/5/2011 ===&lt;br /&gt;
Χώρος: [http://www.di.uoa.gr/ Τμήμα Πληροφορικής και Τηλεπικοινωνιών/ΕΚΠΑ]&lt;br /&gt;
&lt;br /&gt;
Περιγραφή: http://owaspgr02.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
* '''Welcome and OWASP News''' - '''Konstantinos Papapanagiotou''' (OWASP Greek Chapter Leader/Syntax IT Inc) '''([[Media:OWASP_gr_meeting_2011_02.pdf‎|PDF]])'''&lt;br /&gt;
* '''Protecting the Core: Kernel Exploitation Mitigations''' - '''Patroklos Argyroudis and Dimitris Glynos''' (Census) '''([http://census.gr/media/bheu-2011-slides.pdf PDF])'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 16/3/2011 ===&lt;br /&gt;
Χώρος: [http://www.colabworkspace.com/ coLab Athens Workspace]&lt;br /&gt;
&lt;br /&gt;
Περιγραφή: http://owaspgr01.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
* '''Welcome and Intro to OWASP Meetings''' '''([[Media:OWASP_gr_meeting_2011_01_intro.pdf‎‎|PDF]])'''&lt;br /&gt;
* '''Application Security for the Masses''' - '''Konstantinos Papapanagiotou''' (OWASP Greek Chapter Leader/Syntax IT Inc) '''([[Media:OWASP_gr_meeting_2011_01_appsec_masses.pdf|PDF]])'''&lt;br /&gt;
* '''Cyberdefense and the Kobayashi Maru''' - '''Yiorgos Adamopoulos''' (TEE) '''([[Media:Adamopoulos_Cyberdefense_and_the_Kobayashi_Maru.pdf‎|PDF]])'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Events ====&lt;br /&gt;
&lt;br /&gt;
'''26/9/2009''' - Το OWASP.gr συνδιοργανώνει ένα session με θέμα Web Application Security στα πλαίσια του 4th Mediterranean Conference on Information Systems ([http://www.mcis2009.org MCIS 2009]) στις 26 Σεπτεμβρίου 2009 και ώρα 15:30 στο Οικονομικό Πανεπιστήμιο Αθηνών. Το αναλυτικό πρόγραμμα του συνεδρίου καθώς και περισσότερες πληροφορίες υπάρχουν [http://www.mcis2009.org εδώ]. Το session θα συντονίζει ο [mailto:vsvlachosATowasp.gr Βασίλης Βλάχος], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα. &lt;br /&gt;
&lt;br /&gt;
'''18/3/2009''' - Συμμετοχή του OWASP.gr στην [http://www.tsomokos.gr/projects2.php EXPOSEC 2009] που θα πραγματοποιηθεί στις 17 και 18 Μαρτίου στο Ζάππειο Μέγαρο. Ο [mailto:conpapATowasp.gr Κωνσταντίνος Παπαπαναγιώτου], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, θα συντονίσει στις 18 Μαρτίου την ενότητα &amp;quot;Πρότυπα και Νομικές Απαιτήσεις&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
'''17 και 18/10/2008''' - Παρουσίαση του OWASP.gr στα πλαίσια του '''Athens Digital Week''' που πραγματοποιείται από τις 13 ως τις 19 Οκτωβρίου στην Τεχνόπολη στο Γκάζι (http://www.athensdigitalweek.gr). Σύμφωνα με το [http://www.athensdigitalweek.gr/el/the-core/talk-zone πρόγραμμα], η παρουσίαση θα γίνει την Παρασκευή, 17 Οκτωβρίου 2008 και ώρα 16:30 καθώς και το Σάββατο, 18 Οκτωβρίου 2008 και ώρα 18:00. &lt;br /&gt;
&lt;br /&gt;
'''27/5/2008''' - Παρουσίαση του OWASP.gr στα πλαίσια του '''3ου Συνεδρίου Ελεύθερου Λογισμικού / Λογισμικού Ανοιχτού Κώδικα''' που πραγματοποιείται στις 27 και 28 Μαΐου στο Εθνικό Μετσόβειο Πολυτεχνείο (http://conf.ellak.gr). Σύμφωνα με το [http://conf.ellak.gr/2008/index.php?option=com_jcalpro&amp;amp;Itemid=138&amp;amp;extmode=week&amp;amp;date=2008-05-25 πρόγραμμα] του συνεδρίου, η παρουσίαση θα γίνει την Τρίτη, 27 Μαΐου 2008 και ώρα 11:15. &lt;br /&gt;
&lt;br /&gt;
'''22/3/2008''' - Παρουσίαση του OWASP.gr στα πλαίσια του '''1ου Συνέδριο Κοινοτήτων Ελεύθερου Λογισμικού/Λογισμικού Ανοιχτού Κώδικα''' που διοργανώνεται στις 21 και 22 Μαρτίου στο Εθνικό Μετσόβειο Πολυτεχνείο (http://www.fosscomm.gr/). Σύμφωνα με το [http://www.fosscomm.gr/xoops20171/htdocs/uploads/programma_synedriou.html πρόγραμμα], η παρουσίαση θα γίνει στις 17:50. &lt;br /&gt;
&lt;br /&gt;
'''2/2/2008''' - Παρουσίαση της ομάδας IA4 του E-Business Forum (Προπαρασκευαστικές δράσεις για τη δημιουργία Ελληνικού Κέντρου Επείγουσας Αντιμετώπισης Ψηφιακών Απειλών GR-CERT) στα πλαίσια του '''Money Show 2008'''. &lt;br /&gt;
&lt;br /&gt;
==== Archive  ====&lt;br /&gt;
&lt;br /&gt;
== Μηνιαίο Ενημερωτικό Δελτίο  ==&lt;br /&gt;
&lt;br /&gt;
Καλώς ήλθατε στο μηνιαίο ενημερωτικό δελτίο της Ελληνικής ομάδας εργασίας του OWASP. Στόχος μας είναι η ενημέρωση γύρω από τα θέματα της ελληνικής επικαιρότητας που αφορούν στην ασφάλεια των εφαρμογών διαδικτύου αλλά και στην ασφάλεια γενικότερα. Αν και στο Internet υπάρχουν ήδη πολλές πηγές ενημέρωσης γύρω από θέματα ασφάλειας (π.χ. securityfocus, cryptogram, blogs, κλπ), αυτές επικεντρώνονται συνήθως στη διεθνή επικαιρότητα. Έτσι, μοιραία η ενημέρωση για τα security θέματα που αφορούν στην Ελλάδα προέρχεται από τα τοπικά ειδησεογραφικά site και μέσα. &lt;br /&gt;
&lt;br /&gt;
Με το μηνιαίο αυτό newsletter στοχεύουμε στην αποτύπωση των κυριότερων θεμάτων ασφάλειας που απασχολούν την Ελληνική επικαιρότητα κάθε μήνα, αλλά και σημαντικών νέων από τη διεθνή infosec επικαιρότητα που κρίνουμε πως πρέπει να σχολιάσουμε. Παράλληλα, θα υπάρχουν ενδιαφέροντα επιστημονικά θέματα αλλά και ενημέρωση γύρω από τη δραστηριότητα του OWASP. Το newsletter θα διαμοιράζεται μέσω της mailing list του OWASP.gr, ενώ ταυτόχρονα θα δημοσιεύεται και εδώ σε μορφή pdf. Υπεύθυνος για την έκδοσή του είναι ο συνεργάτης του OWASP.gr Γιάννης Αναστασόπουλος. &lt;br /&gt;
&lt;br /&gt;
Ελπίζουμε πως θα βρείτε το newsletter αυτό ενδιαφέρον και χρήσιμο. Φυσικά, βρίσκεται σε… εμβρυικό στάδιο. Για το λόγο αυτό κάθε συνεισφορά σας στη δημιουργία του θα ήταν ιδιαίτερα σημαντική, για να γίνει το newsletter πιο χρήσιμο για όλους. Έτσι, για οποιαδήποτε σχόλια, προσθήκες, προτάσεις, παρατηρήσεις ή συζητήσεις μπορείτε να απευθύνεστε στη mailing list του OWASP.gr ([mailto:owasp-greece@lists.owasp.org owasp-greece@lists.owasp.org]). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; [http://www.owasp.org/images/2/21/OWASP_gr_newsletter_1.pdf Ενημερωτικό Δελτίο νο1 - Δεκέμβριος 2006] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/0/0a/OWASP_gr_newsletter_2.pdf Ενημερωτικό Δελτίο νο2 - Ιανουάριος 2007] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/4/4e/OWASP_gr_newsletter_3.pdf Ενημερωτικό Δελτίο νο3 - Φεβρουάριος 2007] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/b/b1/OWASP_gr_newsletter_4.pdf Ενημερωτικό Δελτίο νο4 - Μάρτιος-Απρίλιος 2007] &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/1/11/OWASP_gr_newsletter_5.pdf Ενημερωτικό Δελτίο νο5 - Ιανουάριος 2008] &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/3/3f/OWASP_gr_newsletter_6.pdf Ενημερωτικό Δελτίο νο6 - Φεβρουάριος 2008] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2016_Ideas&amp;diff=209522</id>
		<title>GSoC2016 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2016_Ideas&amp;diff=209522"/>
				<updated>2016-02-24T07:14:16Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: Created page with &amp;quot;Oops! Typo! You can find the OWASP GSOC 2016 Ideas page here: https://www.owasp.org/index.php/GSOC2016_Ideas&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Oops! Typo!&lt;br /&gt;
You can find the OWASP GSOC 2016 Ideas page here: https://www.owasp.org/index.php/GSOC2016_Ideas&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2016_Ideas&amp;diff=209154</id>
		<title>GSOC2016 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2016_Ideas&amp;diff=209154"/>
				<updated>2016-02-18T07:09:40Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check the Hackademic wiki page linked above&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/Hackademic/hackademic github repository] and especially the [https://github.com/Hackademic/hackademic/issues open tickets]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Hackademic Challenges ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Hackademic Challenges Project]]  helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment. After a wonderfull 2014 GSoC with 100 new challenges and a couple of new plugins we're mainly looking to get new features in and maybe a couple of challenges. Bellow is a list of proposed features.&lt;br /&gt;
&lt;br /&gt;
=== REST API for the sandbox ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
During the last summer code sprint Hackademic got challenge sandboxing in the form of vagrant and docker wrappers as well as an engine to start and stop the container or vm instances.&lt;br /&gt;
What is needed now is a rest api which supports endpoint authentication and authorization which enables the sandbox engine to be completely independed from the rest of the project.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
Since the sandbox is written in python, you can use microframeworks such as flask to implement the api.&lt;br /&gt;
The endpoint authorization can be done via certificates or plain signature or username/password type authentication.&lt;br /&gt;
However the communication between the two has to be over a secure channel.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A REST style api which allows an authenticated remote entity control the sandbox engine.&lt;br /&gt;
* PEP8 compliant code&lt;br /&gt;
* Acceptable unit test coverage&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Python, test driven developmen, some idea what REST is, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== New CMS ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The CMS part of the project is really old and has accumulated a significant amount of technical debt.&lt;br /&gt;
In addition many design decisions are either outdated or could be improved. &lt;br /&gt;
Therefore it may be a good idea to leverage the power of modern web frameworks to create a new CMS.&lt;br /&gt;
The new cms can be written in php or python using any compoennts we agree are necesary and based on the framework we agree on.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* New cms with same functionality as the old one (3 types of users -- student, teacher, admin--, 3 types of resources -- article challenge, class--, ACL type permissions, CRUD operations on every resource/user, all functionality can be extended by Plugins.&lt;br /&gt;
* REST endpoints in addition to classic ones&lt;br /&gt;
* tests covering all routes implemented&lt;br /&gt;
* PSR/PEP 8 code&lt;br /&gt;
&lt;br /&gt;
''' Note: '''&lt;br /&gt;
This is a huge project, it is ok if the student implements a part of it. However whatever implemented must be up to spec.&lt;br /&gt;
If you decide to take on this project contact us and we can agree on a list of routes.&lt;br /&gt;
If you don't decide to take on this project contact us.&lt;br /&gt;
Generally contact us, we like it when students have insightful questions and the community is active&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python or PHP, the framework suggested, what REST is, the technologies used, some security knowledge would be nice.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== First Course Type Challenge ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
We have a wonderful sandbox engine which allows for complex guided challenges to be implemented.&lt;br /&gt;
We'd like to build a challenge that guides the user through a series of steps to an end goal and teaches more information on the subject matter on the way.&lt;br /&gt;
This is a very open-ended project on purpose to allow creative student to come up with nice ideas.&lt;br /&gt;
Bellow you will find some examples that we thought might be interesting.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
* Purposefully vulnerable web page that guides the user via javascript tooltips and hints to exploiting it using ZAP. ( Bonus: using ZAP via the ZAP api). The challenge is solved when the the student submits the contents of a text file located on the disk (obtained by exploited an RCE)&lt;br /&gt;
&lt;br /&gt;
* Reversing a provided binary to extract information by providing step by step instructions to reversing using any popular reversing tool (well, you can't use IDA so gdb should have to do). Challenge is solved when the keys are extracted from the binary and submitted. Bonus points if each binary donwloaded has different keys.&lt;br /&gt;
&lt;br /&gt;
* Guide to exploiting the TOP10. (Using ZAP?)&lt;br /&gt;
&lt;br /&gt;
* Defensive Type challenges -- Here's how to create a patch for this kind of vulnerability -- Challenge is solved when the unit tests are run and the vulnerability isn't there.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
* One or more Course - style challenges provided either as a docker container or as a vagrant box.&lt;br /&gt;
* Concrete documentation on how to build a challenge like this.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
The technologies used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== Advanced Sandboxed Challenges ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
In the spirit of the challenges above, we're looking for true ctf type challenges.&lt;br /&gt;
This is an open ended task. We're expecting awesome fresh ideas.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
* An application vulnerable to one or more TOP 10 elements.&lt;br /&gt;
* A logic flaws based ctf&lt;br /&gt;
* Your idea here&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
Docker containers or Vagrant boxes that contain complete new challenges.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Knowledge of the technologies used&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Amazing students, in our experience the best, most creative and unique ideas show up when we let students suggest their own feature in relation to the project.&lt;br /&gt;
The above should give you a general idea where we're going but don't let them constrain you.&lt;br /&gt;
Do you wanna do something that would fit into Hackademic? Send us an email!&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
No idea, that's your turn to shine!&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
If it's code, code according to our coding standards.&lt;br /&gt;
If it's challenges, something new and interesting.&lt;br /&gt;
If it's something else, then written like the person who's going to maintain your code is a raging psychopath with an axe who knows where you live.&lt;br /&gt;
&lt;br /&gt;
In short we'd like some quality. ;-)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - VMS - OWTF Vulnerability Management System ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Background problem to solve:&lt;br /&gt;
&lt;br /&gt;
We are trying to reduce the human work burden where there will be hundreds of issues listing apache out of date or php out of date. &lt;br /&gt;
&lt;br /&gt;
Proposed solution:&lt;br /&gt;
&lt;br /&gt;
We can meta aggregate these duplicate issues into one issue of &amp;quot;outdated software / apache / php detected&amp;quot;. with XYZ list of issues in them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A separate set of scripts that allows for grouping and management of vulnerabilities (i.e. think huge assessments), to be usable *both* from inside + outside of OWTF in a separate sub-repo here: https://github.com/owtf &lt;br /&gt;
&lt;br /&gt;
VMS will have the following features:&lt;br /&gt;
* Vulnerability correlation engine which will allow for quick identification of unique vulnerability and deduplication.&lt;br /&gt;
* Vulnerability table optimization : combining redundant vulnerabilities like example : PHP &amp;lt;5.1 , PHP &amp;lt; 5.2 , PHP &amp;lt; 5.3 all suggest upgrade php so if multiple issues are reported they should be combined.&lt;br /&gt;
* Integration with existing bug tracking system like example bugzilla, jira : Should not be too hard as all such system have one or the other method exposed (REST API or similar)&lt;br /&gt;
* Fix Validation : Since we integrate with bug tracking once dev fixed the bug and code deployed we can run specific checks via * OWTF or other tool (may be specific nessus or nexpose plugin or similar.)&lt;br /&gt;
* Management Dashboard : Could be exposed to Pentester, Higher Management where stats are shown with lesser details but more of high level overview.&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/null0x00/nessus-and-reporting-karma Similar previous work for Nessus]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - HTTP Request Translator Improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Problem to solve:&lt;br /&gt;
&lt;br /&gt;
There are many situations in web app pentests where just no tool will do the job and you need to script something, or mess around with the command line (classic example: sequence of steps where each step requires input from the previous step). In these situations, translating an HTTP request or a sequence of HTTP requests, takes valuable time which the pentester might just not really have.&lt;br /&gt;
&lt;br /&gt;
Proposed solution:&lt;br /&gt;
&lt;br /&gt;
An HTTP request translator, a *standalone* *tool* that can:&lt;br /&gt;
&lt;br /&gt;
1) Be used from inside OR outside of OWTF.&lt;br /&gt;
&lt;br /&gt;
2) Translate raw HTTP requests into curl commands or bash/python/php/ruby/PowerShell scripts&lt;br /&gt;
&lt;br /&gt;
3) Provide essential quick and dirty transforms: base64 (encode/decode), urlencode (encode/decode)&lt;br /&gt;
* Transforms with boundary strings? (TBD)&lt;br /&gt;
* Individually or in bulk? (TBD)&lt;br /&gt;
&lt;br /&gt;
'''Essential Function: &amp;quot;--output&amp;quot; argument'''&lt;br /&gt;
&lt;br /&gt;
CRITICAL: The command/script should be generated so that the request is sent as literally as possible.&lt;br /&gt;
&lt;br /&gt;
Example: NO client specific headers are sent. IF the original request had &amp;quot;User-Agent: X&amp;quot;, the generated command/script should have EXACTLY that (i.e. NOT a curl user agent, etc.). Obviously, the same applies to ALL other headers.&lt;br /&gt;
&lt;br /&gt;
NOTE: Ideally the following should be implemented using an extensible plugin architecture (i.e. NEW plugins are EASY to add)&lt;br /&gt;
* http request in =&amp;gt; curl command out&lt;br /&gt;
* http request in =&amp;gt; bash script out&lt;br /&gt;
* http request in =&amp;gt; python script out&lt;br /&gt;
* http request in =&amp;gt; php script out&lt;br /&gt;
* http request in =&amp;gt; ruby script out&lt;br /&gt;
* http request in =&amp;gt; PowerShell script out&lt;br /&gt;
&lt;br /&gt;
'''Basic additional arguments:'''&lt;br /&gt;
&lt;br /&gt;
- &amp;quot;--proxy&amp;quot; argument: generates the command/script with the relevant proxy option&lt;br /&gt;
&lt;br /&gt;
		NOTE: With this the command/script may send requests through a MiTM proxy (i.e. OWTF, ZAP, Burp, etc.)&lt;br /&gt;
&lt;br /&gt;
- &amp;quot;--string-search&amp;quot; argument: generates the command/script so that it:&lt;br /&gt;
&lt;br /&gt;
		1) performs the request&lt;br /&gt;
&lt;br /&gt;
		2) then searches for something in the response (i.e. literal match)&lt;br /&gt;
&lt;br /&gt;
- &amp;quot;--regex-search&amp;quot; argument: generates the command/script so that it:&lt;br /&gt;
		1) performs the request&lt;br /&gt;
&lt;br /&gt;
		2) then searches for something in the response (i.e. regex match)&lt;br /&gt;
&lt;br /&gt;
'''OWTF integration'''&lt;br /&gt;
&lt;br /&gt;
The idea here, is to invoke this tool from:&lt;br /&gt;
&lt;br /&gt;
1) Single HTTP transactions:&lt;br /&gt;
&lt;br /&gt;
For example, have a button to &amp;quot;export http request&amp;quot; + then show options equivalent to the flags&lt;br /&gt;
&lt;br /&gt;
2) Multiple HTTP transactions:&lt;br /&gt;
&lt;br /&gt;
Same as with Single transactions, but letting the user &amp;quot;select a number of transactions&amp;quot; first (maybe a checkbox?).&lt;br /&gt;
&lt;br /&gt;
		&lt;br /&gt;
'''Desired input formats:'''&lt;br /&gt;
&lt;br /&gt;
* Read raw HTTP request from stdin -Suggested default behaviour! :)-&lt;br /&gt;
&lt;br /&gt;
	Example: cat path/to/http_request.txt | http-request-translator.py --output&lt;br /&gt;
&lt;br /&gt;
* Interactive mode: read raw HTTP request from keyboard + &amp;quot;hit enter when ready&amp;quot;&lt;br /&gt;
&lt;br /&gt;
	Suggestion: This could be a &amp;quot;-i&amp;quot; (for &amp;quot;interactive&amp;quot;) flag and/or the fallback option when &amp;quot;stdin is empty&amp;quot;&lt;br /&gt;
&lt;br /&gt;
	Example:&lt;br /&gt;
&lt;br /&gt;
	1) User runs tool with desired flags (i.e. &amp;quot;--output ruby --proxy 127.0.0.1:1234 ...&amp;quot;, etc.)&lt;br /&gt;
&lt;br /&gt;
	2) Tool prints: &amp;quot;Please paste a raw HTTP request and hit enter when ready&amp;quot;&lt;br /&gt;
&lt;br /&gt;
	3) User pastes a raw HTTP requests + hits enter&lt;br /&gt;
&lt;br /&gt;
	4) Tool outputs whatever is relevant for the flags + http request given&lt;br /&gt;
&lt;br /&gt;
* For bulk processing: Maybe a directory of raw http request files?&lt;br /&gt;
&lt;br /&gt;
'''Nice to have: Transforms'''&lt;br /&gt;
&lt;br /&gt;
In the context of translating raw HTTP requests into commands/scripts, what we want here is to provide some handy &amp;quot;macros&amp;quot; so that the relevant command/script is generated accordingly.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&lt;br /&gt;
NOTE: Assume something like the following arguments: &amp;quot;--transform-boundary=@@@@@@@ --transform-language=php&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Step 1) The user provides a raw HTTP request like this:&lt;br /&gt;
&lt;br /&gt;
  GET /path/to/urlencode@@@@@@@abc d@@@@@@@/test&lt;br /&gt;
  Host: target.com&lt;br /&gt;
  ...&lt;br /&gt;
&lt;br /&gt;
Step 2) The tool generates a bash script like the following:&lt;br /&gt;
&lt;br /&gt;
  #!/bin/bash&lt;br /&gt;
  &lt;br /&gt;
  PARAM1=$(echo 'abc d' | php -r &amp;quot;echo urlencode(fgets(STDIN));&amp;quot;)&lt;br /&gt;
  curl ...... &amp;quot;http://target.com/path/to/$PARAM1/test&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OR a &amp;quot;curl command&amp;quot; like the following:&lt;br /&gt;
  PARAM1=$(echo 'abc d' | php -r &amp;quot;echo urlencode(fgets(STDIN));&amp;quot;); curl ...... &amp;quot;http://target.com/path/to/$PARAM1/test&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This feature can be valuable to shave a bit more time in script writing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - JavaScript Library Sniper Improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
This is a project that tries to resolve a very common problem during penetration tests:&lt;br /&gt;
&lt;br /&gt;
The customer is running a number of outdated JavaScript Libraries, but there is just not enough time to determine if something useful -i.e. something *really* bad! :)- can be done with that or not.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To solve this problem, we propose a *standalone* *tool* that can:&lt;br /&gt;
&lt;br /&gt;
1) Be run BOTH from inside AND outside of OWTF&lt;br /&gt;
&lt;br /&gt;
2) Build and *update* a fingerprint JavaScript library database of:&lt;br /&gt;
* Library File hashes =&amp;gt; JavaScript Library version&lt;br /&gt;
* Library File lengths =&amp;gt; JavaScript Library version&lt;br /&gt;
* (Nice to have:) As above, but for each individual github commit (possible drawback: too big?)&lt;br /&gt;
&lt;br /&gt;
3) Build and *update* a vulnerability database of:&lt;br /&gt;
* JavaScript Library version =&amp;gt; CVE - CVSS score - Vulnerability info&lt;br /&gt;
&lt;br /&gt;
4) Given a [ JavaScript file OR hash OR length ], found in the database, provides:&lt;br /&gt;
* JavaScript Library version&lt;br /&gt;
* List of vulnerabilities sorted in descending CVSS score order&lt;br /&gt;
&lt;br /&gt;
5) (very cool to have) Given a list of JavaScript files (maybe a directory), provides:&lt;br /&gt;
* ALL Library/vulnerability matches described on 4)&lt;br /&gt;
	&lt;br /&gt;
Once the standalone tool is built and verified to be working, OWTF should be able to:&lt;br /&gt;
&lt;br /&gt;
Feature 1) GREP plugin improvement (Web Application Fingerprint):&lt;br /&gt;
&lt;br /&gt;
Step 1) Lookup file lengths and hashes in the &amp;quot;JavaScript library database&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Step 2) If a match is found: provide the list of known vulnerabilities against &amp;quot;JavaScript library X&amp;quot; to the user&lt;br /&gt;
&lt;br /&gt;
Feature 2) SEMI-PASSIVE plugin improvement (Web Application Fingerprint):&lt;br /&gt;
&lt;br /&gt;
1) Requests all referenced BUT missing JavaScript files -i.e. scanners won't load JavaScript files! :)-&lt;br /&gt;
&lt;br /&gt;
2) re-runs the GREP plugin on the new files (i.e. to avoid missing vulns due to unrequested JavaScript files)&lt;br /&gt;
&lt;br /&gt;
Potential projects worth having a look for potential overlap/inspiration:&lt;br /&gt;
* [https://owasp.org/index.php/OWASP_Dependency_Check OWASP Dependency Check?]&lt;br /&gt;
&lt;br /&gt;
How many JavaScript libraries should be included?&lt;br /&gt;
* As many as possible, but especially the major ones: jQuery, knockout, etc.&lt;br /&gt;
* &amp;quot;Nirvana&amp;quot; Nice to have: ALL Individual versions of ALL JavaScript files from ALL opensource projects, (ideally) even if the project is not a JavaScript library -i.e. JavaScript files from Joomla, Wordpress, etc.-&lt;br /&gt;
&lt;br /&gt;
Common JavaScript library fingerprinting techniques include:&lt;br /&gt;
* Parse the JavaScript file and grab the version from there&lt;br /&gt;
* Determine the JavaScript version based on a hash of the file&lt;br /&gt;
* Determine the JavaScript version based on the length of the file&lt;br /&gt;
&lt;br /&gt;
Other Challenges:&lt;br /&gt;
* &amp;quot;the file&amp;quot; could be &amp;quot;the minimised file&amp;quot;, &amp;quot;the expanded file&amp;quot; or even &amp;quot;a specific JavaScript file from Library X&amp;quot;&lt;br /&gt;
* When the JavaScript file does not match a specific version:&lt;br /&gt;
	1) The commit that matches the closest should (ideally) be found&lt;br /&gt;
	2) The NEXT library version after that commit (if present) should be found&lt;br /&gt;
	3) From there, it is about reusing the knowledge to figure out public vulnerabilities, CVSS scores, etc. again&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Health Monitor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
In some cases, especially on large assessments (think: &amp;gt; 30 URLs) a number of things often go wrong and OWTF needs to recover from everything, which is difficult.&lt;br /&gt;
&lt;br /&gt;
For this reason, OWTF needs an independent module, which is completely detached from OWTF (a different process), to ensure the health of the assessment is in check at all times, this includes the following:&lt;br /&gt;
&lt;br /&gt;
'''Feature 1) Alerting mechanisms'''&lt;br /&gt;
&lt;br /&gt;
When any of the monitor alerts (see below) is triggered. The OWTF user will be notified immediately through ALL of the following means:&lt;br /&gt;
* Playing an mp3 song (both local and possibly remote locations)&lt;br /&gt;
* Scan status overview on the CLI&lt;br /&gt;
* Scan status overview on the GUI&lt;br /&gt;
&lt;br /&gt;
NOTE: A configuration file from where the user can enable/disable/configure all these mechanisms is desired.&lt;br /&gt;
&lt;br /&gt;
'''Feature 2) Corrective mechanisms'''&lt;br /&gt;
&lt;br /&gt;
Corrective mechanisms are also expected in this project, these will be accomplished sending OWTF api messages such as:&lt;br /&gt;
* Stop this tool&lt;br /&gt;
* Freeze this process (to continue later)&lt;br /&gt;
* Freeze the whole scan (to continue later)&lt;br /&gt;
&lt;br /&gt;
Additional mechanisms:&lt;br /&gt;
* Show a ranking of files that take the most space&lt;br /&gt;
&lt;br /&gt;
'''Feature 3) Target monitor'''&lt;br /&gt;
&lt;br /&gt;
Brief overview:&lt;br /&gt;
&lt;br /&gt;
All target URLs are checked for availability periodically (i.e. once x 5 minutes?), if a URL in scope goes down the pentester is alerted (see above).&lt;br /&gt;
&lt;br /&gt;
Potential approach: Check if length of 1st page changes every 60 seconds.&lt;br /&gt;
&lt;br /&gt;
NOTE: It might be needed to change this on the fly.&lt;br /&gt;
&lt;br /&gt;
More background&lt;br /&gt;
&lt;br /&gt;
Consider the following scenario:&lt;br /&gt;
&lt;br /&gt;
Current Situation aka &amp;quot;problem to solve&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
1) Website X goes down during a scan&lt;br /&gt;
&lt;br /&gt;
2) the customer notices&lt;br /&gt;
&lt;br /&gt;
3) the customer tells the boss&lt;br /&gt;
&lt;br /&gt;
4) the boss tells the pentester&lt;br /&gt;
&lt;br /&gt;
5) the pentester stops the tool which was *still* trying to scan THAT target (!!!!)&lt;br /&gt;
&lt;br /&gt;
Desired situation aka &amp;quot;solution&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
It would be much more professional AND efficient that:&lt;br /&gt;
&lt;br /&gt;
1) The pentester notices&lt;br /&gt;
&lt;br /&gt;
2) The pentester tells the boss&lt;br /&gt;
&lt;br /&gt;
3) The boss tells the customer&lt;br /&gt;
&lt;br /&gt;
4) OWTF stops the tool because it knows that website is DEAD anyway&lt;br /&gt;
&lt;br /&gt;
A target monitor could easily do this with heartbeat requests + playing mp3s&lt;br /&gt;
&lt;br /&gt;
The target monitor will use the api to tell OWTF &amp;quot;this target is dead: freeze(stop?) current tests, skip target in future tests&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Feature 4) Disk space monitor'''&lt;br /&gt;
&lt;br /&gt;
Another problem that is relatively common in large assessments, is that all disk space is used and the scanning box becomes unresponsive or crashes. When this happens it is too late, the pentester may also see this coming but wonder “which are the biggest files in the filesystem that I can delete”, it is not ideal to have to look for these files in a moment when the scanning box is about to crash :).&lt;br /&gt;
&lt;br /&gt;
Proposed solution:&lt;br /&gt;
&lt;br /&gt;
Regularly monitor how much disk space is left, especially on the partition where OWTF is writing the review (but also tool directories such as /home/username/.w3af/tmp, etc.). Keep track of files created by OWTF and all called tools and sort them by size in descending order. Then when the disk space is going low (i.e. predefined threshold), an mp3 or similar is played and this list is displayed to the user, so that they know what to delete to survive :).&lt;br /&gt;
&lt;br /&gt;
'''Feature 5) Network/Internet Connectivity monitor'''&lt;br /&gt;
&lt;br /&gt;
Sometimes it may also happen that ISP, etc. connectivity go down in the middle of a scan, this is often a very unfortunate situation since most tools are scanning in parallel and they won’t be able to produce a report OR even resume (i.e. A LOT is lost). The goal here is that OWTF does all of the following automatically:&lt;br /&gt;
&lt;br /&gt;
1) Detects the lack of connectivity&lt;br /&gt;
&lt;br /&gt;
2) Freezes all the tools (read: processes) in progress&lt;br /&gt;
&lt;br /&gt;
3) Resumes the scan when the connectivity is back.&lt;br /&gt;
&lt;br /&gt;
'''Feature 6) Tool crash detection'''&lt;br /&gt;
&lt;br /&gt;
Sometimes, certain tools (most notably, ahem, w3af), when they crash they do NOT exit. This leaves OWTF in a difficult position where 1+ process is waiting for nothing, forever (i.e. because “Tool X” will never finish)&lt;br /&gt;
&lt;br /&gt;
'''Feature 7) Tool (Plugin?) CPU/RAM/Bandwidth abuse detection and correction'''&lt;br /&gt;
&lt;br /&gt;
OWTF needs to notice when some tools crash and/or “go beserk” with RAM/CPU/Bandwidth consumption, this is different from the existing built-in checks in OWTF like “do not launch a new tool if there is less than XYZ RAM free” and more like “if tool X is using &amp;gt; XYZ of the available RAM/CPU/Bandwidth” and this is (potentially) negatively affecting other tools/tests, then throttle it.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Installation Improvements and Package manager ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
This project is to implement what was suggested in the following github issue:&lt;br /&gt;
[https://github.com/owtf/owtf/issues/192 https://github.com/owtf/owtf/issues/192]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Recently i tried to make a fresh installation of OWTF. The installation process takes too much time. Is there any way to make the installation faster?&lt;br /&gt;
Having a private server with:&lt;br /&gt;
* pre-installed files for VMs&lt;br /&gt;
* pre-configured and patched tools&lt;br /&gt;
* Merged Lists&lt;br /&gt;
* Pre-configured certificates&lt;br /&gt;
Additionally a minimal installation which will install the core of OWTF with the option of update can increase the installation speed. The update procedure will start fetching the latest file versions from the server and copy them to the right path.&lt;br /&gt;
Additional ideas are welcome.&lt;br /&gt;
&lt;br /&gt;
-- They could be hosted on Dropbox or a private VPS :)&lt;br /&gt;
&lt;br /&gt;
2 Installation Modes&lt;br /&gt;
* For high speed connections (Downloading the files uncompressed)&lt;br /&gt;
* For low speed connections (Downloading the files compressed)&lt;br /&gt;
and the installation crashed because i runned out of space in the vm&lt;br /&gt;
IMPORTANT NOTE: OWTF should check the available disk space BEFORE installation starts + warn the user if problems are likely&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* Excellent reliability (i.e. proper exception handling, etc.)&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Testing Framework Improvements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
As OWASP OWTF grows it makes sense to build custom unit tests to automatically re-test that functionality has not been broken. In this project we would like to improve the existing unit testing framework so that creating OWASP OWTF unit tests is as simple as possible and all missing tests for new functionality are created. The goal of this project is to update the existing Unit Test Framework to create all missing tests as well as improve the existing ones to verify OWASP OWTF functionality in an automated fashion.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Top features'''&lt;br /&gt;
&lt;br /&gt;
In this improvement phase, the Testing Framework should:&lt;br /&gt;
* (Top Prio) Focus more on functional tests&lt;br /&gt;
For example: Improve coverage of OWASP Testing Guide, PTES, etc. (lots of room for improvement there!)&lt;br /&gt;
* (Top Prio) Put together a great wiki documentation section for contributors&lt;br /&gt;
The goal here is to help contributors write tests for the functionality that they implement. This should be as easy as possible.&lt;br /&gt;
* (Top Prio) Fix the current Travis issues :)&lt;br /&gt;
* (Nice to have) Bring the unit tests up to speed with the codebase&lt;br /&gt;
This will be challenging but very worth trying after top priorities.&lt;br /&gt;
The wiki should be heavily updated so that contributors create their own unit tests easily moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''General background'''&lt;br /&gt;
&lt;br /&gt;
The Unit Test Framework should be able to:&lt;br /&gt;
* Define test categories: For example, &amp;quot;all plugins&amp;quot;, &amp;quot;web plugins&amp;quot;, &amp;quot;aux plugins&amp;quot;, &amp;quot;test framework core&amp;quot;, etc. (please see [http://www.slideshare.net/abrahamaranguren/introducing-owasp-owtf-workshop-brucon-2012 this presentation] for more background)&lt;br /&gt;
* Allow to regression test isolated plugins (i.e. &amp;quot;only test _this_ plugin&amp;quot;)&lt;br /&gt;
* Allow to regression test by test categories (i.e. &amp;quot;test only web plugins&amp;quot;)&lt;br /&gt;
* Allow to regression test everything (i.e. plugins + framework core: &amp;quot;test all&amp;quot;)&lt;br /&gt;
* Produce meaningful statistics and easy to navigate logs to identify which tests failed and ideally also hints on how to potentially fix the problem where possible&lt;br /&gt;
* Allow for easy creation of _new_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Allow for easy modification and maintenance of _existing_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Perform well so that we can run as many tests as possible in a given period of time&lt;br /&gt;
* Potentially leverage the python unittest library: [http://docs.python.org/2/library/unittest.html http://docs.python.org/2/library/unittest.html]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* Performant and automated regression testing&lt;br /&gt;
* Unit tests for a wide coverage of OWASP OWTF, ideally leveraging the Unit Test Framework where possible&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with unit tests and automated regression testing would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Tool utilities module ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The spirit of this feature is something that may or may not be used from OWTF: These are utilities that may be chained together by OWTF OR a penetration tester using the command line. The idea is to automate mundane tasks that take time but may provide a lever to a penetration tester short on time.&lt;br /&gt;
&lt;br /&gt;
'''Feature 1) Vulnerable software version database:'''&lt;br /&gt;
&lt;br /&gt;
Implement a searchable vulnerable software version database so that a penetration tester enters a version and gets vulnerabilities sorted by criticality with MAX Impact vulnerabilities at the top (possibly: CVSS score in DESC order).&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
[http://www.cvedetails.com/vulnerability-list.php?vendor_id=74&amp;amp;product_id=128&amp;amp;version_id=149817&amp;amp;page=1&amp;amp;hasexp=0&amp;amp;opdos=0&amp;amp;opec=0&amp;amp;opov=0&amp;amp;opcsrf=0&amp;amp;opgpriv=0&amp;amp;opsqli=0&amp;amp;opxss=0&amp;amp;opdirt=0&amp;amp;opmemc=0&amp;amp;ophttprs=0&amp;amp;opbyp=0&amp;amp;opfileinc=0&amp;amp;opginf=0&amp;amp;cvssscoremin=0&amp;amp;cvssscoremax=0&amp;amp;year=0&amp;amp;month=0&amp;amp;cweid=0&amp;amp;order=3&amp;amp;trc=17&amp;amp;sha=0d26af6f3ba8ea20af18d089df40c252ea09b711 Vulnerabilities against specific software version]&lt;br /&gt;
&lt;br /&gt;
'''Feature 2) Nmap output file merger:'''&lt;br /&gt;
&lt;br /&gt;
Unify nmap files *without* losing data: XML, text and greppable formats&lt;br /&gt;
For example: Sometimes 2 scans pass through the same port, one returns the server version, the other does not, we obviously do not want to lose banner information :).&lt;br /&gt;
&lt;br /&gt;
'''Feature 3) Nmap output file vulnerability mapper'''&lt;br /&gt;
&lt;br /&gt;
From an nmap output file, get the unique software version banners, and provide a list of (maybe in tabs?):&lt;br /&gt;
&lt;br /&gt;
1) CVEs in reverse order of CVSS score, with links.&lt;br /&gt;
&lt;br /&gt;
2) Metasploit modules available for each CVE / issue&lt;br /&gt;
&lt;br /&gt;
NOTE: Can supply an *old* shell script for reference&lt;br /&gt;
&lt;br /&gt;
3) Servers/ports affected (i.e. all server / port combinations using that software version)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Feature 4) URL target list creator:'''&lt;br /&gt;
&lt;br /&gt;
Turn all “speaks http” ports (from any nmap format) into a list of URL targets for OWTF&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Feature 5) Hydra command creator:'''&lt;br /&gt;
&lt;br /&gt;
nmap file in =&amp;gt; Hydra command list out&lt;br /&gt;
&lt;br /&gt;
grep http auth / login pages in output files to identify login interfaces =&amp;gt; Hydra command list out&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Feature 6) WP-scan command creator:'''&lt;br /&gt;
&lt;br /&gt;
look at all URLs (i.e. nmap file), check if they might be running word press, generate a list of suggested wp-scan commands for all targets that might be running word press&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* Excellent reliability (i.e. proper exception handling, etc.)&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with unit tests and automated regression testing would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren, Bharadwaj Machiraju - OWASP OWTF Project Leaders - Contact: Abraham.Aranguren@owasp.org, bharadwaj.machiraju@gmail.com&lt;br /&gt;
&lt;br /&gt;
''' OWASP Mentors '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
We are in the process of deciding the set of ZAP projects for Google Summer of Code 2015.&lt;br /&gt;
&lt;br /&gt;
You can follow (and join in) the discussions on the ZAP Developer Group: https://groups.google.com/d/msg/zaproxy-develop/Uy0JPkzsI_s/Bj7OTSkISCIJ&lt;br /&gt;
&lt;br /&gt;
=== Example Idea ===&lt;br /&gt;
&lt;br /&gt;
Currently ZAP provides only a limited set of report data. While this can be extended dynamically this feature is not currently used, and there is no way for users to choose what data they get back. It also provides a set of API calls, some of which return data that could be incorporated into reports, and some of which allow the fixed report to be accessed.&lt;br /&gt;
&lt;br /&gt;
==== Expected Results ====&lt;br /&gt;
&lt;br /&gt;
* Report data will be a distinct type of data returned via API calls&lt;br /&gt;
* An add-on that provides report data - so this becomes 'plug-able'&lt;br /&gt;
* Report data and meta data should be fully internationalized&lt;br /&gt;
* Users can specify which sites / contexts report data should apply to&lt;br /&gt;
&lt;br /&gt;
==== Knowledge Prerequisite: ====&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
==== Mentors ====&lt;br /&gt;
Simon Bennetts&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] provides real-time application layer intrusion detection. The software has recently hit v2.0. We have some ambitious plans across a variety of areas for the next year to build on the recent momentum.&lt;br /&gt;
&lt;br /&gt;
 * Check the AppSensor wiki page linked above&lt;br /&gt;
 * Contact us through the mailing list.&lt;br /&gt;
 * Check our [https://github.com/jtmelton/appsensor github repository] and the [https://github.com/jtmelton/appsensor/issues open tickets]&lt;br /&gt;
 * Also see our [http://www.appsensor.org appsensor website]&lt;br /&gt;
&lt;br /&gt;
=== Example Idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
This is a feature request that's been driven by the community. AppSensor provides great utility by allowing applications to defend themselves. AppSensor can/will also provide a UI (another possible GSOC project) to view and manage the information produced by the applications. However, larger organizations often already have a system in place for managing system security alerts. It would provide a lot of value if we can integrate with those systems and data formats. This project will involve a bit of up-front research, then primarily systems integration work. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
We want  to support a number of integrations. Some that have been requested by our community are:  &lt;br /&gt;
* SNMP&lt;br /&gt;
* JMX&lt;br /&gt;
* SCOM&lt;br /&gt;
* syslog&lt;br /&gt;
* CEF&lt;br /&gt;
* AppDynamics&lt;br /&gt;
&lt;br /&gt;
Source code and associated tests for these integrations will be created, along with the associated end user documentation for how to setup and configure them. &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in Java and unit testing. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' John Melton - OWASP AppSensor Project Leader (Development)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid [[OWASP_SeraphimDroid_Project| ]] ==&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Educational component  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app. The initial idea of the project was to provide educational platform for common users, where by using the application, users can learn about risks for their privacy and security. Some components already has some sort of explanation, which is educational. However, it lacks of uneatable knowledge source and some of the components that monitor user's behavior do not provide sufficient information. Idea of this project is to develop monitoring of user activity and an component that can warn user about risks if he does something risky. Also, mobile security knowledge base that can be updated remotely will be a huge new asset to the application.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Develop uneatable knowledge base and GUI for it&lt;br /&gt;
*  Develop web server where the knowledge base can be updated&lt;br /&gt;
*  Improve current educational reporting&lt;br /&gt;
*  Develop methodology for monitoring users and notifying them about risky activities&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC Tool ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_ZSC_Tool_Project|OWASP ZSC]] is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Please take a look of our TODO list in Github to get some ideas:&lt;br /&gt;
https://github.com/Ali-Razmjoo/OWASP-ZSC/issues&lt;br /&gt;
&lt;br /&gt;
Another ideas:&lt;br /&gt;
* Help us develop shellcode module for windows&lt;br /&gt;
* Develop shellcode module for OSX&lt;br /&gt;
&lt;br /&gt;
Read about the project here:&lt;br /&gt;
https://ali-razmjoo.gitbooks.io/owasp-zsc/content/&lt;br /&gt;
&lt;br /&gt;
Recommended reading:&lt;br /&gt;
http://www.vividmachines.com/shellcode/shellcode.html&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* Basic knowledge about Shellcode and assembly language&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
*Christo and Timo Goosen and Brian Beaudry- OWASP ZSC Contributors&lt;br /&gt;
&lt;br /&gt;
Contact us through our mailing list for questions:&lt;br /&gt;
https://groups.google.com/d/forum/owasp-zsc&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC&amp;diff=209111</id>
		<title>GSoC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC&amp;diff=209111"/>
				<updated>2016-02-17T21:58:02Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP is applying to be a Google Summer of Code (“GSoC”) mentoring organization in 2016!'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Open source software is changing the world and creating the future.&lt;br /&gt;
Want to help shaping it? We’re looking for students to join us in making 2014 the best Summer of Code yet! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;'''STUDENTS: THE PROPOSAL SUBMISSION PERIOD WILL BE OPEN UNTIL MARCH 14TH'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://summerofcode.withgoogle.com/ '''Google Summer of Code Program Site''']&lt;br /&gt;
&lt;br /&gt;
OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted.&lt;br /&gt;
&lt;br /&gt;
All students currently enrolled in an accredited institution are welcome to participate in the Google Summer of Code 2016 program, hopefully along with the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
Below you could find all the instructions on how to participate.&lt;br /&gt;
&lt;br /&gt;
== What is GSOC? ==&lt;br /&gt;
&lt;br /&gt;
The Google Summer of Code program (“GSoC”) is designed to encourage student participation in open source development. Through GSoC, accepted student applicants will be paired with OWASP mentors that will guide them through their coding tasks.&lt;br /&gt;
&lt;br /&gt;
Benefits to students include:&lt;br /&gt;
&lt;br /&gt;
* Gaining exposure to real-world software development scenarios,&lt;br /&gt;
* An opportunity for employment in areas related to their academic pursuits and&lt;br /&gt;
* Google will be offering successful student contributors a 5,500 USD stipend, enabling them to focus on their coding projects for three months. &lt;br /&gt;
&lt;br /&gt;
This program is done completely online. Students and mentors from more than 100 countries have participated in past years.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Instructions common to all participants==&lt;br /&gt;
&lt;br /&gt;
All participants should take a look at the [https://developers.google.com/open-source/gsoc/faq Google Summer of Code Program Site] every now and then to be informed about updates and advice. It is also important to read the [https://developers.google.com/open-source/gsoc/faq Summer of Code FAQ], as it contains useful information.&lt;br /&gt;
All participants will need a Google account in order to join the program. You'll save some time if you create one now.&lt;br /&gt;
&lt;br /&gt;
===Programming Language===&lt;br /&gt;
&lt;br /&gt;
While the majority of OWASP tools are developed using C++/Java, we do accept other languages, including (but not limited to) Python, Ruby and C#. C++ will be accepted for any project. Submissions and ideas for projects in any other language should specifically mention the choice.&lt;br /&gt;
&lt;br /&gt;
==Instructions for students==&lt;br /&gt;
&lt;br /&gt;
Are you a student and want to code for an OWASP project? &lt;br /&gt;
Here are the steps and some tips on getting started:&lt;br /&gt;
&lt;br /&gt;
1) Think of a good idea – For reference see&lt;br /&gt;
[https://www.owasp.org/index.php/GSoC2016_Ideas GSoC 2016 Ideas]&lt;br /&gt;
&lt;br /&gt;
2) Do some research yourself based on the idea, write up a proposal draft &lt;br /&gt;
&lt;br /&gt;
3) Post it to the mailing list at https://groups.google.com/d/forum/owasp-gsoc for initial discussions with OWASP mentors.&lt;br /&gt;
&lt;br /&gt;
4) Based on feedback, write a full proposal – See template below:&lt;br /&gt;
https://www.owasp.org/index.php/GSoC_SAT&lt;br /&gt;
&lt;br /&gt;
5) Submit your proposal to Google from March 14th to March 25th 2014.&lt;br /&gt;
&lt;br /&gt;
Students wishing to participate in GSoC must realize this is a formal commitment to produce code for the selected OWASP Project during three months. You will also take some resources from OWASP project leaders, who will dedicate a portion of their time to mentor you. Therefore, we'd like to have candidates who are committed to helping OWASP mission. You don't have to be a proven developer -- in fact, this whole program is meant to facilitate joining OWASP and other Open Source communities. However, experience in coding and applications are welcome.&lt;br /&gt;
&lt;br /&gt;
You should start familiarising yourself with the components that you plan on working on before the start date. OWASP Project Mentors are available on the mailing list https://groups.google.com/d/forum/owasp-gsoc for help. &lt;br /&gt;
&lt;br /&gt;
===General instructions===&lt;br /&gt;
First of all, please read the instructions common to all participants and the [https://developers.google.com/open-source/gsoc/faq GSoC FAQ]. Pay special attention to the '''Eligibility''' section of the FAQ.&lt;br /&gt;
&lt;br /&gt;
===Getting in touch===&lt;br /&gt;
* Google Group: OWASP Organization Administrators and Mentors are available at https://groups.google.com/d/forum/owasp-gsoc ready to answer any questions and discuss any idea.&lt;br /&gt;
* Mailing list: Each project has its own development mailing list (eg. ESAPI: http://lists.owasp.org/pipermail/esapi-dev/). Feel free t osubscribe in order to discuss your ideas directly with the project's contributors.&lt;br /&gt;
* IRC channel: You can find us at irc.freenode.net channel #owasp-gsoc&lt;br /&gt;
&lt;br /&gt;
===Recommended steps===&lt;br /&gt;
* Read Google's instructions for participating&lt;br /&gt;
* Take a look at the list of ideas&lt;br /&gt;
* Come up with project that you're interested in&lt;br /&gt;
* Write a first draft proposal and get someone to review it for you&lt;br /&gt;
* Submit it using Google's web interface&lt;br /&gt;
&lt;br /&gt;
Coming up with an interesting idea is probably the most difficult part of all. It should be something interesting for an OWASP Project, and more importantly for you. It also has to be something that you can realistically achieve in the time available to you.&lt;br /&gt;
&lt;br /&gt;
Finding out what the most pressing issues are in the projects you're interested in is a good start. You can optionally join the mailing lists for that project: you can make acquaintance with developers and your potential mentor, as well as start learning the codebase. We recommend strongly doing that and we will look favourably on applications from students who have started to act like Open Source developers.&lt;br /&gt;
&lt;br /&gt;
===Student proposal guidelines===&lt;br /&gt;
A project proposal is what you will be judged upon. So, as a general recommendation, write a clear proposal on what you plan to do, what your project is and what it is not, etc. Several websites now contain hints and other useful information on writing up such proposals.&lt;br /&gt;
OWASP does not require a specific format or specific list of information, but there is an application template on the OWASP page in Google Melange with some specific points that you should address in your application:&lt;br /&gt;
* Who are you? What are you studying?&lt;br /&gt;
* What exactly do you intend to do? What will not be done?&lt;br /&gt;
* Why are you the right person for this task?&lt;br /&gt;
* To what extent are you familiar with the software you're proposing to work with? Have you used it? Have you read the source? Have  you modified the source?&lt;br /&gt;
* How many hours are you going to work on this a week? 10? 20? 30? 40?&lt;br /&gt;
* Do you have other commitments that we should know about? If so, please suggest a way to compensate if it will take much time away from Summer of Code.&lt;br /&gt;
* Are you comfortable working independently under a supervisor or mentor who is several thousand miles away, not to mention 12 time zones away? How will you work with your mentor to track your work? Have you worked in this style before?&lt;br /&gt;
* If your native language is not English, are you comfortable working closely with a supervisor whose native language is English? What is your native language, as that may help us find a mentor who has the same native language?&lt;br /&gt;
* Where do you live, and can we assign a mentor who is local to you so you can meet in a coffee shop for lunch?&lt;br /&gt;
&lt;br /&gt;
After you have written your proposal, you should get it reviewed. Do not rely on the OWASP mentors to do it for you via the web interface: they will only send back a proposal if they find it lacking. Instead, ask a colleague or a developer to do it for you.&lt;br /&gt;
&lt;br /&gt;
===Hints===&lt;br /&gt;
'''Submit your proposal early:''' early submissions get more attention from developers for the simple fact that they have more time to dedicate to reading them. The more people see it, the more it'll get known.&lt;br /&gt;
&lt;br /&gt;
'''Do not leave it all to the last minute:''' while it is Google that is operating the webserver, it would be wise to expect a last-minute overload on the server. So, make sure you send your application before the final rush. Also, note that the applications submitted very late will get the least attention from mentors, so you may get a low vote because of that.&lt;br /&gt;
&lt;br /&gt;
'''Keep it simple:''' we don't need a 10-page essay on the project and on you (Google won't even let you submit a text that long). You just need to be concise and precise.&lt;br /&gt;
&lt;br /&gt;
'''Know what you are talking about:''' the last thing we need is for students to submit ideas that cannot be accomplished realistically or ideas that aren't even remotely related to OWASP Projects. If your idea is unusual, be sure to explain why you have chosen OWASP to be your mentoring organisation.&lt;br /&gt;
&lt;br /&gt;
'''Aim wide:''' submit more than one proposal, to different OWASP Projects. We also recommend submitting to more than one organisation too. This will increase your chances of being chosen.&lt;br /&gt;
&lt;br /&gt;
The PostgreSQL project has also released a list of [http://www.postgresql.org/developer/summerofcodeadvice.html hints] that you can take a look.&lt;br /&gt;
&lt;br /&gt;
==Instructions for mentors==&lt;br /&gt;
===Ideas===&lt;br /&gt;
If you're a developer and you wish to participate in Summer of Code, you can do it in two ways: the first and easiest is to make a proposal in the [https://www.owasp.org/index.php/GSoC2016_Ideas ideas] page. Take a look at what the different OWASP Projects needs or what you feel should have. Feel free to submit ideas even if you cannot elaborate too much on them.&lt;br /&gt;
&lt;br /&gt;
The second possibility is to be a mentor for a more specific idea. If you wish to do that, please read the instructions common to all participants and the Summer of Code FAQ. Also, please contact the project leader for your application or module and get the go-ahead from him/her. Then edit the ideas page, adding your idea.&lt;br /&gt;
&lt;br /&gt;
Your idea proposal should be a brief description of what the project is, what the desired goals would be, what the student should know and your email address for contact. Please note, though, that the students are not required to follow your idea to the letter, so regard your proposal as just a suggestion.&lt;br /&gt;
&lt;br /&gt;
===Mentoring===&lt;br /&gt;
If you wish to help us even more, you can be an OWASP mentor. We will potentially assign a student to you who has never worked on such a large project and will need some help. Make sure you're up for the task.&lt;br /&gt;
When subscribing yourself as a mentor, please make sure that your application or module maintainer is aware of that. Ask him/her to send the Summer of Code OWASP Administrators an email confirming to know you. This is just a formality to make sure you are a real person we can trust -- the administrators cannot know all active developers by their Google account ID.&lt;br /&gt;
&lt;br /&gt;
If you would like to get an idea of what is involved in being a good mentor, be sure to read the [http://www.booki.cc/gsoc-mentoring mentoring guide]. &lt;br /&gt;
&lt;br /&gt;
You will be subscribed to a mailing list to discuss ideas. We will also require you to read the proposals as they come in and you will be allowed to vote on the proposals, according to rules we will publish later.&lt;br /&gt;
&lt;br /&gt;
Finally, know that we will never assign you to a project you do not want to work on. We will not assign you more projects than you can/want to take on either. And you will have a backup mentor, just in case something unforeseen takes place.&lt;br /&gt;
&lt;br /&gt;
===Subscribing as mentor===&lt;br /&gt;
To subscribe as mentor, you need to complete a few easy steps.&lt;br /&gt;
* Contact the OWASP GSoC administrators to let them know which project you want to mentor for&lt;br /&gt;
* Log in to [https://summerofcode.withgoogle.com/ Google Summer of Code Program Site]&lt;br /&gt;
* Apply as a mentor for OWASP&lt;br /&gt;
* Subscribe to https://groups.google.com/d/forum/owasp-gsoc&lt;br /&gt;
&lt;br /&gt;
'''The current list of GSOC 2016 Mentors are:'''&lt;br /&gt;
* Abraham Aranguren&lt;br /&gt;
* Mennouchi Islam Azeddine&lt;br /&gt;
* Ryan Barnett&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Spyros Gasteratos&lt;br /&gt;
* Gareth Heyes&lt;br /&gt;
* Krzysztof Kotowicz&lt;br /&gt;
* Andres Morales&lt;br /&gt;
* Kostas Papapanagiotou&lt;br /&gt;
* Andres Riancho&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
* Prasad Shenoy&lt;br /&gt;
* Breno Silva&lt;br /&gt;
* Andrew van der Stock&lt;br /&gt;
* Kevin W. Wall&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Instructions for OWASP Project Leaders==&lt;br /&gt;
If you are an OWASP Project Leader, you may be contacted by developers in your project about an idea he wants to submit. &lt;br /&gt;
You should judge whether the idea being proposed coincides with the general goals for your OWASP Project. If you feel that is not the case, you should reply to your developer and suggest that he modify the proposal.&lt;br /&gt;
You do not need yourself to be a mentor, but we would like you to.&lt;br /&gt;
&lt;br /&gt;
==Contact OWASP GSoC Admininstrators==&lt;br /&gt;
To reach the OWASP administrators for Summer of Code, please send an email to the GSOC Administrators below.&lt;br /&gt;
&lt;br /&gt;
'''The GSOC 2016 Administrators are:'''&lt;br /&gt;
&lt;br /&gt;
* Kostas Papapanagiotou (konstantinos@owasp.org)&lt;br /&gt;
* Claudia Casanovas (claudia.aviles-casanovas@owasp.org)&lt;br /&gt;
* Fabio Cerullo (fcerullo@owasp.org)&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC&amp;diff=208989</id>
		<title>GSoC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC&amp;diff=208989"/>
				<updated>2016-02-16T11:41:58Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP is applying to be a Google Summer of Code (“GSoC”) mentoring organization in 2016!'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Open source software is changing the world and creating the future.&lt;br /&gt;
Want to help shaping it? We’re looking for students to join us in making 2014 the best Summer of Code yet! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;'''STUDENTS: THE PROPOSAL SUBMISSION PERIOD WILL BE OPEN UNTIL MARCH 14TH'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://summerofcode.withgoogle.com/ '''Google Summer of Code Program Site''']&lt;br /&gt;
&lt;br /&gt;
OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted.&lt;br /&gt;
&lt;br /&gt;
All students currently enrolled in an accredited institution are welcome to participate in the Google Summer of Code 2016 program, hopefully along with the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
Below you could find all the instructions on how to participate.&lt;br /&gt;
&lt;br /&gt;
== What is GSOC? ==&lt;br /&gt;
&lt;br /&gt;
The Google Summer of Code program (“GSoC”) is designed to encourage student participation in open source development. Through GSoC, accepted student applicants will be paired with OWASP mentors that will guide them through their coding tasks.&lt;br /&gt;
&lt;br /&gt;
Benefits to students include:&lt;br /&gt;
&lt;br /&gt;
* Gaining exposure to real-world software development scenarios,&lt;br /&gt;
* An opportunity for employment in areas related to their academic pursuits and&lt;br /&gt;
* Google will be offering successful student contributors a 5,500 USD stipend, enabling them to focus on their coding projects for three months. &lt;br /&gt;
&lt;br /&gt;
This program is done completely online. Students and mentors from more than 100 countries have participated in past years.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Instructions common to all participants==&lt;br /&gt;
&lt;br /&gt;
All participants should take a look at the [https://developers.google.com/open-source/gsoc/faq Google Summer of Code Program Site] every now and then to be informed about updates and advice. It is also important to read the [https://developers.google.com/open-source/gsoc/faq Summer of Code FAQ], as it contains useful information.&lt;br /&gt;
All participants will need a Google account in order to join the program. You'll save some time if you create one now.&lt;br /&gt;
&lt;br /&gt;
===Programming Language===&lt;br /&gt;
&lt;br /&gt;
While the majority of OWASP tools are developed using C++/Java, we do accept other languages, including (but not limited to) Python, Ruby and C#. C++ will be accepted for any project. Submissions and ideas for projects in any other language should specifically mention the choice.&lt;br /&gt;
&lt;br /&gt;
==Instructions for students==&lt;br /&gt;
&lt;br /&gt;
Are you a student and want to code for an OWASP project? &lt;br /&gt;
Here are the steps and some tips on getting started:&lt;br /&gt;
&lt;br /&gt;
1) Think of a good idea – For reference see&lt;br /&gt;
[https://www.owasp.org/index.php/GSoC2015_Ideas GSoC 2016 Ideas]&lt;br /&gt;
&lt;br /&gt;
2) Do some research yourself based on the idea, write up a proposal draft &lt;br /&gt;
&lt;br /&gt;
3) Post it to the mailing list at https://groups.google.com/d/forum/owasp-gsoc for initial discussions with OWASP mentors.&lt;br /&gt;
&lt;br /&gt;
4) Based on feedback, write a full proposal – See template below:&lt;br /&gt;
https://www.owasp.org/index.php/GSoC_SAT&lt;br /&gt;
&lt;br /&gt;
5) Submit your proposal to Google from March 14th to March 25th 2014.&lt;br /&gt;
&lt;br /&gt;
Students wishing to participate in GSoC must realize this is a formal commitment to produce code for the selected OWASP Project during three months. You will also take some resources from OWASP project leaders, who will dedicate a portion of their time to mentor you. Therefore, we'd like to have candidates who are committed to helping OWASP mission. You don't have to be a proven developer -- in fact, this whole program is meant to facilitate joining OWASP and other Open Source communities. However, experience in coding and applications are welcome.&lt;br /&gt;
&lt;br /&gt;
You should start familiarising yourself with the components that you plan on working on before the start date. OWASP Project Mentors are available on the mailing list https://groups.google.com/d/forum/owasp-gsoc for help. &lt;br /&gt;
&lt;br /&gt;
===General instructions===&lt;br /&gt;
First of all, please read the instructions common to all participants and the [https://developers.google.com/open-source/gsoc/faq GSoC FAQ]. Pay special attention to the '''Eligibility''' section of the FAQ.&lt;br /&gt;
&lt;br /&gt;
===Recommended steps===&lt;br /&gt;
* Read Google's instructions for participating&lt;br /&gt;
* Take a look at the list of ideas&lt;br /&gt;
* Come up with project that you're interested in&lt;br /&gt;
* Write a first draft proposal and get someone to review it for you&lt;br /&gt;
* Submit it using Google's web interface&lt;br /&gt;
&lt;br /&gt;
Coming up with an interesting idea is probably the most difficult part of all. It should be something interesting for an OWASP Project, and more importantly for you. It also has to be something that you can realistically achieve in the time available to you.&lt;br /&gt;
&lt;br /&gt;
Finding out what the most pressing issues are in the projects you're interested in is a good start. You can optionally join the mailing lists for that project: you can make acquaintance with developers and your potential mentor, as well as start learning the codebase. We recommend strongly doing that and we will look favourably on applications from students who have started to act like Open Source developers.&lt;br /&gt;
&lt;br /&gt;
===Student proposal guidelines===&lt;br /&gt;
A project proposal is what you will be judged upon. So, as a general recommendation, write a clear proposal on what you plan to do, what your project is and what it is not, etc. Several websites now contain hints and other useful information on writing up such proposals.&lt;br /&gt;
OWASP does not require a specific format or specific list of information, but there is an application template on the OWASP page in Google Melange with some specific points that you should address in your application:&lt;br /&gt;
* Who are you? What are you studying?&lt;br /&gt;
* What exactly do you intend to do? What will not be done?&lt;br /&gt;
* Why are you the right person for this task?&lt;br /&gt;
* To what extent are you familiar with the software you're proposing to work with? Have you used it? Have you read the source? Have  you modified the source?&lt;br /&gt;
* How many hours are you going to work on this a week? 10? 20? 30? 40?&lt;br /&gt;
* Do you have other commitments that we should know about? If so, please suggest a way to compensate if it will take much time away from Summer of Code.&lt;br /&gt;
* Are you comfortable working independently under a supervisor or mentor who is several thousand miles away, not to mention 12 time zones away? How will you work with your mentor to track your work? Have you worked in this style before?&lt;br /&gt;
* If your native language is not English, are you comfortable working closely with a supervisor whose native language is English? What is your native language, as that may help us find a mentor who has the same native language?&lt;br /&gt;
* Where do you live, and can we assign a mentor who is local to you so you can meet in a coffee shop for lunch?&lt;br /&gt;
&lt;br /&gt;
After you have written your proposal, you should get it reviewed. Do not rely on the OWASP mentors to do it for you via the web interface: they will only send back a proposal if they find it lacking. Instead, ask a colleague or a developer to do it for you.&lt;br /&gt;
&lt;br /&gt;
===Hints===&lt;br /&gt;
'''Submit your proposal early:''' early submissions get more attention from developers for the simple fact that they have more time to dedicate to reading them. The more people see it, the more it'll get known.&lt;br /&gt;
&lt;br /&gt;
'''Do not leave it all to the last minute:''' while it is Google that is operating the webserver, it would be wise to expect a last-minute overload on the server. So, make sure you send your application before the final rush. Also, note that the applications submitted very late will get the least attention from mentors, so you may get a low vote because of that.&lt;br /&gt;
&lt;br /&gt;
'''Keep it simple:''' we don't need a 10-page essay on the project and on you (Google won't even let you submit a text that long). You just need to be concise and precise.&lt;br /&gt;
&lt;br /&gt;
'''Know what you are talking about:''' the last thing we need is for students to submit ideas that cannot be accomplished realistically or ideas that aren't even remotely related to OWASP Projects. If your idea is unusual, be sure to explain why you have chosen OWASP to be your mentoring organisation.&lt;br /&gt;
&lt;br /&gt;
'''Aim wide:''' submit more than one proposal, to different OWASP Projects. We also recommend submitting to more than one organisation too. This will increase your chances of being chosen.&lt;br /&gt;
&lt;br /&gt;
The PostgreSQL project has also released a list of [http://www.postgresql.org/developer/summerofcodeadvice.html hints] that you can take a look.&lt;br /&gt;
&lt;br /&gt;
==Instructions for mentors==&lt;br /&gt;
===Ideas===&lt;br /&gt;
If you're a developer and you wish to participate in Summer of Code, you can do it in two ways: the first and easiest is to make a proposal in the [https://www.owasp.org/index.php/GSoC2016_Ideas ideas] page. Take a look at what the different OWASP Projects needs or what you feel should have. Feel free to submit ideas even if you cannot elaborate too much on them.&lt;br /&gt;
&lt;br /&gt;
The second possibility is to be a mentor for a more specific idea. If you wish to do that, please read the instructions common to all participants and the Summer of Code FAQ. Also, please contact the project leader for your application or module and get the go-ahead from him/her. Then edit the ideas page, adding your idea.&lt;br /&gt;
&lt;br /&gt;
Your idea proposal should be a brief description of what the project is, what the desired goals would be, what the student should know and your email address for contact. Please note, though, that the students are not required to follow your idea to the letter, so regard your proposal as just a suggestion.&lt;br /&gt;
&lt;br /&gt;
===Mentoring===&lt;br /&gt;
If you wish to help us even more, you can be an OWASP mentor. We will potentially assign a student to you who has never worked on such a large project and will need some help. Make sure you're up for the task.&lt;br /&gt;
When subscribing yourself as a mentor, please make sure that your application or module maintainer is aware of that. Ask him/her to send the Summer of Code OWASP Administrators an email confirming to know you. This is just a formality to make sure you are a real person we can trust -- the administrators cannot know all active developers by their Google account ID.&lt;br /&gt;
&lt;br /&gt;
If you would like to get an idea of what is involved in being a good mentor, be sure to read the [http://www.booki.cc/gsoc-mentoring mentoring guide]. &lt;br /&gt;
&lt;br /&gt;
You will be subscribed to a mailing list to discuss ideas. We will also require you to read the proposals as they come in and you will be allowed to vote on the proposals, according to rules we will publish later.&lt;br /&gt;
&lt;br /&gt;
Finally, know that we will never assign you to a project you do not want to work on. We will not assign you more projects than you can/want to take on either. And you will have a backup mentor, just in case something unforeseen takes place.&lt;br /&gt;
&lt;br /&gt;
===Subscribing as mentor===&lt;br /&gt;
To subscribe as mentor, you need to complete a few easy steps.&lt;br /&gt;
* Contact the OWASP GSoC administrators to let them know which project you want to mentor for&lt;br /&gt;
* Log in to [https://summerofcode.withgoogle.com/ Google Summer of Code Program Site]&lt;br /&gt;
* Apply as a mentor for OWASP&lt;br /&gt;
* Subscribe to https://groups.google.com/d/forum/owasp-gsoc&lt;br /&gt;
&lt;br /&gt;
'''The current list of GSOC 2016 Mentors are:'''&lt;br /&gt;
* Abraham Aranguren&lt;br /&gt;
* Mennouchi Islam Azeddine&lt;br /&gt;
* Ryan Barnett&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Spyros Gasteratos&lt;br /&gt;
* Gareth Heyes&lt;br /&gt;
* Krzysztof Kotowicz&lt;br /&gt;
* Andres Morales&lt;br /&gt;
* Kostas Papapanagiotou&lt;br /&gt;
* Andres Riancho&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
* Prasad Shenoy&lt;br /&gt;
* Breno Silva&lt;br /&gt;
* Andrew van der Stock&lt;br /&gt;
* Kevin W. Wall&lt;br /&gt;
* Tom Brennan&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Instructions for OWASP Project Leaders==&lt;br /&gt;
If you are an OWASP Project Leader, you may be contacted by developers in your project about an idea he wants to submit. &lt;br /&gt;
You should judge whether the idea being proposed coincides with the general goals for your OWASP Project. If you feel that is not the case, you should reply to your developer and suggest that he modify the proposal.&lt;br /&gt;
You do not need yourself to be a mentor, but we would like you to.&lt;br /&gt;
&lt;br /&gt;
==Contact OWASP GSoC Admininstrators==&lt;br /&gt;
To reach the OWASP administrators for Summer of Code, please send an email to the GSOC Administrators below.&lt;br /&gt;
&lt;br /&gt;
'''The GSOC 2016 Administrators are:'''&lt;br /&gt;
&lt;br /&gt;
* Kostas Papapanagiotou (konstantinos@owasp.org)&lt;br /&gt;
* Claudia Casanovas (claudia.aviles-casanovas@owasp.org)&lt;br /&gt;
* Fabio Cerullo (fcerullo@owasp.org)&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2016_Ideas&amp;diff=208384</id>
		<title>GSOC2016 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2016_Ideas&amp;diff=208384"/>
				<updated>2016-02-09T09:47:13Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check the Hackademic wiki page linked above&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/Hackademic/hackademic github repository] and especially the [https://github.com/Hackademic/hackademic/issues open tickets]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Hackademic Challenges ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Hackademic Challenges Project]]  helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment. After a wonderfull 2014 GSoC with 100 new challenges and a couple of new plugins we're mainly looking to get new features in and maybe a couple of challenges. Bellow is a list of proposed features.&lt;br /&gt;
&lt;br /&gt;
=== Example Idea===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
After a very successfull OWASP Winter Code Sprint we have a brand new Sandbox feature which uses Linux Containers to create virtual space for each user. So we can host properly vulnerable challenges and maybe execute some code server side. However, the sandbox is not fully complete, we need many features here and there to make it easily deployable and improve it's administration.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
* Simple sandbox administration frontend for the web. -- An admin console to start and kill sandboxes manually and to list the status and resources used by each one.&lt;br /&gt;
* Secure the implementation -- Now we have a functioning prototype, we know that Linux Containers are quite safe but we haven't explicitly tested our configuration and use of them.&lt;br /&gt;
* Your idea here...&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Better sandboxing&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in Linux administration and some security knowledge depending on the specific project.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
&lt;br /&gt;
=== Example Idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Background problem to solve:&lt;br /&gt;
&lt;br /&gt;
We are trying to reduce the human work burden where there will be hundreds of issues listing apache out of date or php out of date. &lt;br /&gt;
&lt;br /&gt;
Proposed solution:&lt;br /&gt;
&lt;br /&gt;
We can meta aggregate these duplicate issues into one issue of &amp;quot;outdated software / apache / php detected&amp;quot;. with XYZ list of issues in them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A separate set of scripts that allows for grouping and management of vulnerabilities (i.e. think huge assessments), to be usable *both* from inside + outside of OWTF in a separate sub-repo here: https://github.com/owtf &lt;br /&gt;
&lt;br /&gt;
VMS will have the following features:&lt;br /&gt;
* Vulnerability correlation engine which will allow for quick identification of unique vulnerability and deduplication.&lt;br /&gt;
* Vulnerability table optimization : combining redundant vulnerabilities like example : PHP &amp;lt;5.1 , PHP &amp;lt; 5.2 , PHP &amp;lt; 5.3 all suggest upgrade php so if multiple issues are reported they should be combined.&lt;br /&gt;
* Integration with existing bug tracking system like example bugzilla, jira : Should not be too hard as all such system have one or the other method exposed (REST API or similar)&lt;br /&gt;
* Fix Validation : Since we integrate with bug tracking once dev fixed the bug and code deployed we can run specific checks via * OWTF or other tool (may be specific nessus or nexpose plugin or similar.)&lt;br /&gt;
* Management Dashboard : Could be exposed to Pentester, Higher Management where stats are shown with lesser details but more of high level overview.&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/null0x00/nessus-and-reporting-karma Similar previous work for Nessus]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren - OWASP OWTF Project Leader - Contact: Abraham.Aranguren@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
We are in the process of deciding the set of ZAP projects for Google Summer of Code 2015.&lt;br /&gt;
&lt;br /&gt;
You can follow (and join in) the discussions on the ZAP Developer Group: https://groups.google.com/d/msg/zaproxy-develop/Uy0JPkzsI_s/Bj7OTSkISCIJ&lt;br /&gt;
&lt;br /&gt;
=== Example Idea ===&lt;br /&gt;
&lt;br /&gt;
Currently ZAP provides only a limited set of report data. While this can be extended dynamically this feature is not currently used, and there is no way for users to choose what data they get back. It also provides a set of API calls, some of which return data that could be incorporated into reports, and some of which allow the fixed report to be accessed.&lt;br /&gt;
&lt;br /&gt;
==== Expected Results ====&lt;br /&gt;
&lt;br /&gt;
* Report data will be a distinct type of data returned via API calls&lt;br /&gt;
* An add-on that provides report data - so this becomes 'plug-able'&lt;br /&gt;
* Report data and meta data should be fully internationalized&lt;br /&gt;
* Users can specify which sites / contexts report data should apply to&lt;br /&gt;
&lt;br /&gt;
==== Knowledge Prerequisite: ====&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
==== Mentors ====&lt;br /&gt;
Johanna Curiel [johanna.curiel [at] owasp.org and Simon Bennetts&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Testing Guide ==&lt;br /&gt;
&lt;br /&gt;
=== Example Idea ===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
We would like the OWASP Testing Guide to be much more easily consumable by web testing tools (such as ZAP). This would require adjustments to the Testing Guide, or separate Testing with X Guides, to explain how testing is completed with given tools. The tools would of course need to be changed to make full use of OTG  and this project could include such changes to OWASP tools like ZAP. &lt;br /&gt;
&lt;br /&gt;
'''Expected outputs:'''&lt;br /&gt;
&lt;br /&gt;
Amended OTG or Testing with X Guides. Either option would require the document to integrate with all web testing tools (Using ZAP as the baseline).&lt;br /&gt;
Optional ZAP changes or add-on to make better use of the OTGs&lt;br /&gt;
&lt;br /&gt;
'''Knowledge required:'''&lt;br /&gt;
&lt;br /&gt;
Writing skills&lt;br /&gt;
&lt;br /&gt;
'''OTG Web Testing Tool Integration mentor:''' &lt;br /&gt;
&lt;br /&gt;
Andrew Muller - OTG Project Co-Leader - Contact: Andrew.muller@owasp.org&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] provides real-time application layer intrusion detection. The software has recently hit v2.0. We have some ambitious plans across a variety of areas for the next year to build on the recent momentum.&lt;br /&gt;
&lt;br /&gt;
 * Check the AppSensor wiki page linked above&lt;br /&gt;
 * Contact us through the mailing list.&lt;br /&gt;
 * Check our [https://github.com/jtmelton/appsensor github repository] and the [https://github.com/jtmelton/appsensor/issues open tickets]&lt;br /&gt;
 * Also see our [http://www.appsensor.org appsensor website]&lt;br /&gt;
&lt;br /&gt;
=== Example Idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
This is a feature request that's been driven by the community. AppSensor provides great utility by allowing applications to defend themselves. AppSensor can/will also provide a UI (another possible GSOC project) to view and manage the information produced by the applications. However, larger organizations often already have a system in place for managing system security alerts. It would provide a lot of value if we can integrate with those systems and data formats. This project will involve a bit of up-front research, then primarily systems integration work. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
We want  to support a number of integrations. Some that have been requested by our community are:  &lt;br /&gt;
* SNMP&lt;br /&gt;
* JMX&lt;br /&gt;
* SCOM&lt;br /&gt;
* syslog&lt;br /&gt;
* CEF&lt;br /&gt;
* AppDynamics&lt;br /&gt;
&lt;br /&gt;
Source code and associated tests for these integrations will be created, along with the associated end user documentation for how to setup and configure them. &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in Java and unit testing. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' John Melton - OWASP AppSensor Project Leader (Development)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Passfault ==&lt;br /&gt;
&lt;br /&gt;
=== Example Idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP Passfault]] has the potential to be the best password policy available.  However, it's only available to java developers.  This effort will make Passfault available to every Linux administrator.  It would offer an alternative to the pam module libcrack to measure password complexity. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
When complete an administrator should be able to do the following:&lt;br /&gt;
*  Enforce password complexity for all password changes with OWASP Passfault (for example when passwd is called)&lt;br /&gt;
*  Adjust password complexity threshold&lt;br /&gt;
*  (stretch goal) Install Passfault via package management: apt, yum, rpm, deb, etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Bash scripting&lt;br /&gt;
* Linux administration&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Cam_Morris|Cam Morris]] - OWASP Passfault Project Leader (Development)&lt;br /&gt;
* John Jolly - Linux Kernel Engineer for SUSE Linux on IBM System z Mainframes (Development)&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2016_Ideas&amp;diff=208383</id>
		<title>GSOC2016 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2016_Ideas&amp;diff=208383"/>
				<updated>2016-02-09T09:46:43Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check the Hackademic wiki page linked above&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/Hackademic/hackademic github repository] and especially the [https://github.com/Hackademic/hackademic/issues open tickets]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Hackademic Challenges ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Hackademic Challenges Project]]  helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment. After a wonderfull 2014 GSoC with 100 new challenges and a couple of new plugins we're mainly looking to get new features in and maybe a couple of challenges. Bellow is a list of proposed features.&lt;br /&gt;
&lt;br /&gt;
=== Example Idea===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
After a very successfull OWASP Winter Code Sprint we have a brand new Sandbox feature which uses Linux Containers to create virtual space for each user. So we can host properly vulnerable challenges and maybe execute some code server side. However, the sandbox is not fully complete, we need many features here and there to make it easily deployable and improve it's administration.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
* Simple sandbox administration frontend for the web. -- An admin console to start and kill sandboxes manually and to list the status and resources used by each one.&lt;br /&gt;
* Secure the implementation -- Now we have a functioning prototype, we know that Linux Containers are quite safe but we haven't explicitly tested our configuration and use of them.&lt;br /&gt;
* Your idea here...&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Better sandboxing&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in Linux administration and some security knowledge depending on the specific project.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
&lt;br /&gt;
=== Example Idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Background problem to solve:&lt;br /&gt;
&lt;br /&gt;
We are trying to reduce the human work burden where there will be hundreds of issues listing apache out of date or php out of date. &lt;br /&gt;
&lt;br /&gt;
Proposed solution:&lt;br /&gt;
&lt;br /&gt;
We can meta aggregate these duplicate issues into one issue of &amp;quot;outdated software / apache / php detected&amp;quot;. with XYZ list of issues in them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A separate set of scripts that allows for grouping and management of vulnerabilities (i.e. think huge assessments), to be usable *both* from inside + outside of OWTF in a separate sub-repo here: https://github.com/owtf &lt;br /&gt;
&lt;br /&gt;
VMS will have the following features:&lt;br /&gt;
* Vulnerability correlation engine which will allow for quick identification of unique vulnerability and deduplication.&lt;br /&gt;
* Vulnerability table optimization : combining redundant vulnerabilities like example : PHP &amp;lt;5.1 , PHP &amp;lt; 5.2 , PHP &amp;lt; 5.3 all suggest upgrade php so if multiple issues are reported they should be combined.&lt;br /&gt;
* Integration with existing bug tracking system like example bugzilla, jira : Should not be too hard as all such system have one or the other method exposed (REST API or similar)&lt;br /&gt;
* Fix Validation : Since we integrate with bug tracking once dev fixed the bug and code deployed we can run specific checks via * OWTF or other tool (may be specific nessus or nexpose plugin or similar.)&lt;br /&gt;
* Management Dashboard : Could be exposed to Pentester, Higher Management where stats are shown with lesser details but more of high level overview.&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/null0x00/nessus-and-reporting-karma Similar previous work for Nessus]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability -i.e. the Health Monitor cannot crash! :)-&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python and bash experience would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentor:'''&lt;br /&gt;
&lt;br /&gt;
Abraham Aranguren - OWASP OWTF Project Leader - Contact: Abraham.Aranguren@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
We are in the process of deciding the set of ZAP projects for Google Summer of Code 2015.&lt;br /&gt;
&lt;br /&gt;
You can follow (and join in) the discussions on the ZAP Developer Group: https://groups.google.com/d/msg/zaproxy-develop/Uy0JPkzsI_s/Bj7OTSkISCIJ&lt;br /&gt;
&lt;br /&gt;
=== Example Idea ===&lt;br /&gt;
&lt;br /&gt;
Currently ZAP provides only a limited set of report data. While this can be extended dynamically this feature is not currently used, and there is no way for users to choose what data they get back. It also provides a set of API calls, some of which return data that could be incorporated into reports, and some of which allow the fixed report to be accessed.&lt;br /&gt;
&lt;br /&gt;
==== Expected Results ====&lt;br /&gt;
&lt;br /&gt;
* Report data will be a distinct type of data returned via API calls&lt;br /&gt;
* An add-on that provides report data - so this becomes 'plug-able'&lt;br /&gt;
* Report data and meta data should be fully internationalized&lt;br /&gt;
* Users can specify which sites / contexts report data should apply to&lt;br /&gt;
&lt;br /&gt;
==== Knowledge Prerequisite: ====&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
==== Mentors ====&lt;br /&gt;
Johanna Curiel [johanna.curiel [at] owasp.org and Simon Bennetts&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Testing Guide ==&lt;br /&gt;
&lt;br /&gt;
=== Example Idea ===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
We would like the OWASP Testing Guide to be much more easily consumable by web testing tools (such as ZAP). This would require adjustments to the Testing Guide, or separate Testing with X Guides, to explain how testing is completed with given tools. The tools would of course need to be changed to make full use of OTG  and this project could include such changes to OWASP tools like ZAP. &lt;br /&gt;
&lt;br /&gt;
'''Expected outputs:'''&lt;br /&gt;
&lt;br /&gt;
Amended OTG or Testing with X Guides. Either option would require the document to integrate with all web testing tools (Using ZAP as the baseline).&lt;br /&gt;
Optional ZAP changes or add-on to make better use of the OTGs&lt;br /&gt;
&lt;br /&gt;
'''Knowledge required:'''&lt;br /&gt;
&lt;br /&gt;
Writing skills&lt;br /&gt;
&lt;br /&gt;
'''OTG Web Testing Tool Integration mentor:''' &lt;br /&gt;
&lt;br /&gt;
Andrew Muller - OTG Project Co-Leader - Contact: Andrew.muller@owasp.org&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] provides real-time application layer intrusion detection. The software has recently hit v2.0. We have some ambitious plans across a variety of areas for the next year to build on the recent momentum.&lt;br /&gt;
&lt;br /&gt;
 * Check the AppSensor wiki page linked above&lt;br /&gt;
 * Contact us through the mailing list.&lt;br /&gt;
 * Check our [https://github.com/jtmelton/appsensor github repository] and the [https://github.com/jtmelton/appsensor/issues open tickets]&lt;br /&gt;
 * Also see our [http://www.appsensor.org appsensor website]&lt;br /&gt;
&lt;br /&gt;
=== Example Idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
This is a feature request that's been driven by the community. AppSensor provides great utility by allowing applications to defend themselves. AppSensor can/will also provide a UI (another possible GSOC project) to view and manage the information produced by the applications. However, larger organizations often already have a system in place for managing system security alerts. It would provide a lot of value if we can integrate with those systems and data formats. This project will involve a bit of up-front research, then primarily systems integration work. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
We want  to support a number of integrations. Some that have been requested by our community are:  &lt;br /&gt;
* SNMP&lt;br /&gt;
* JMX&lt;br /&gt;
* SCOM&lt;br /&gt;
* syslog&lt;br /&gt;
* CEF&lt;br /&gt;
* AppDynamics&lt;br /&gt;
&lt;br /&gt;
Source code and associated tests for these integrations will be created, along with the associated end user documentation for how to setup and configure them. &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in Java and unit testing. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' John Melton - OWASP AppSensor Project Leader (Development)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Passfault ==&lt;br /&gt;
&lt;br /&gt;
=== Example Idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP Passfault]] has the potential to be the best password policy available.  However, it's only available to java developers.  This effort will make Passfault available to every Linux administrator.  It would offer an alternative to the pam module libcrack to measure password complexity. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
When complete an administrator should be able to do the following:&lt;br /&gt;
*  Enforce password complexity for all password changes with OWASP Passfault (for example when passwd is called)&lt;br /&gt;
*  Adjust password complexity threshold&lt;br /&gt;
*  (stretch goal) Install Passfault via package management: apt, yum, rpm, deb, etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Bash scripting&lt;br /&gt;
* Linux administration&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Cam_Morris|Cam Morris]] - OWASP Passfault Project Leader (Development)&lt;br /&gt;
* John Jolly - Linux Kernel Engineer for SUSE Linux on IBM System z Mainframes (Development)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Web.config Security Analyzer v1.0 =&amp;gt;.NET Framework Config Security Analyzer v1.0 ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[https://code.google.com/p/wcsa/ OWASP WCSA] is a very helpful tool to analyze proper security settings on ASP.NET applications. This tool [http://www.troyhunt.com/2011/03/continuous-webconfig-security-analysis.html once quoted by Troy Hunt], has important limitations such as rules support limited to single elements, a single condition, and just equals comparison. e.g. &amp;quot;Debug&amp;quot; attribute in &amp;quot;Compilation&amp;quot; Element should be &amp;quot;false&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
The tool requires a rules update (and potentially a UI refresh) to bring up many of the new security settings on .NET Framework 4.x to the tool including web service bindings and many others. Limitations described will not allow verification of web services bindings where you can have multiple elements named the same, one for each binding, and depending of a binding type the value (even if absent) is secure or not. &lt;br /&gt;
&lt;br /&gt;
Additionally, since conf files in .NET are pretty much universal to all framework application types and with the upgrade of IIS metabase to XML format for IIS 7.0 and 7.5, the tool could now be used for securing desktop applications and IIS 7.x servers. &lt;br /&gt;
&lt;br /&gt;
The proposal is then to empower the tool by creating XML based rules and using XQuery to overcome all the limitations of the current version and allowing support for new rules in a familiar language that would support multiple cases which can then be applied to all of the config files for .NET framework seamlessly.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Support for duplicated elements and multiple conditions&lt;br /&gt;
* Support for easily created custom rules via XQuery&lt;br /&gt;
* Updated rules for 4.0 and 4.5 frameworks&lt;br /&gt;
* Support for stand alone app.config files&lt;br /&gt;
* New Rules for IIS 7.x Web Server&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* C# programming&lt;br /&gt;
* Basic XQuery knowledge&lt;br /&gt;
* (Nice to know) Advanced Web.config knowledge&lt;br /&gt;
* (Nice to know) IIS 7.x configuration knowledge &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [[User:jcmax|Juan C Calderon]]  (Development)&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summer_Code_Sprint2015&amp;diff=195086</id>
		<title>Summer Code Sprint2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summer_Code_Sprint2015&amp;diff=195086"/>
				<updated>2015-05-20T15:56:34Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OWASP Summer Code Sprint 2015 ==&lt;br /&gt;
&lt;br /&gt;
== Goal == &lt;br /&gt;
&lt;br /&gt;
The OWASP Summer Code Sprint 2015 is a program that aims to provide incentives to students to contribute to OWASP projects. By participating in the OWASP Summer Code Sprint a student can get real life experience while contributing to an open source project. A student that successfully completes the program will receive in total $1500.&lt;br /&gt;
&lt;br /&gt;
== Program details ==&lt;br /&gt;
&lt;br /&gt;
''Projects that are eligible:'' All code/tools projects. Documentation projects are excluded.&lt;br /&gt;
&lt;br /&gt;
''Duration:'' 2 months of full-time engagement.&lt;br /&gt;
&lt;br /&gt;
== How it works ==&lt;br /&gt;
&lt;br /&gt;
Any code/tool project can participate in the OWASP Summer Code Sprint. Each project will be guided by an OWASP mentor. Students are evaluated in the middle and at the end of the coding period, based on success criteria identified at the beginning of the project. Successful students will receive $750 after each evaluation, a total of $1500 per student.&lt;br /&gt;
&lt;br /&gt;
Projects are focused on developing security tools. It is required that the code any student produces for those projects will be released as Open Source. &lt;br /&gt;
&lt;br /&gt;
Note on language: English is required for code comments and documentation, but not for interactions between students and advisers. Advisers who speak the same language as their students are encouraged to interact in that language. &lt;br /&gt;
&lt;br /&gt;
== How you can participate ==&lt;br /&gt;
&lt;br /&gt;
=== As a student: ===&lt;br /&gt;
&lt;br /&gt;
1. Review the list of OWASP Projects currently participating in the OWASP Summer Code Sprint 2015.&lt;br /&gt;
&lt;br /&gt;
2. Get in touch with the OWASP Project mentor of your choice.&lt;br /&gt;
&lt;br /&gt;
3. Agree deliverables with OWASP mentor. &lt;br /&gt;
&lt;br /&gt;
4. Work away during Summer 2015.&lt;br /&gt;
&lt;br /&gt;
5. Rise to Open Source Development Glory :-)&lt;br /&gt;
&lt;br /&gt;
(Students apply now!)Google form application link&lt;br /&gt;
&lt;br /&gt;
=== As an OWASP Project Leader: ===&lt;br /&gt;
&lt;br /&gt;
1. Edit this page adding your project and some proposed tasks as per the examples&lt;br /&gt;
&lt;br /&gt;
2. Promote the initiative to your academic contacts&lt;br /&gt;
&lt;br /&gt;
== Timeplan ==&lt;br /&gt;
&lt;br /&gt;
'''Phase 1: Proposals'''&lt;br /&gt;
&lt;br /&gt;
Project leaders who want to include their project to the program should submit some initial proposal ideas on this page. These ideas serve as guidance to the students; they are things that project leaders would like to get done, like new features, improvements, etc.&lt;br /&gt;
&lt;br /&gt;
Subsequently students are invited to submit detailed proposals that can (but do not necessarily have to) be based on these ideas. Students are strongly encouraged to engage with project leaders and each project's community (e.g. through the project's mailing list) in order to discuss the details of their proposal. Proposals should provide details about the implementation, time plan, milestones, etc.&lt;br /&gt;
&lt;br /&gt;
'''Phase 2: Scoring of proposals'''&lt;br /&gt;
&lt;br /&gt;
After the submission of proposals, project leaders and contributors/mentors are required to review the submitted proposals and score them (on a 1 to 5 scale). Each proposal should receive at least 3 assessments/scores from different mentors. Each mentor, contributor or leader can score only proposals for their OWN project. All assessments should provide justification. Reviewers are strongly encouraged to provide constructive comments for students so that they can improve in the future.&lt;br /&gt;
&lt;br /&gt;
Project leaders are responsible to attract a sufficient number of volunteer mentors to score proposals and subsequently supervise those that will get selected.&lt;br /&gt;
&lt;br /&gt;
'''Phase 3: Slot allocation.'''&lt;br /&gt;
&lt;br /&gt;
When proposal scoring has been completed, each project leader requests a specific number of slots. This number should be based on:&lt;br /&gt;
The number of truly outstanding proposals according to submitted scores.&lt;br /&gt;
The importance of the proposal to the project's roadmap.&lt;br /&gt;
The number of available mentors for the project. At least 2 mentors are needed for each proposal that gets accepted.&lt;br /&gt;
If the total number of requested slots is less than or equal to the available number of slots, then all projects get the requested slots. If not, the following rules apply:&lt;br /&gt;
All projects that have requested a slot get at least 1 slot, provided they have a high quality proposal and sufficient number of mentors.&lt;br /&gt;
Two mentors are required per slot allocated to the project.&lt;br /&gt;
The program's administrators get in touch with project leaders, especially those that have requested a large number of slots to receive additional feedback on the requested slots and explore any available possibilities for reducing the requested number of slots. A project leader might choose to donate one or more requested slots back to the pool so that other projects can get more slots. The program administrators can choose to initiate a public discussion between projects in need of more slots and projects that have requested a lot of slots in order to determine the best possible outcome for everyone.&lt;br /&gt;
If all else fails, slots are equally allocated to projects, i.e. all projects get 1 slot; projects that have requested 2 or more slots get an extra slot if available; projects that have requested 3 or more slots get an extra slot if available, etc. When there are no more slots available for all projects that have requested them a draw is used to allocate the remaining slots.&lt;br /&gt;
&lt;br /&gt;
In any case, the program's administrators should perform a final review of the selected proposals to ensure that they are of high quality. If concerns arise they should request additional information from project leaders.&lt;br /&gt;
&lt;br /&gt;
'''Phase 4: Coding.'''&lt;br /&gt;
&lt;br /&gt;
This is the main phase of the program. Students implement their proposal according to the submitted timeplan and under the supervision &lt;br /&gt;
of their mentors.&lt;br /&gt;
&lt;br /&gt;
== Evaluations ==&lt;br /&gt;
&lt;br /&gt;
In the middle of the coding period, mentors should submit an evaluation of their students to ensure that they are on track and provide some feedback both to OWASP and the students.&lt;br /&gt;
&lt;br /&gt;
If no/little progress has been made up to this point, the mentors could decide to fail the student in which case the student does not receive money. If successful, OWASP will pay half the amount ($750). The final evaluations are submitted at the end of the coding period and the second installment ($750) is paid to the student if all agreed deliverables are met. If the student has failed to demonstrate progress during the second period, then the second installment will not be paid and the student will get only half of the amount.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Deadlines == &lt;br /&gt;
Program announcement: June 1st, 2015&lt;br /&gt;
&lt;br /&gt;
Student Applications: June 21st, 2015&lt;br /&gt;
&lt;br /&gt;
Proposal Evaluations: from June 22nd until June 28th.&lt;br /&gt;
&lt;br /&gt;
Successful proposals announcement: July 1st&lt;br /&gt;
&lt;br /&gt;
Coding Period Starts: July 10th&lt;br /&gt;
&lt;br /&gt;
Mid-term evaluations: Submitted from August 10th until August 15th.&lt;br /&gt;
&lt;br /&gt;
Coding period ends: September 10th.&lt;br /&gt;
&lt;br /&gt;
Final evaluations: Until September 18th.&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
Please subscribe to the following mailing list to receive updates or ask any particular questions: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ideas ==&lt;br /&gt;
=== OWASP OWTF  ===&lt;br /&gt;
&lt;br /&gt;
''' Brief explanation: '''&lt;br /&gt;
&lt;br /&gt;
Background problem to solve:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Expected results '''&lt;br /&gt;
&lt;br /&gt;
You should be able to...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Prerequisites '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' OWASP Mentors '''&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summer_Code_Sprint2015&amp;diff=195085</id>
		<title>Summer Code Sprint2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summer_Code_Sprint2015&amp;diff=195085"/>
				<updated>2015-05-20T15:51:59Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OWASP Summer Code Sprint 2015 ==&lt;br /&gt;
&lt;br /&gt;
== Goal == &lt;br /&gt;
&lt;br /&gt;
The OWASP Summer Code Sprint 2015 is a program that aims to provide incentives to students to contribute to OWASP projects. By participating in the OWASP Summer Code Sprint a student can get real life experience while contributing to an open source project. A student that successfully completes the program will receive in total $1500.&lt;br /&gt;
&lt;br /&gt;
== Program details ==&lt;br /&gt;
&lt;br /&gt;
''Projects that are eligible:'' All code/tools projects. Documentation projects are excluded.&lt;br /&gt;
&lt;br /&gt;
''Duration:'' 2 months of full-time engagement.&lt;br /&gt;
&lt;br /&gt;
== How it works ==&lt;br /&gt;
&lt;br /&gt;
Any code/tool project can participate in the OWASP Summer Code Sprint. Each project will be guided by an OWASP mentor. Students are evaluated in the middle and at the end of the coding period, based on success criteria identified at the beginning of the project. Successful students will receive $750 after each evaluation, a total of $1500 per student.&lt;br /&gt;
&lt;br /&gt;
Projects are focused on developing security tools. It is required that the code any student produces for those projects will be released as Open Source. &lt;br /&gt;
&lt;br /&gt;
Note on language: English is required for code comments and documentation, but not for interactions between students and advisers. Advisers who speak the same language as their students are encouraged to interact in that language. &lt;br /&gt;
&lt;br /&gt;
== How you can participate ==&lt;br /&gt;
&lt;br /&gt;
=== As a student: ===&lt;br /&gt;
&lt;br /&gt;
1. Review the list of OWASP Projects currently participating in the OWASP Summer Code Sprint 2015.&lt;br /&gt;
&lt;br /&gt;
2. Get in touch with the OWASP Project mentor of your choice.&lt;br /&gt;
&lt;br /&gt;
3. Agree deliverables with OWASP mentor. &lt;br /&gt;
&lt;br /&gt;
4. Work away during Summer 2015.&lt;br /&gt;
&lt;br /&gt;
5. Rise to Open Source Development Glory :-)&lt;br /&gt;
&lt;br /&gt;
(Students apply now!)Google form application link&lt;br /&gt;
&lt;br /&gt;
=== As an OWASP Project Leader: ===&lt;br /&gt;
&lt;br /&gt;
1. Edit this page adding your project and some proposed tasks as per the examples&lt;br /&gt;
&lt;br /&gt;
2. Promote the initiative to your academic contacts&lt;br /&gt;
&lt;br /&gt;
== Timeplan ==&lt;br /&gt;
&lt;br /&gt;
'''Phase 1: Proposals'''&lt;br /&gt;
&lt;br /&gt;
Project leaders who want to include their project to the program should submit some initial proposal ideas on this page. These ideas serve as guidance to the students; they are things that project leaders would like to get done, like new features, improvements, etc.&lt;br /&gt;
&lt;br /&gt;
Subsequently students are invited to submit detailed proposals that can (but do not necessarily have to) be based on these ideas. Students are strongly encouraged to engage with project leaders and each project's community (e.g. through the project's mailing list) in order to discuss the details of their proposal. Proposals should provide details about the implementation, time plan, milestones, etc.&lt;br /&gt;
&lt;br /&gt;
'''Phase 2: Scoring of proposals'''&lt;br /&gt;
&lt;br /&gt;
After the submission of proposals, project leaders and contributors/mentors are required to review the submitted proposals and score them (on a 1 to 5 scale). Each proposal should receive at least 3 assessments/scores from different mentors. Each mentor, contributor or leader can score only proposals for their OWN project. All assessments should provide justification. Reviewers are strongly encouraged to provide constructive comments for students so that they can improve in the future.&lt;br /&gt;
&lt;br /&gt;
Project leaders are responsible to attract a sufficient number of volunteer mentors to score proposals and subsequently supervise those that will get selected.&lt;br /&gt;
&lt;br /&gt;
'''Phase 3: Slot allocation.'''&lt;br /&gt;
&lt;br /&gt;
When proposal scoring has been completed, each project leader requests a specific number of slots. This number should be based on:&lt;br /&gt;
The number of truly outstanding proposals according to submitted scores.&lt;br /&gt;
The importance of the proposal to the project's roadmap.&lt;br /&gt;
The number of available mentors for the project. At least 2 mentors are needed for each proposal that gets accepted.&lt;br /&gt;
If the total number of requested slots is less than or equal to the available number of slots, then all projects get the requested slots. If not, the following rules apply:&lt;br /&gt;
All projects that have requested a slot get at least 1 slot, provided they have a high quality proposal and sufficient number of mentors.&lt;br /&gt;
Two mentors are required per slot allocated to the project.&lt;br /&gt;
The program's administrators get in touch with project leaders, especially those that have requested a large number of slots to receive additional feedback on the requested slots and explore any available possibilities for reducing the requested number of slots. A project leader might choose to donate one or more requested slots back to the pool so that other projects can get more slots. The program administrators can choose to initiate a public discussion between projects in need of more slots and projects that have requested a lot of slots in order to determine the best possible outcome for everyone.&lt;br /&gt;
If all else fails, slots are equally allocated to projects, i.e. all projects get 1 slot; projects that have requested 2 or more slots get an extra slot if available; projects that have requested 3 or more slots get an extra slot if available, etc. When there are no more slots available for all projects that have requested them a draw is used to allocate the remaining slots.&lt;br /&gt;
&lt;br /&gt;
In any case, the program's administrators should perform a final review of the selected proposals to ensure that they are of high quality. If concerns arise they should request additional information from project leaders.&lt;br /&gt;
&lt;br /&gt;
'''Phase 4: Coding.'''&lt;br /&gt;
&lt;br /&gt;
This is the main phase of the program. Students implement their proposal according to the submitted timeplan and under the supervision &lt;br /&gt;
of their mentors.&lt;br /&gt;
&lt;br /&gt;
== Evaluations ==&lt;br /&gt;
&lt;br /&gt;
In the middle of the coding period, mentors should submit an evaluation of their students to ensure that they are on track and provide some feedback both to OWASP and the students.&lt;br /&gt;
&lt;br /&gt;
If no/little progress has been made up to this point, the mentors could decide to fail the student in which case the student does not receive money. If successful, OWASP will pay half the amount ($750). The final evaluations are submitted at the end of the coding period and the second installment ($750) is paid to the student if all agreed deliverables are met. If the student has failed to demonstrate progress during the second period, then the second installment will not be paid and the student will get only half of the amount.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Deadlines == &lt;br /&gt;
Student Applications: June 30th, 2015&lt;br /&gt;
&lt;br /&gt;
Mid-term evaluations: Submitted from August 1st until August 7th.&lt;br /&gt;
&lt;br /&gt;
Coding period ends:&lt;br /&gt;
&lt;br /&gt;
Final evaluations: &lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
Please subscribe to the following mailing list to receive updates or ask any particular questions: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ideas ==&lt;br /&gt;
=== OWASP OWTF  ===&lt;br /&gt;
&lt;br /&gt;
''' Brief explanation: '''&lt;br /&gt;
&lt;br /&gt;
Background problem to solve:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Expected results '''&lt;br /&gt;
&lt;br /&gt;
You should be able to...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Prerequisites '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' OWASP Mentors '''&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summer_Code_Sprint2015&amp;diff=195084</id>
		<title>Summer Code Sprint2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summer_Code_Sprint2015&amp;diff=195084"/>
				<updated>2015-05-20T15:44:04Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OWASP Summer Code Sprint 2015 ==&lt;br /&gt;
&lt;br /&gt;
== Goal == &lt;br /&gt;
&lt;br /&gt;
The OWASP Summer Code Sprint 2015 is a program that aims to provide incentives to students to contribute to OWASP projects. By participating in the OWASP Summer Code Sprint a student can get real life experience while contributing to an open source project. A student that successfully completes the program will receive in total $1500.&lt;br /&gt;
&lt;br /&gt;
== Program details ==&lt;br /&gt;
&lt;br /&gt;
''Projects that are eligible:'' All code/tools projects. Documentation projects are excluded.&lt;br /&gt;
&lt;br /&gt;
''Duration:'' 2 months of full-time engagement.&lt;br /&gt;
&lt;br /&gt;
== How it works ==&lt;br /&gt;
&lt;br /&gt;
Any code/tool project can participate in the OWASP Summer Code Sprint. Each project will be guided by an OWASP mentor. Students are graded by their University, based on success criteria identified at the beginning of the project.&lt;br /&gt;
&lt;br /&gt;
Projects are focused on developing security tools. It is required that the code any student produces for those projects will be released as Open Source. &lt;br /&gt;
&lt;br /&gt;
Note on language: English is required for code comments and documentation, but not for interactions between students and advisers. Advisers who speak the same language as their students are encouraged to interact in that language. &lt;br /&gt;
&lt;br /&gt;
== How you can participate ==&lt;br /&gt;
&lt;br /&gt;
=== As a student: ===&lt;br /&gt;
&lt;br /&gt;
1. Review the list of OWASP Projects currently participating in the OWASP Summer Code Sprint 2015.&lt;br /&gt;
&lt;br /&gt;
2. Get in touch with the OWASP Project mentor of your choice.&lt;br /&gt;
&lt;br /&gt;
3. Agree deliverables with OWASP mentor. &lt;br /&gt;
&lt;br /&gt;
4. Work away during Summer 2015.&lt;br /&gt;
&lt;br /&gt;
5. Rise to Open Source Development Glory :-)&lt;br /&gt;
&lt;br /&gt;
(Students apply now!)Google form application link&lt;br /&gt;
&lt;br /&gt;
=== As an OWASP Project Leader: ===&lt;br /&gt;
&lt;br /&gt;
1. Edit this page adding your project and some proposed tasks as per the examples&lt;br /&gt;
&lt;br /&gt;
2. Promote the initiative to your academic contacts&lt;br /&gt;
&lt;br /&gt;
== Timeplan ==&lt;br /&gt;
&lt;br /&gt;
'''Phase 1: Proposals'''&lt;br /&gt;
&lt;br /&gt;
Project leaders who want to include their project to the program should submit some initial proposal ideas on this page. These ideas serve as guidance to the students; they are things that project leaders would like to get done, like new features, improvements, etc.&lt;br /&gt;
&lt;br /&gt;
Subsequently students are invited to submit detailed proposals that can (but do not necessarily have to) be based on these ideas. Students are strongly encouraged to engage with project leaders and each project's community (e.g. through the project's mailing list) in order to discuss the details of their proposal. Proposals should provide details about the implementation, time plan, milestones, etc.&lt;br /&gt;
&lt;br /&gt;
'''Phase 2: Scoring of proposals'''&lt;br /&gt;
&lt;br /&gt;
After the submission of proposals, project leaders and contributors/mentors are required to review the submitted proposals and score them (on a 1 to 5 scale). Each proposal should receive at least 3 assessments/scores from different mentors. Each mentor, contributor or leader can score only proposals for their OWN project. All assessments should provide justification. Reviewers are strongly encouraged to provide constructive comments for students so that they can improve in the future.&lt;br /&gt;
&lt;br /&gt;
Project leaders are responsible to attract a sufficient number of volunteer mentors to score proposals and subsequently supervise those that will get selected.&lt;br /&gt;
&lt;br /&gt;
'''Phase 3: Slot allocation.'''&lt;br /&gt;
&lt;br /&gt;
When proposal scoring has been completed, each project leader requests a specific number of slots. This number should be based on:&lt;br /&gt;
The number of truly outstanding proposals according to submitted scores.&lt;br /&gt;
The importance of the proposal to the project's roadmap.&lt;br /&gt;
The number of available mentors for the project. At least 2 mentors are needed for each proposal that gets accepted.&lt;br /&gt;
If the total number of requested slots is less than or equal to the available number of slots, then all projects get the requested slots. If not, the following rules apply:&lt;br /&gt;
All projects that have requested a slot get at least 1 slot, provided they have a high quality proposal and sufficient number of mentors.&lt;br /&gt;
Two mentors are required per slot allocated to the project.&lt;br /&gt;
The program's administrators get in touch with project leaders, especially those that have requested a large number of slots to receive additional feedback on the requested slots and explore any available possibilities for reducing the requested number of slots. A project leader might choose to donate one or more requested slots back to the pool so that other projects can get more slots. The program administrators can choose to initiate a public discussion between projects in need of more slots and projects that have requested a lot of slots in order to determine the best possible outcome for everyone.&lt;br /&gt;
If all else fails, slots are equally allocated to projects, i.e. all projects get 1 slot; projects that have requested 2 or more slots get an extra slot if available; projects that have requested 3 or more slots get an extra slot if available, etc. When there are no more slots available for all projects that have requested them a draw is used to allocate the remaining slots.&lt;br /&gt;
&lt;br /&gt;
In any case, the program's administrators should perform a final review of the selected proposals to ensure that they are of high quality. If concerns arise they should request additional information from project leaders.&lt;br /&gt;
&lt;br /&gt;
'''Phase 4: Coding.'''&lt;br /&gt;
&lt;br /&gt;
This is the main phase of the program. Students implement their proposal according to the submitted timeplan and under the supervision &lt;br /&gt;
of their mentors.&lt;br /&gt;
&lt;br /&gt;
== Evaluations ==&lt;br /&gt;
&lt;br /&gt;
In the middle of the coding period, mentors should submit an evaluation of their students to ensure that they are on track and provide some feedback both to OWASP and the students.&lt;br /&gt;
&lt;br /&gt;
If no/little progress has been made up to this point, the mentors could decide to fail the student in which case the student does not receive money. If successful, OWASP will pay half the amount ($750). The final evaluations are submitted at the end of the coding period and the second installment ($750) is paid to the student if all agreed deliverables are met. If the student has failed to demonstrate progress during the second period, then the second installment will not be paid and the student will get only half of the amount.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Deadlines == &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ideas ==&lt;br /&gt;
=== OWASP OWTF  ===&lt;br /&gt;
&lt;br /&gt;
''' Brief explanation: '''&lt;br /&gt;
&lt;br /&gt;
Background problem to solve:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Expected results '''&lt;br /&gt;
&lt;br /&gt;
You should be able to...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Prerequisites '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' OWASP Mentors '''&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summer_Code_Sprint2015&amp;diff=195083</id>
		<title>Summer Code Sprint2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summer_Code_Sprint2015&amp;diff=195083"/>
				<updated>2015-05-20T15:41:24Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OWASP Summer Code Sprint 2015 ==&lt;br /&gt;
&lt;br /&gt;
== Goal == &lt;br /&gt;
&lt;br /&gt;
The OWASP Summer Code Sprint 2015 is a program that aims to provide incentives to students to contribute to OWASP projects. By participating in the OWASP Summer Code Sprint a student can get real life experience while contributing to an open source project. A student that successfully completes the program will receive in total $1500.&lt;br /&gt;
&lt;br /&gt;
== Program details ==&lt;br /&gt;
&lt;br /&gt;
''Projects that are eligible:'' All code/tools projects. Documentation projects are excluded.&lt;br /&gt;
&lt;br /&gt;
''Duration:'' 2 months of full-time engagement.&lt;br /&gt;
&lt;br /&gt;
== How it works ==&lt;br /&gt;
&lt;br /&gt;
Any code/tool project can participate in the OWASP Summer Code Sprint. Each project will be guided by an OWASP mentor. Students are graded by their University, based on success criteria identified at the beginning of the project.&lt;br /&gt;
&lt;br /&gt;
Projects are focused on developing security tools. It is required that the code any student produces for those projects will be released as Open Source. &lt;br /&gt;
&lt;br /&gt;
Note on language: English is required for code comments and documentation, but not for interactions between students and advisers. Advisers who speak the same language as their students are encouraged to interact in that language. &lt;br /&gt;
&lt;br /&gt;
== How you can participate ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Timeplan ==&lt;br /&gt;
&lt;br /&gt;
'''Phase 1: Proposals'''&lt;br /&gt;
Project leaders who want to include their project to the program should submit some initial proposal ideas on this page. These ideas serve as guidance to the students; they are things that project leaders would like to get done, like new features, improvements, etc.&lt;br /&gt;
&lt;br /&gt;
Subsequently students are invited to submit detailed proposals that can (but do not necessarily have to) be based on these ideas. Students are strongly encouraged to engage with project leaders and each project's community (e.g. through the project's mailing list) in order to discuss the details of their proposal. Proposals should provide details about the implementation, time plan, milestones, etc.&lt;br /&gt;
&lt;br /&gt;
'''Phase 2: Scoring of proposals'''&lt;br /&gt;
After the submission of proposals, project leaders and contributors/mentors are required to review the submitted proposals and score them (on a 1 to 5 scale). Each proposal should receive at least 3 assessments/scores from different mentors. Each mentor, contributor or leader can score only proposals for their OWN project. All assessments should provide justification. Reviewers are strongly encouraged to provide constructive comments for students so that they can improve in the future.&lt;br /&gt;
&lt;br /&gt;
Project leaders are responsible to attract a sufficient number of volunteer mentors to score proposals and subsequently supervise those that will get selected.&lt;br /&gt;
&lt;br /&gt;
'''Phase 3: Slot allocation.'''&lt;br /&gt;
When proposal scoring has been completed, each project leader requests a specific number of slots. This number should be based on:&lt;br /&gt;
The number of truly outstanding proposals according to submitted scores.&lt;br /&gt;
The importance of the proposal to the project's roadmap.&lt;br /&gt;
The number of available mentors for the project. At least 2 mentors are needed for each proposal that gets accepted.&lt;br /&gt;
If the total number of requested slots is less than or equal to the available number of slots, then all projects get the requested slots. If not, the following rules apply:&lt;br /&gt;
All projects that have requested a slot get at least 1 slot, provided they have a high quality proposal and sufficient number of mentors.&lt;br /&gt;
Two mentors are required per slot allocated to the project.&lt;br /&gt;
The program's administrators get in touch with project leaders, especially those that have requested a large number of slots to receive additional feedback on the requested slots and explore any available possibilities for reducing the requested number of slots. A project leader might choose to donate one or more requested slots back to the pool so that other projects can get more slots. The program administrators can choose to initiate a public discussion between projects in need of more slots and projects that have requested a lot of slots in order to determine the best possible outcome for everyone.&lt;br /&gt;
If all else fails, slots are equally allocated to projects, i.e. all projects get 1 slot; projects that have requested 2 or more slots get an extra slot if available; projects that have requested 3 or more slots get an extra slot if available, etc. When there are no more slots available for all projects that have requested them a draw is used to allocate the remaining slots.&lt;br /&gt;
&lt;br /&gt;
In any case, the program's administrators should perform a final review of the selected proposals to ensure that they are of high quality. If concerns arise they should request additional information from project leaders.&lt;br /&gt;
&lt;br /&gt;
'''Phase 4: Coding.'''&lt;br /&gt;
This is the main phase of the program. Students implement their proposal according to the submitted timeplan and under the supervision &lt;br /&gt;
of their mentors.&lt;br /&gt;
&lt;br /&gt;
== Evaluations ==&lt;br /&gt;
&lt;br /&gt;
In the middle of the coding period, mentors should submit an evaluation of their students to ensure that they are on track and provide some feedback both to OWASP and the students.&lt;br /&gt;
&lt;br /&gt;
If no/little progress has been made up to this point, the mentors could decide to fail the student in which case the student does not receive money. If successful, OWASP will pay half the amount ($750). The final evaluations are submitted at the end of the coding period and the second installment ($750) is paid to the student if all agreed deliverables are met. If the student has failed to demonstrate progress during the second period, then the second installment will not be paid and the student will get only half of the amount.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Deadlines == &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Mailing List ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Ideas ==&lt;br /&gt;
=== OWASP OWTF - VMS - OWTF Vulnerability Management System (FREE!) ===&lt;br /&gt;
&lt;br /&gt;
''' Brief explanation: '''&lt;br /&gt;
&lt;br /&gt;
Background problem to solve:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Expected results '''&lt;br /&gt;
&lt;br /&gt;
You should be able to...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Prerequisites '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' OWASP Mentors '''&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summer_Code_Sprint2015&amp;diff=195082</id>
		<title>Summer Code Sprint2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summer_Code_Sprint2015&amp;diff=195082"/>
				<updated>2015-05-20T15:33:31Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OWASP Summer Code Sprint 2015 ==&lt;br /&gt;
&lt;br /&gt;
== Goal == &lt;br /&gt;
&lt;br /&gt;
The OWASP Summer Code Sprint 2015 is a program that aims to provide incentives to students to contribute to OWASP projects. By participating in the OWASP Summer Code Sprint a student can get real life experience while contributing to an open source project.&lt;br /&gt;
&lt;br /&gt;
== Program details ==&lt;br /&gt;
&lt;br /&gt;
''Projects that are eligible:'' All code/tools projects. Documentation projects are excluded.&lt;br /&gt;
&lt;br /&gt;
''Duration:'' 2 months of full-time engagement.&lt;br /&gt;
&lt;br /&gt;
== How it works ==&lt;br /&gt;
&lt;br /&gt;
Any code/tool project can participate in the OWASP Summer Code Sprint. Each project will be guided by an OWASP mentor. Students are graded by their University, based on success criteria identified at the beginning of the project.&lt;br /&gt;
&lt;br /&gt;
Projects are focused on developing security tools. It is required that the code any student produces for those projects will be released as Open Source. &lt;br /&gt;
&lt;br /&gt;
Note on language: English is required for code comments and documentation, but not for interactions between students and advisers. Advisers who speak the same language as their students are encouraged to interact in that language. &lt;br /&gt;
&lt;br /&gt;
== Ideas ==&lt;br /&gt;
=== OWASP OWTF - VMS - OWTF Vulnerability Management System (FREE!) ===&lt;br /&gt;
&lt;br /&gt;
''' Brief explanation: '''&lt;br /&gt;
&lt;br /&gt;
Background problem to solve:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Expected results '''&lt;br /&gt;
&lt;br /&gt;
You should be able to...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Prerequisites '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' OWASP Mentors '''&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summer_Code_Sprint2015&amp;diff=195081</id>
		<title>Summer Code Sprint2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summer_Code_Sprint2015&amp;diff=195081"/>
				<updated>2015-05-20T15:32:36Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OWASP Summer Code Sprint 2015 ==&lt;br /&gt;
&lt;br /&gt;
== Goal == &lt;br /&gt;
&lt;br /&gt;
The OWASP Summer Code Sprint 2015 is a program that aims to provide incentives to students to contribute to OWASP projects. By participating in the OWASP Summer Code Sprint a student can get real life experience while contributing to an open source project.&lt;br /&gt;
&lt;br /&gt;
== Program details ==&lt;br /&gt;
&lt;br /&gt;
'Projects that are eligible:' All code/tools projects. Documentation projects are excluded.&lt;br /&gt;
&lt;br /&gt;
'Duration:' 2 months of full-time engagement.&lt;br /&gt;
&lt;br /&gt;
== How it works ==&lt;br /&gt;
&lt;br /&gt;
Any code/tool project can participate in the OWASP Summer Code Sprint. Each project will be guided by an OWASP mentor. Students are graded by their University, based on success criteria identified at the beginning of the project.&lt;br /&gt;
&lt;br /&gt;
Projects are focused on developing security tools. It is required that the code any student produces for those projects will be released as Open Source. &lt;br /&gt;
&lt;br /&gt;
Note on language: English is required for code comments and documentation, but not for interactions between students and advisers. Advisers who speak the same language as their students are encouraged to interact in that language. &lt;br /&gt;
&lt;br /&gt;
== Ideas ==&lt;br /&gt;
=== OWASP OWTF - VMS - OWTF Vulnerability Management System (FREE!) ===&lt;br /&gt;
&lt;br /&gt;
''' Brief explanation: '''&lt;br /&gt;
&lt;br /&gt;
Background problem to solve:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Expected results '''&lt;br /&gt;
&lt;br /&gt;
You should be able to...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Prerequisites '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' OWASP Mentors '''&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summer_Code_Sprint2015&amp;diff=195080</id>
		<title>Summer Code Sprint2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summer_Code_Sprint2015&amp;diff=195080"/>
				<updated>2015-05-20T15:26:21Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: Created page with &amp;quot;== OWASP Summer Code Sprint 2015 ==  == Goal ==   The OWASP Summer Code Sprint 2015 is a program that aims to provide incentives to students to contribute to OWASP projects. B...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OWASP Summer Code Sprint 2015 ==&lt;br /&gt;
&lt;br /&gt;
== Goal == &lt;br /&gt;
&lt;br /&gt;
The OWASP Summer Code Sprint 2015 is a program that aims to provide incentives to students to contribute to OWASP projects. By participating in the OWASP Summer Code Sprint a student can get real life experience while contributing to an open source project.&lt;br /&gt;
&lt;br /&gt;
== Program details ==&lt;br /&gt;
&lt;br /&gt;
[[Projects that are eligible:]] All code/tools projects. Documentation projects are excluded.&lt;br /&gt;
&lt;br /&gt;
[[Duration:]] 2 months of full-time engagement.&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2015_Ideas&amp;diff=189301</id>
		<title>GSoC2015 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2015_Ideas&amp;diff=189301"/>
				<updated>2015-02-09T20:05:48Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
== OWASP Hackademic Challenges ==&lt;br /&gt;
=== OWASP Hackademic Challenges - New challenges and Improvements to the existing ones ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The challenges that have been implemented so far include: web application challenges covering several vulnerabilities included in the OWASP Top 10, cryptographic challenges, and entire virtual machines including several vulnerabilities.&lt;br /&gt;
New challenges need to be created in order to cover a broader set of vulnerabilities.&lt;br /&gt;
Also existing challenges can be modified to accept a broader set of valid answers, e.g. by using regular expressions.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
* Simulated simple buffer overflows&lt;br /&gt;
* SQL injections&lt;br /&gt;
* Man in the middle simulation&lt;br /&gt;
* Bypassing regular expression filtering&lt;br /&gt;
* Your idea here&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New cool challenges&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Source Code testing environment ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Existing challenges are based on a dynamic application testing concept. We would like to work on a project that will give the capability to the attacker to review a vulnerable piece of source code, make corrections and see the result in a realistic (but yet safe) runtime environment. The code can either be run if needed or tested for correctness and security. The implementation challenges of such a project can be numerous, including creating a realistic but also secure environment, testing submitted solutions and grading them in an automatic manner. At the same time there are now numerous sites that support submitting code and then simulate or implement a compiler's functionality.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A source code testing and improvement environment where a user will be able to review, improve and test the result of a piece of source code.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Java. Good understanding of Application Security, source code analysis and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Challenge Sandbox ===&lt;br /&gt;
&lt;br /&gt;
Now, in order to create a challenge, one has to validate the solution with regular expressions (or just plaintext comparison) and report success or failure to the backend,&lt;br /&gt;
we'd like the ability to write a normal vulnerable web application as a challenge and leave it to hackademic to make sure that the server is not affected.&lt;br /&gt;
Since this is probably the most difficult task proposed, if you are considering it, please get in touch with us early on so we can discuss about it and plan it correctly.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
''' *Administrator's point of view* '''&lt;br /&gt;
&lt;br /&gt;
Create an infrastructure that spawns virtual environments for users while keeping the load reasonable on the server(s).&lt;br /&gt;
Or configure apache,php,mysql in a way that allows for multiple instances of the programms to run in parallel completely seperated from the rest of the server.&lt;br /&gt;
The student is expected to provide configuration scripts that do the above&lt;br /&gt;
&lt;br /&gt;
''' *Coder's Way* '''&lt;br /&gt;
&lt;br /&gt;
This is better explained with an example:&lt;br /&gt;
In order to create an sql injection challenge one should be able to call a common unsecure mysql execute statement function.&lt;br /&gt;
The student can override common functions like this providing their own implementation of a very temporary database (based on flat files or nosql solutions e.t.c.).&lt;br /&gt;
The new functions should be able to detect the sqli and apply its results in a secure way(if the student drops a table no actual tables should be dropped but the table should not be visible to the student anymore).&lt;br /&gt;
&lt;br /&gt;
''' * Your solution here * '''&lt;br /&gt;
&lt;br /&gt;
The above solutions are by no way complete,their intention is to start you thinking.&lt;br /&gt;
This is a difficult task so if you consider takling it talk to us early on so we can reach a good solution which is possible in the GSoC timeframe.&lt;br /&gt;
&lt;br /&gt;
''' Expected results '''&lt;br /&gt;
&lt;br /&gt;
You should be able to run a big enough subset of OWASP WebGoat PHP with minimal modification as a Hackademic Challenge&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2015_Ideas&amp;diff=189300</id>
		<title>GSoC2015 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2015_Ideas&amp;diff=189300"/>
				<updated>2015-02-09T20:04:59Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: Created page with &amp;quot;=OWASP Project Requests=  == OWASP Hackademic Challenges == === OWASP Hackademic Challenges - New challenges and Improvements to the existing ones ===  '''Brief Explanation:''...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
== OWASP Hackademic Challenges ==&lt;br /&gt;
=== OWASP Hackademic Challenges - New challenges and Improvements to the existing ones ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The challenges that have been implemented so far include: web application challenges covering several vulnerabilities included in the OWASP Top 10, cryptographic challenges, and entire virtual machines including several vulnerabilities.&lt;br /&gt;
New challenges need to be created in order to cover a broader set of vulnerabilities.&lt;br /&gt;
Also existing challenges can be modified to accept a broader set of valid answers, e.g. by using regular expressions.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
* Simulated simple buffer overflows&lt;br /&gt;
* SQL injections&lt;br /&gt;
* Man in the middle simulation&lt;br /&gt;
* Bypassing regular expression filtering&lt;br /&gt;
* Your idea here&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New cool challenges&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Source Code testing environment ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Existing challenges are based on a dynamic application testing concept. We would like to work on a project that will give the capability to the attacker to review a vulnerable piece of source code, make corrections and see the result in a realistic (but yet safe) runtime environment. The code can either be run if needed or tested for correctness and security. The implementation challenges of such a project can be numerous, including creating a realistic but also secure environment, testing submitted solutions and grading them in an automatic manner. At the same time there are now numerous sites that support submitting code and then simulate or implement a compiler's functionality.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A source code testing and improvement environment where a user will be able to review, improve and test the result of a piece of source code.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Java. Good understanding of Application Security, source code analysis and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Challenge Sandbox ===&lt;br /&gt;
&lt;br /&gt;
Now, in order to create a challenge, one has to validate the solution with regular expressions (or just plaintext comparison) and report success or failure to the backend,&lt;br /&gt;
we'd like the ability to write a normal vulnerable web application as a challenge and leave it to hackademic to make sure that the server is not affected.&lt;br /&gt;
Since this is probably the most difficult task proposed, if you are considering it, please get in touch with us early on so we can discuss about it and plan it correctly.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
''' *Administrator's point of view* '''&lt;br /&gt;
&lt;br /&gt;
Create an infrastructure that spawns virtual environments for users while keeping the load reasonable on the server(s).&lt;br /&gt;
Or configure apache,php,mysql in a way that allows for multiple instances of the programms to run in parallel completely seperated from the rest of the server.&lt;br /&gt;
The student is expected to provide configuration scripts that do the above&lt;br /&gt;
&lt;br /&gt;
''' *Coder's Way* '''&lt;br /&gt;
&lt;br /&gt;
This is better explained with an example:&lt;br /&gt;
In order to create an sql injection challenge one should be able to call a common unsecure mysql execute statement function.&lt;br /&gt;
The student can override common functions like this providing their own implementation of a very temporary database (based on flat files or nosql solutions e.t.c.).&lt;br /&gt;
The new functions should be able to detect the sqli and apply its results in a secure way(if the student drops a table no actual tables should be dropped but the table should not be visible to the student anymore).&lt;br /&gt;
&lt;br /&gt;
''' * Your solution here * '''&lt;br /&gt;
&lt;br /&gt;
The above solutions are by no way complete,their intention is to start you thinking.&lt;br /&gt;
This is a difficult task so if you consider takling it talk to us early on so we can reach a good solution which is possible in the GSoC timeframe.&lt;br /&gt;
&lt;br /&gt;
''' Expected results '''&lt;br /&gt;
&lt;br /&gt;
You should be able to run a big enough subset of OWASP WebGoat PHP with minimal modification as a Hackademic Challenge&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP WebGoatPHP==&lt;br /&gt;
===OWASP WebGoatPHP===&lt;br /&gt;
'''Description:'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' &lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]]&lt;br /&gt;
&lt;br /&gt;
==OWASP CSRF Guard==&lt;br /&gt;
===OWASP CSRF Guard===&lt;br /&gt;
'''Description:''' &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' &lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisites:''' &lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP PHP Security Project==&lt;br /&gt;
===OWASP PHP Security Project===&lt;br /&gt;
&lt;br /&gt;
'''Description:'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results: ''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' &lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' &lt;br /&gt;
&lt;br /&gt;
==OWASP RBAC Project==&lt;br /&gt;
===OWASP RBAC Project===&lt;br /&gt;
'''Description:''' &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' &lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' &lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' &lt;br /&gt;
&lt;br /&gt;
'''Skill Level:''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
&lt;br /&gt;
==OWASP PCI TOOLKIT==&lt;br /&gt;
===OWASP PCI TOOLKIT===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP iGoat ==&lt;br /&gt;
=== OWASP iGoat ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/ZAP OWASP ZAP] ==&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/ESAPI OWASP ESAPI] 2.x ==&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/OWASP_SeraphimDroid_Project OWASP Seraphimdroid Project] ==&lt;br /&gt;
=== [https://www.owasp.org/index.php/OWASP_SeraphimDroid_Project OWASP Seraphimdroid Project] ===&lt;br /&gt;
&lt;br /&gt;
'&lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set (CRS)] ==&lt;br /&gt;
=== [https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project OWASP ModSecurity Core Rule Set (CRS)] - &lt;br /&gt;
&lt;br /&gt;
== [https://www.owasp.org/index.php/OWASP_Bywaf_Project OWASP ByWaf (CRS)] ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC&amp;diff=169593</id>
		<title>GSoC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC&amp;diff=169593"/>
				<updated>2014-03-06T16:55:31Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP has been selected as an official Google Summer of Code (“GSoC”) mentoring organization in 2014!'''&lt;br /&gt;
&lt;br /&gt;
Open source software is changing the world and creating the future.&lt;br /&gt;
Want to help shaping it? We’re looking for students to join us in making 2014 the best Summer of Code yet!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;'''STUDENTS: THE PROPOSAL SUBMISSION PERIOD WILL BE OPEN UNTIL MARCH 21ST 19:00UTC - SUBMIT YOUR APPLICATION NOW HERE:'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.google-melange.com/gsoc/homepage/google/gsoc2014 '''GOOGLE MELANGE''']&lt;br /&gt;
&lt;br /&gt;
OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted.&lt;br /&gt;
&lt;br /&gt;
All students currently enrolled in an accredited institution are welcome to participate in the Google Summer of Code 2014 program, hopefully along with the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
Below you could find all the instructions on how to participate.&lt;br /&gt;
&lt;br /&gt;
== What is GSOC? ==&lt;br /&gt;
&lt;br /&gt;
The Google Summer of Code program (“GSoC”) is designed to encourage student participation in open source development. Through GSoC, accepted student applicants will be paired with OWASP mentors that will guide them through their coding tasks.&lt;br /&gt;
&lt;br /&gt;
Benefits to students include:&lt;br /&gt;
&lt;br /&gt;
* Gaining exposure to real-world software development scenarios,&lt;br /&gt;
* An opportunity for employment in areas related to their academic pursuits and&lt;br /&gt;
* Google will be offering successful student contributors a 5,000 USD stipend, enabling them to focus on their coding projects for three months. &lt;br /&gt;
&lt;br /&gt;
This program is done completely online. Students and mentors from more than 100 countries have participated in past years.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Instructions common to all participants==&lt;br /&gt;
&lt;br /&gt;
All participants should take a look at the [http://code.google.com/p/google-summer-of-code/ Summer of Code Program Wiki] every now and then to be informed about updates and advices. It is also important to read the [http://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2013/help_page Summer of Code FAQ], as it contains useful information.&lt;br /&gt;
All participants will need a Google account in order to join the program. You'll save some time if you create one now.&lt;br /&gt;
&lt;br /&gt;
===Programming Language===&lt;br /&gt;
&lt;br /&gt;
While the majority of OWASP tools are developed using C++/Java, we do accept other languages, including (but not limited to) Python, Ruby and C#. C++ will be accepted for any project. Submissions and ideas for projects in any other language should specifically mention the choice.&lt;br /&gt;
&lt;br /&gt;
==Instructions for students==&lt;br /&gt;
&lt;br /&gt;
Are you a student and want to code for an OWASP project? &lt;br /&gt;
Here are the steps and some tips on getting started:&lt;br /&gt;
&lt;br /&gt;
1) Think of a good idea – For reference see&lt;br /&gt;
[https://www.owasp.org/index.php/GSoC2014_Ideas GSoC 2014 Ideas]&lt;br /&gt;
&lt;br /&gt;
2) Do some research yourself based on the idea, write up a proposal draft &lt;br /&gt;
&lt;br /&gt;
3) Post it to the mailing list at https://groups.google.com/d/forum/owasp-gsoc for initial discussions with OWASP mentors.&lt;br /&gt;
&lt;br /&gt;
4) Based on feedback, write a full proposal – See template below:&lt;br /&gt;
https://www.owasp.org/index.php/GSoC_SAT&lt;br /&gt;
&lt;br /&gt;
5) Submit your proposal to Google from March 10th to March 21st 2014.&lt;br /&gt;
&lt;br /&gt;
Students wishing to participate in GSoC must realize this is a formal commitment to produce code for the selected OWASP Project during three months. You will also take some resources from OWASP project leaders, who will dedicate a portion of their time to mentor you. Therefore, we'd like to have candidates who are committed to helping OWASP mission. You don't have to be a proven developer -- in fact, this whole program is meant to facilitate joining OWASP and other Open Source communities. However, experience in coding and applications are welcome.&lt;br /&gt;
&lt;br /&gt;
You should start familiarising yourself with the components that you plan on working on before the start date. OWASP Project Mentors are available on the mailing list https://groups.google.com/d/forum/owasp-gsoc for help. &lt;br /&gt;
&lt;br /&gt;
===General instructions===&lt;br /&gt;
First of all, please read the instructions common to all participants and the [http://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2014/help_page GSoC FAQ]. Pay special attention to the '''Eligibility''' section of the FAQ.&lt;br /&gt;
&lt;br /&gt;
===Recommended steps===&lt;br /&gt;
* Read Google's instructions for participating&lt;br /&gt;
* Take a look at the list of ideas&lt;br /&gt;
* Come up with project that you're interested in&lt;br /&gt;
* Write a first draft proposal and get someone to review it for you&lt;br /&gt;
* Submit it using Google's web interface&lt;br /&gt;
&lt;br /&gt;
Coming up with an interesting idea is probably the most difficult part of all. It should be something interesting for an OWASP Project, and more importantly for you. It also has to be something that you can realistically achieve in the time available to you.&lt;br /&gt;
&lt;br /&gt;
Finding out what the most pressing issues are in the projects you're interested in is a good start. You can optionally join the mailing lists for that project: you can make acquaintance with developers and your potential mentor, as well as start learning the codebase. We recommend strongly doing that and we will look favourably on applications from students who have started to act like Open Source developers.&lt;br /&gt;
&lt;br /&gt;
===Student proposal guidelines===&lt;br /&gt;
A project proposal is what you will be judged upon. So, as a general recommendation, write a clear proposal on what you plan to do, what your project is and what it is not, etc. Several websites now contain hints and other useful information on writing up such proposals.&lt;br /&gt;
OWASP does not require a specific format or specific list of information, but there is an application template on the OWASP page in Google Melange with some specific points that you should address in your application:&lt;br /&gt;
* Who are you? What are you studying?&lt;br /&gt;
* What exactly do you intend to do? What will not be done?&lt;br /&gt;
* Why are you the right person for this task?&lt;br /&gt;
* To what extent are you familiar with the software you're proposing to work with? Have you used it? Have you read the source? Have  you modified the source?&lt;br /&gt;
* How many hours are you going to work on this a week? 10? 20? 30? 40?&lt;br /&gt;
* Do you have other commitments that we should know about? If so, please suggest a way to compensate if it will take much time away from Summer of Code.&lt;br /&gt;
* Are you comfortable working independently under a supervisor or mentor who is several thousand miles away, not to mention 12 time zones away? How will you work with your mentor to track your work? Have you worked in this style before?&lt;br /&gt;
* If your native language is not English, are you comfortable working closely with a supervisor whose native language is English? What is your native language, as that may help us find a mentor who has the same native language?&lt;br /&gt;
* Where do you live, and can we assign a mentor who is local to you so you can meet in a coffee shop for lunch?&lt;br /&gt;
&lt;br /&gt;
After you have written your proposal, you should get it reviewed. Do not rely on the OWASP mentors to do it for you via the web interface: they will only send back a proposal if they find it lacking. Instead, ask a colleague or a developer to do it for you.&lt;br /&gt;
&lt;br /&gt;
===Hints===&lt;br /&gt;
'''Submit your proposal early:''' early submissions get more attention from developers for the simple fact that they have more time to dedicate to reading them. The more people see it, the more it'll get known.&lt;br /&gt;
&lt;br /&gt;
'''Do not leave it all to the last minute:''' while it is Google that is operating the webserver, it would be wise to expect a last-minute overload on the server. So, make sure you send your application before the final rush. Also, note that the applications submitted very late will get the least attention from mentors, so you may get a low vote because of that.&lt;br /&gt;
&lt;br /&gt;
'''Keep it simple:''' we don't need a 10-page essay on the project and on you (Google won't even let you submit a text that long). You just need to be concise and precise.&lt;br /&gt;
&lt;br /&gt;
'''Know what you are talking about:''' the last thing we need is for students to submit ideas that cannot be accomplished realistically or ideas that aren't even remotely related to OWASP Projects. If your idea is unusual, be sure to explain why you have chosen OWASP to be your mentoring organisation.&lt;br /&gt;
&lt;br /&gt;
'''Aim wide:''' submit more than one proposal, to different OWASP Projects. We also recommend submitting to more than one organisation too. This will increase your chances of being chosen.&lt;br /&gt;
&lt;br /&gt;
The PostgreSQL project has also released a list of [http://www.postgresql.org/developer/summerofcodeadvice.html hints] that you can take a look.&lt;br /&gt;
&lt;br /&gt;
==Instructions for mentors==&lt;br /&gt;
===Ideas===&lt;br /&gt;
If you're a developer and you wish to participate in Summer of Code, you can do it in two ways: the first and easiest is to make a proposal in the [https://www.owasp.org/index.php/GSoC2014_Ideas ideas] page. Take a look at what the different OWASP Projects needs or what you feel should have. Feel free to submit ideas even if you cannot elaborate too much on them.&lt;br /&gt;
&lt;br /&gt;
The second possibility is to be a mentor for a more specific idea. If you wish to do that, please read the instructions common to all participants and the Summer of Code FAQ. Also, please contact the project leader for your application or module and get the go-ahead from him/her. Then edit the ideas page, adding your idea.&lt;br /&gt;
&lt;br /&gt;
Your idea proposal should be a brief description of what the project is, what the desired goals would be, what the student should know and your email address for contact. Please note, though, that the students are not required to follow your idea to the letter, so regard your proposal as just a suggestion.&lt;br /&gt;
&lt;br /&gt;
===Mentoring===&lt;br /&gt;
If you wish to help us even more, you can be an OWASP mentor. We will potentially assign a student to you who has never worked on such a large project and will need some help. Make sure you're up for the task.&lt;br /&gt;
When subscribing yourself as a mentor, please make sure that your application or module maintainer is aware of that. Ask him/her to send the Summer of Code OWASP Administrators an email confirming to know you. This is just a formality to make sure you are a real person we can trust -- the administrators cannot know all active developers by their Google account ID.&lt;br /&gt;
&lt;br /&gt;
If you would like to get an idea of what is involved in being a good mentor, be sure to read the [http://www.booki.cc/gsoc-mentoring mentoring guide]. &lt;br /&gt;
&lt;br /&gt;
You will be subscribed to a mailing list to discuss ideas. We will also require you to read the proposals as they come in and you will be allowed to vote on the proposals, according to rules we will publish later.&lt;br /&gt;
&lt;br /&gt;
Finally, know that we will never assign you to a project you do not want to work on. We will not assign you more projects than you can/want to take on either. And you will have a backup mentor, just in case something unforeseen takes place.&lt;br /&gt;
&lt;br /&gt;
===Subscribing as mentor===&lt;br /&gt;
To subscribe as mentor, you need to complete a few easy steps.&lt;br /&gt;
* Contact the OWASP GSoC administrators to let them know which project you want to mentor for&lt;br /&gt;
* Log in to [http://www.google-melange.com/ Google Melange]&lt;br /&gt;
* Apply as a mentor for OWASP&lt;br /&gt;
* Subscribe to https://groups.google.com/d/forum/owasp-gsoc&lt;br /&gt;
&lt;br /&gt;
'''The current list of GSOC 2014 Mentors are:'''&lt;br /&gt;
* Abraham Aranguren&lt;br /&gt;
* Mennouchi Islam Azeddine&lt;br /&gt;
* Ryan Barnett&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Spyros Gasteratos&lt;br /&gt;
* Gareth Heyes&lt;br /&gt;
* Krzysztof Kotowicz&lt;br /&gt;
* Andres Morales&lt;br /&gt;
* Kostas Papapanagiotou&lt;br /&gt;
* Andres Riancho&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
* Prasad Shenoy&lt;br /&gt;
* Breno Silva&lt;br /&gt;
* Andrew van der Stock&lt;br /&gt;
* Kevin W. Wall&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Instructions for OWASP Project Leaders==&lt;br /&gt;
If you are an OWASP Project Leader, you may be contacted by developers in your project about an idea he wants to submit. &lt;br /&gt;
You should judge whether the idea being proposed coincides with the general goals for your OWASP Project. If you feel that is not the case, you should reply to your developer and suggest that he modify the proposal.&lt;br /&gt;
You do not need yourself to be a mentor, but we would like you to.&lt;br /&gt;
&lt;br /&gt;
==Contact OWASP GSoC Admininstrators==&lt;br /&gt;
To reach the OWASP administrators for Summer of Code, please send an email to the GSOC Administrators below.&lt;br /&gt;
&lt;br /&gt;
'''The GSOC 2014 Administrators are:'''&lt;br /&gt;
&lt;br /&gt;
* Kostas Papapanagiotou (konstantinos@owasp.org)&lt;br /&gt;
* Fabio Cerullo (fcerullo@owasp.org)&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC&amp;diff=167996</id>
		<title>GSoC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC&amp;diff=167996"/>
				<updated>2014-02-12T18:44:43Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP has been selected as an official Google Summer of Code (“GSoC”) mentoring organization in 2013!'''&lt;br /&gt;
&lt;br /&gt;
Open source software is changing the world and creating the future.&lt;br /&gt;
Want to help shaping it? We’re looking for students to join us in making 2013 the best Summer of Code yet!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#FF0000&amp;quot;&amp;gt;'''STUDENTS: THE PROPOSAL SUBMISSION PERIOD IS OPEN UNTIL 3RD MAY 19:00UTC - SUBMIT YOUR APPLICATION NOW HERE:'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.google-melange.com/gsoc/homepage/google/gsoc2013 '''GOOGLE MELANGE''']&lt;br /&gt;
&lt;br /&gt;
OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted.&lt;br /&gt;
&lt;br /&gt;
All students currently enrolled in an accredited institution are welcome to participate in the Google Summer of Code 2013 program, hopefully along with the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
Below you could find all the instructions on how to participate.&lt;br /&gt;
&lt;br /&gt;
== What is GSOC? ==&lt;br /&gt;
&lt;br /&gt;
The Google Summer of Code program (“GSoC”) is designed to encourage student participation in open source development. Through GSoC, accepted student applicants will be paired with OWASP mentors that will guide them through their coding tasks.&lt;br /&gt;
&lt;br /&gt;
Benefits to students include:&lt;br /&gt;
&lt;br /&gt;
* Gaining exposure to real-world software development scenarios,&lt;br /&gt;
* An opportunity for employment in areas related to their academic pursuits and&lt;br /&gt;
* Google will be offering successful student contributors a 5,000 USD stipend, enabling them to focus on their coding projects for three months. &lt;br /&gt;
&lt;br /&gt;
This program is done completely online. Students and mentors from more than 100 countries have participated in past years.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Instructions common to all participants==&lt;br /&gt;
&lt;br /&gt;
All participants should take a look at the [http://code.google.com/p/google-summer-of-code/ Summer of Code Program Wiki] every now and then to be informed about updates and advices. It is also important to read the [http://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2013/help_page Summer of Code FAQ], as it contains useful information.&lt;br /&gt;
All participants will need a Google account in order to join the program. You'll save some time if you create one now.&lt;br /&gt;
&lt;br /&gt;
===Programming Language===&lt;br /&gt;
&lt;br /&gt;
While the majority of OWASP tools are developed using C++/Java, we do accept other languages, including (but not limited to) Python, Ruby and C#. C++ will be accepted for any project. Submissions and ideas for projects in any other language should specifically mention the choice.&lt;br /&gt;
&lt;br /&gt;
==Instructions for students==&lt;br /&gt;
&lt;br /&gt;
Are you a student and want to code for an OWASP project? &lt;br /&gt;
Here are the steps and some tips on getting started:&lt;br /&gt;
&lt;br /&gt;
1) Think of a good idea – For reference see&lt;br /&gt;
[https://www.owasp.org/index.php/GSoC2013_Ideas GSoC 2013 Ideas]&lt;br /&gt;
&lt;br /&gt;
2) Do some research yourself based on the idea, write up a proposal draft &lt;br /&gt;
&lt;br /&gt;
3) Post it to the mailing list at https://groups.google.com/d/forum/owasp-gsoc for initial discussions with OWASP mentors.&lt;br /&gt;
&lt;br /&gt;
4) Based on feedback, write a full proposal – See template below:&lt;br /&gt;
https://www.owasp.org/index.php/GSoC_SAT&lt;br /&gt;
&lt;br /&gt;
5) Submit your proposal to Google from April 22th April to May 3rd 2013.&lt;br /&gt;
&lt;br /&gt;
Students wishing to participate in GSoC must realize this is a formal commitment to produce code for the selected OWASP Project during three months. You will also take some resources from OWASP project leaders, who will dedicate a portion of their time to mentor you. Therefore, we'd like to have candidates who are committed to helping OWASP mission. You don't have to be a proven developer -- in fact, this whole program is meant to facilitate joining OWASP and other Open Source communities. However, experience in coding and applications are welcome.&lt;br /&gt;
&lt;br /&gt;
You should start familiarising yourself with the components that you plan on working on before the start date. OWASP Project Mentors are available on the mailing list https://groups.google.com/d/forum/owasp-gsoc for help. &lt;br /&gt;
&lt;br /&gt;
===General instructions===&lt;br /&gt;
First of all, please read the instructions common to all participants and the [http://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2013/help_page GSoC FAQ]. Pay special attention to the '''Eligibility''' section of the FAQ.&lt;br /&gt;
&lt;br /&gt;
===Recommended steps===&lt;br /&gt;
* Read Google's instructions for participating&lt;br /&gt;
* Take a look at the list of ideas&lt;br /&gt;
* Come up with project that you're interested in&lt;br /&gt;
* Write a first draft proposal and get someone to review it for you&lt;br /&gt;
* Submit it using Google's web interface&lt;br /&gt;
&lt;br /&gt;
Coming up with an interesting idea is probably the most difficult part of all. It should be something interesting for an OWASP Project, and more importantly for you. It also has to be something that you can realistically achieve in the time available to you.&lt;br /&gt;
&lt;br /&gt;
Finding out what the most pressing issues are in the projects you're interested in is a good start. You can optionally join the mailing lists for that project: you can make acquaintance with developers and your potential mentor, as well as start learning the codebase. We recommend strongly doing that and we will look favourably on applications from students who have started to act like Open Source developers.&lt;br /&gt;
&lt;br /&gt;
===Student proposal guidelines===&lt;br /&gt;
A project proposal is what you will be judged upon. So, as a general recommendation, write a clear proposal on what you plan to do, what your project is and what it is not, etc. Several websites now contain hints and other useful information on writing up such proposals.&lt;br /&gt;
OWASP does not require a specific format or specific list of information, but there is an application template on the OWASP page in Google Melange with some specific points that you should address in your application:&lt;br /&gt;
* Who are you? What are you studying?&lt;br /&gt;
* What exactly do you intend to do? What will not be done?&lt;br /&gt;
* Why are you the right person for this task?&lt;br /&gt;
* To what extent are you familiar with the software you're proposing to work with? Have you used it? Have you read the source? Have  you modified the source?&lt;br /&gt;
* How many hours are you going to work on this a week? 10? 20? 30? 40?&lt;br /&gt;
* Do you have other commitments that we should know about? If so, please suggest a way to compensate if it will take much time away from Summer of Code.&lt;br /&gt;
* Are you comfortable working independently under a supervisor or mentor who is several thousand miles away, not to mention 12 time zones away? How will you work with your mentor to track your work? Have you worked in this style before?&lt;br /&gt;
* If your native language is not English, are you comfortable working closely with a supervisor whose native language is English? What is your native language, as that may help us find a mentor who has the same native language?&lt;br /&gt;
* Where do you live, and can we assign a mentor who is local to you so you can meet in a coffee shop for lunch?&lt;br /&gt;
&lt;br /&gt;
After you have written your proposal, you should get it reviewed. Do not rely on the OWASP mentors to do it for you via the web interface: they will only send back a proposal if they find it lacking. Instead, ask a colleague or a developer to do it for you.&lt;br /&gt;
&lt;br /&gt;
===Hints===&lt;br /&gt;
'''Submit your proposal early:''' early submissions get more attention from developers for the simple fact that they have more time to dedicate to reading them. The more people see it, the more it'll get known.&lt;br /&gt;
&lt;br /&gt;
'''Do not leave it all to the last minute:''' while it is Google that is operating the webserver, it would be wise to expect a last-minute overload on the server. So, make sure you send your application before the final rush. Also, note that the applications submitted very late will get the least attention from mentors, so you may get a low vote because of that.&lt;br /&gt;
&lt;br /&gt;
'''Keep it simple:''' we don't need a 10-page essay on the project and on you (Google won't even let you submit a text that long). You just need to be concise and precise.&lt;br /&gt;
&lt;br /&gt;
'''Know what you are talking about:''' the last thing we need is for students to submit ideas that cannot be accomplished realistically or ideas that aren't even remotely related to OWASP Projects. If your idea is unusual, be sure to explain why you have chosen OWASP to be your mentoring organisation.&lt;br /&gt;
&lt;br /&gt;
'''Aim wide:''' submit more than one proposal, to different OWASP Projects. We also recommend submitting to more than one organisation too. This will increase your chances of being chosen.&lt;br /&gt;
&lt;br /&gt;
The PostgreSQL project has also released a list of [http://www.postgresql.org/developer/summerofcodeadvice.html hints] that you can take a look.&lt;br /&gt;
&lt;br /&gt;
==Instructions for mentors==&lt;br /&gt;
===Ideas===&lt;br /&gt;
If you're a developer and you wish to participate in Summer of Code, you can do it in two ways: the first and easiest is to make a proposal in the [https://www.owasp.org/index.php/GSoC2013_Ideas ideas] page. Take a look at what the different OWASP Projects needs or what you feel should have. Feel free to submit ideas even if you cannot elaborate too much on them.&lt;br /&gt;
&lt;br /&gt;
The second possibility is to be a mentor for a more specific idea. If you wish to do that, please read the instructions common to all participants and the Summer of Code FAQ. Also, please contact the project leader for your application or module and get the go-ahead from him/her. Then edit the ideas page, adding your idea.&lt;br /&gt;
&lt;br /&gt;
Your idea proposal should be a brief description of what the project is, what the desired goals would be, what the student should know and your email address for contact. Please note, though, that the students are not required to follow your idea to the letter, so regard your proposal as just a suggestion.&lt;br /&gt;
&lt;br /&gt;
===Mentoring===&lt;br /&gt;
If you wish to help us even more, you can be an OWASP mentor. We will potentially assign a student to you who has never worked on such a large project and will need some help. Make sure you're up for the task.&lt;br /&gt;
When subscribing yourself as a mentor, please make sure that your application or module maintainer is aware of that. Ask him/her to send the Summer of Code OWASP Administrators an email confirming to know you. This is just a formality to make sure you are a real person we can trust -- the administrators cannot know all active developers by their Google account ID.&lt;br /&gt;
&lt;br /&gt;
If you would like to get an idea of what is involved in being a good mentor, be sure to read the [http://www.booki.cc/gsoc-mentoring mentoring guide]. &lt;br /&gt;
&lt;br /&gt;
You will be subscribed to a mailing list to discuss ideas. We will also require you to read the proposals as they come in and you will be allowed to vote on the proposals, according to rules we will publish later.&lt;br /&gt;
&lt;br /&gt;
Finally, know that we will never assign you to a project you do not want to work on. We will not assign you more projects than you can/want to take on either. And you will have a backup mentor, just in case something unforeseen takes place.&lt;br /&gt;
&lt;br /&gt;
===Subscribing as mentor===&lt;br /&gt;
To subscribe as mentor, you need to complete a few easy steps.&lt;br /&gt;
* Contact the OWASP GSoC administrators to let them know which project you want to mentor for&lt;br /&gt;
* Log in to [http://www.google-melange.com/ Google Melange]&lt;br /&gt;
* Apply as a mentor for OWASP&lt;br /&gt;
* Subscribe to https://groups.google.com/d/forum/owasp-gsoc&lt;br /&gt;
&lt;br /&gt;
'''The current list of GSOC 2013 Mentors are:'''&lt;br /&gt;
* Abraham Aranguren&lt;br /&gt;
* Mennouchi Islam Azeddine&lt;br /&gt;
* Ryan Barnett&lt;br /&gt;
* Simon Bennetts&lt;br /&gt;
* Johanna Curiel&lt;br /&gt;
* Spyros Gasteratos&lt;br /&gt;
* Gareth Heyes&lt;br /&gt;
* Krzysztof Kotowicz&lt;br /&gt;
* Andres Morales&lt;br /&gt;
* Kostas Papapanagiotou&lt;br /&gt;
* Andres Riancho&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
* Prasad Shenoy&lt;br /&gt;
* Breno Silva&lt;br /&gt;
* Andrew van der Stock&lt;br /&gt;
* Kevin W. Wall&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Instructions for OWASP Project Leaders==&lt;br /&gt;
If you are an OWASP Project Leader, you may be contacted by developers in your project about an idea he wants to submit. &lt;br /&gt;
You should judge whether the idea being proposed coincides with the general goals for your OWASP Project. If you feel that is not the case, you should reply to your developer and suggest that he modify the proposal.&lt;br /&gt;
You do not need yourself to be a mentor, but we would like you to.&lt;br /&gt;
&lt;br /&gt;
==Contact OWASP GSoC Admininstrators==&lt;br /&gt;
To reach the OWASP administrators for Summer of Code, please send an email to the GSOC Administrators below.&lt;br /&gt;
&lt;br /&gt;
'''The GSOC 2013 Administrators are:'''&lt;br /&gt;
&lt;br /&gt;
* Fabio Cerullo (fcerullo@owasp.org)&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2014_Ideas&amp;diff=167483</id>
		<title>GSoC2014 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2014_Ideas&amp;diff=167483"/>
				<updated>2014-02-05T21:47:31Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: Created page with &amp;quot;==OWASP Project Requests==  === OWASP Hackademic Challenges - New challenges and Improvements to the existing ones ===  ''''Brief Explanation:'''  The challenges that have bee...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==OWASP Project Requests==&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - New challenges and Improvements to the existing ones ===&lt;br /&gt;
&lt;br /&gt;
''''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The challenges that have been implemented so far include: web application challenges covering several vulnerabilities included in the OWASP Top 10, cryptographic challenges, and entire virtual machines including several vulnerabilities.&lt;br /&gt;
New challenges need to be created in order to cover a broader set of vulnerabilities.&lt;br /&gt;
Also existing challenges can be modified to accept a broader set of valid answers, e.g. by using regular expressions.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
* Simulated simple buffer overflows&lt;br /&gt;
* SQL injections&lt;br /&gt;
* Man in the middle simulation&lt;br /&gt;
* Bypassing regular expression filtering&lt;br /&gt;
* Your idea here&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New cool challenges&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Source Code testing environment ===&lt;br /&gt;
&lt;br /&gt;
''''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Existing challenges are based on a dynamic application testing concept. We would like to work on a project that will give the capability to the attacker to review a vulnerable piece of source code, make corrections and see the result in a realistic (but yet safe) runtime environment. The code can either be run if needed or tested for correctness and security. The implementation challenges of such a project can be numerous, including creating a realistic but also secure environment, testing submitted solutions and grading them in an automatic manner. At the same time there are now numerous sites that support submitting code and then simulate or implement a compiler's functionality.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A source code testing and improvement environment where a user will be able to review, improve and test the result of a piece of source code.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Java. Good understanding of Application Security, source code analysis and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - CMS improvements ===&lt;br /&gt;
&lt;br /&gt;
''''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The new CMS was created during last year's GSOC. We have received feedback from users that suggest various improvements regarding functionality e.g. better user, teacher and challenges management. There are also some security improvements that are needed and in general any functionality that adds up to the educational nature of the project is more than welcome.&lt;br /&gt;
&lt;br /&gt;
Ideas on this project:&lt;br /&gt;
&lt;br /&gt;
* '''Plugin api and plugin actions interface'''&lt;br /&gt;
&lt;br /&gt;
An easy way for users to code their own plugins which will modify the appearance of hackademic or add to the functionality.&lt;br /&gt;
&lt;br /&gt;
* '''Ability to show different articles on the user's home screen''' &lt;br /&gt;
&lt;br /&gt;
Now each user is served the latest article in her/his home screen. We need the ability for either  the teacher/admin to be able to define what article each class is served.&lt;br /&gt;
&lt;br /&gt;
* '''Ability to define series of challenges'''&lt;br /&gt;
&lt;br /&gt;
The teacher/admin should be able to define a series of challenges (e.g. 2,5,3,1) which are meant to be solved in that order and if one is not solved then the student can't try the next one.&lt;br /&gt;
&lt;br /&gt;
* ''' Tagging of articles, users, challenges '''&lt;br /&gt;
&lt;br /&gt;
A user should be able to put tags on articles and challenges if he is a student and on users, classes, articles and challenges if he is a teacher.&lt;br /&gt;
Also the user should be able to search according to the tags.&lt;br /&gt;
&lt;br /&gt;
* '''Your idea here''' &lt;br /&gt;
&lt;br /&gt;
We welcome new ideas to make the project look awesome.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New features  and security improvements on the CMS part of the project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP and HTML. Good understanding of Application Security and related vulnerabilities if you undertake security improvements. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Greece&amp;diff=163607</id>
		<title>Greece</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Greece&amp;diff=163607"/>
				<updated>2013-11-19T18:48:26Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: /* Η Ελληνική Κοινότητα */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Greekchapterlogo.gif]] &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Greece|extra=The chapter leader is [mailto:konstantinos@owasp.org Konstantinos Papapanagiotou]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-greece|emailarchives=http://lists.owasp.org/pipermail/owasp-greece}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Greece&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Greek Chapter Committee ==&lt;br /&gt;
&lt;br /&gt;
Chapter Leader: [mailto:conpapATowasp.gr Konstantinos Papapanagiotou]&lt;br /&gt;
&lt;br /&gt;
Committee Members: [mailto:manosATowasp.gr Emmanouel Kellinis], [mailto:steliosATowasp.gr Stelios Tigkas], [mailto:vsvlachosATowasp.gr Vasileios Vlachos]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Τι είναι το OWASP  ==&lt;br /&gt;
&lt;br /&gt;
Το ΟWASP (Open Web Application Security Project – http://www.owasp.org) αποτελεί μία πρωτοβουλία που αποσκοπεί στον εντοπισμό και στην καταπολέμηση των τρωτών σημείων του λογισμικού τέτοιων εφαρμογών. Όντας ένας μη κερδοσκοπικός οργανισμός, ακολουθεί την ιδεολογία του Ελεύθερου/Ανοικτού λογισμικού, παρέχοντας δωρεάν αλλά επαγγελματικής ποιότητας έγγραφα, εργαλεία και πρότυπα. Παράλληλα, ενισχύει τη διοργάνωση συνεδρίων και τοπικών ομάδων εργασίας (local chapters), τη δημοσίευση άρθρων και συγγραμμάτων, καθώς και την ανταλλαγή απόψεων μέσα από forums και mailing lists. Το OWASP απαριθμεί μέλη σε όλο τον πλανήτη, συμπεριλαμβανομένων μεγάλων οργανισμών και εταιριών του χώρου όπως VISA, Deloitte, Unisys, Foundstone, και άλλες. &lt;br /&gt;
&lt;br /&gt;
== Η Ελληνική Κοινότητα ==&lt;br /&gt;
&lt;br /&gt;
Η ελληνική ομάδα εργασίας του OWASP δημιουργήθηκε το 2005, με κύριο στόχο την ενημέρωση και την αφύπνιση της ελληνικής κοινότητας αναφορικά με τους κινδύνους ασφαλείας στις διαδικτυακές εφαρμογές. Αφορμή για τη δημιουργία της αποτέλεσαν ουσιαστικά τα ολοένα αυξανόμενα περιστατικά ασφαλείας στο διαδίκτυο, όπως τα κρούσματα phishing σε ελληνικές τράπεζες. &lt;br /&gt;
&lt;br /&gt;
Σήμερα, η ελληνική ομάδα του OWASP δραστηριοποιείται σε προγράμματα Ελεύθερου/Ανοικτού λογισμικού καθώς και μεταφράσεις κειμένων του OWASP στα ελληνικά, προωθώντας την ιδέα του OWASP σε τοπικό επίπεδο. Παράλληλα, μέσα από τη mailing list της ενημερώνει και προκαλεί συζητήσεις σχετικά με επίκαιρα θέματα ασφάλειας στο διαδίκτυο, ενώ εκδίδει και μηνιαίο newsletter.&lt;br /&gt;
&lt;br /&gt;
'''Η Ελληνική Ομάδα Εργασίας του OWASP χρησιμοποιεί για τις εκτυπώσεις της τον [http://www8.hp.com/in/en/products/printers/product-detail.html?oid=5261595#!tab=features HP Deskjet Ink Advantage 4625], επιτυγχάνοντας μεγάλη οικονομία στα μελάνια εκτύπωσης.'''&lt;br /&gt;
&lt;br /&gt;
== Συμμετοχή  ==&lt;br /&gt;
&lt;br /&gt;
Η ελληνική κοινότητα του OWASP επιθυμεί να φέρει σε επαφή όλους όσους ενδιαφέρονται και προβληματίζονται για την ασφάλεια των διαδικτυακών εφαρμογών. Ταυτόχρονα, ευπρόσδεκτοι είναι και εθελοντές που προτίθενται να δουλέψουν σε προγράμματα Ελεύθερου/Ανοιχτού λογισμικού που συντονίζει το OWASP. Σας προσκαλούμε να μοιραστείτε μαζί μας ιδέες, σκέψεις και προβληματισμούς σχετικά με επιθέσεις, μεθόδους άμυνας και αντιμετώπισης, εργαλεία και βέλτιστες πρακτικές ασφάλειας στο διαδίκτυο. Ανεξάρτητα από το τεχνικό επίπεδο, το βάθος της προσέγγισης και τις χρησιμοποιούμενες μεθόδους, θα χαρούμε ιδιαίτερα αν έρθετε σε επαφή μαζί μας. &lt;br /&gt;
&lt;br /&gt;
Για να εγγραφείτε στη '''mailing list''' της ελληνικής ομάδας εργασίας επισκεφθείτε [http://lists.owasp.org/mailman/listinfo/owasp-greece αυτή τη σελίδα]. &lt;br /&gt;
&lt;br /&gt;
== Ευχαριστίες  ==&lt;br /&gt;
&lt;br /&gt;
Θα θέλαμε να ευχαριστήσουμε το [http://www.di.uoa.gr Τμήμα Πληροφορικής και Τηλεπικοινωνιών] του Πανεπιστημίου Αθηνών για τη βοήθεια που παρέχει στην ελληνική ομάδα εργασίας. &lt;br /&gt;
&lt;br /&gt;
[[Image:Universityofathenslogo.gif]] &lt;br /&gt;
&lt;br /&gt;
Επίσης θα θέλαμε να ευχαριστήσουμε θερμά το περιοδικό [http://www.linuxinside.gr/ Linux Inside] για την υποστήριξη και την προβολή καθώς και το [http://www.zero.gr zero.gr].&lt;br /&gt;
&lt;br /&gt;
[[Image:Linuxinside-logo.png]] [[Image:zerologo.png]]&lt;br /&gt;
&lt;br /&gt;
==== News ====&lt;br /&gt;
&lt;br /&gt;
== Ομάδες Εργασίας  ==&lt;br /&gt;
&lt;br /&gt;
Αυτήν την περίοδο ψάχνουμε για νέες project ιδέες. Εάν έχεις καινούρια ίδεα για κάποιο εργαλείο, στατιστικά στοιχεία για το πόσο σοβαρά λαμβάνουν στην Ελλάδα το application security οι προγραμματιστές, εταιρίες λογισμικού κτλ ή αν έχεις οποιάδηποτε άλλη ιδέα με κεντρικό θέμα το application security επικοινωνήστε μαζί μας. &lt;br /&gt;
&lt;br /&gt;
== Νέα  ==&lt;br /&gt;
&lt;br /&gt;
'''16/3/2011''' - Η πρώτη συνάντηση θα πραγματοποιηθεί στο [http://www.colabworkspace.com/ CoLab Athens Workspace]. Περισσότερες πληφορορίες και εγγραφές [http://owaspgr01.eventbrite.com/ εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''20/9/2009''' - Ο [mailto:vsvlachosATowasp.gr Βασίλης Βλάχος], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, θα συντονίσει στις 26/9/2009 τη συνεδρία με θέμα Web Application Security που συνδιοργανώνει το OWASP.gr στα πλάισια του συνεδρίου 4th Mediterranean Conference on Information Systems ([http://www.mcis2009.org MCIS 2009]). Η συνεδρία θα πραγματοποιηθεί στις 26 Σεπτεμβρίου 2009 και ώρα 15:30 στο Οικονομικό Πανεπιστήμιο Αθηνών. &lt;br /&gt;
&lt;br /&gt;
'''5/3/2009''' - Ο [mailto:conpapATowasp.gr Κωνσταντίνος Παπαπαναγιώτου], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, θα συντονίσει στις 18 Μαρτίου την ενότητα &amp;quot;Πρότυπα και Νομικές Απαιτήσεις&amp;quot; στα πλαίσια της [http://www.tsomokos.gr/projects2.php EXPOSEC 2009], που διεξάγεται στις 17 και 18 Μαρτίου στο Ζάππειο Μέγαρο. &lt;br /&gt;
&lt;br /&gt;
'''3/2/2009''' - Ο [mailto:conpapATowasp.gr Κωνσταντίνος Παπαπαναγιώτου], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, έδωσε ζωντανή συνέντευξη στην εκπομπή Ατζέντα+ της ψηφιακής πλατφόρμας της ΕΡΤ (κανάλι Σπορ+/Info+), όπου μίλησε για τις δραστηριότητες του OWASP στην Ελλάδα και έδωσε απλές συμβουλές για την ασφάλεια στο Internet. Μπορείτε να παρακολουθήσετε το βίντεο της συνέντευξης [http://www.youtube.com/watch?v=q0RPKaPGICI εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''10/10/2008''' - Το OWASP.gr συμμετέχει στο Athens Digital Week που πραγματοποιείται από τις 13 ως τις 19 Οκτωβρίου στη Τεχνόπολη στο Γκάζι (http://conf.ellak.gr). &lt;br /&gt;
&lt;br /&gt;
'''30/9/2008''' - Το OWASP.gr παρουσιάζει το πρώτο Ελληνικό blog με θέμα την ασφάλεια των διαδικτυακών εφαρμογών αλλά και των υπολογιστικών συστημάτων γενικότερα. Επισκεφθείτε το επίσημο blog της Ελληνικής ομάδας εργασίας του OWASP στο: http://blog.owasp.gr. &lt;br /&gt;
&lt;br /&gt;
'''5/6/2008''' - Η παρουσίαση του OWASP.gr στο 3ο Συνέδριο ΕΛ/ΛΑΚ είναι διαθέσιμη μέσα από την ενότητα [https://www.owasp.org/index.php/OWASP_Education_Presentation#Chapter_Presentations Chapter Presentations] και συγκεκριμένα [http://www.owasp.org/images/e/e5/OWASP_ellak-Greece.ppt εδώ]. Επίσης, βίντεο της παρουσίασης μπορείτε να βρείτε [http://conf.ellak.gr/2008/index.php?option=com_eventlist&amp;amp;Itemid=119&amp;amp;func=details&amp;amp;did=19 εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''26/5/2008''' - Το OWASP.gr αναπτύσσει έναν Web Vulnerability Scanner. Μπορείτε να κατεβάσετε την beta έκδοσή του από [https://www.owasp.org/images/6/65/WVS_beta-0.2.1.zip εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''15/5/2008''' - Το OWASP.gr συμμετέχει στο 3ο Συνέδριο ΕΛ/ΛΑΚ που πραγματοποιείται στις 27 και 28 Μαΐου στο Εθνικό Μετσόβιο Πολυτεχνείο (http://conf.ellak.gr). &lt;br /&gt;
&lt;br /&gt;
'''20/2/2008''' - Το OWASP.gr συμμετέχει στο 1ο Συνέδριο Κοινοτήτων Ελεύθερου Λογισμικού/Λογισμικού Ανοιχτού Κώδικα που διοργανώνεται στις 21 και 22 Μαρτίου στο Εθνικό Μετσόβειο Πολυτεχνείο (http://www.fosscomm.gr/). &lt;br /&gt;
&lt;br /&gt;
'''2/2/2008''' - Το OWASP.gr συμμετέχει στην παρουσίαση της ομάδας IA4 του E-Business Forum (Προπαρασκευαστικές δράσεις για τη δημιουργία Ελληνικού Κέντρου Επείγουσας Αντιμετώπισης Ψηφιακών Απειλών GR-CERT) στα πλαίσια του Money Show 2008 στις 2/2/2008 στην Αίγλη Ζαππείου. &lt;br /&gt;
&lt;br /&gt;
'''18/4/2007''' - Το E-Βusiness Forum (http://www.ebusinessforum.gr/) έχει δημιουργήσει μία ομάδα εργασίας η οποία έχει αναλάβει τις &amp;quot;'''Προπαρασκευαστικές δράσεις για τη δημιουργία Ελληνικού Κέντρου Επείγουσας Αντιμετώπισης Ψηφιακών Απειλών (GR-CERT)'''&amp;quot;. Πληροφορίες σχετικά με τους στόχους και τις δραστηριότητες της ομάδας υπάρχουν [http://www.ebusinessforum.gr/teams/teamsall/view/index.php?ctn=102&amp;amp;language=el εδώ] αλλά και [http://sense.dmst.aueb.gr/ia4/index.php/Main_Page εδώ]. Όποιος ενδιαφέρεται και μπορεί να βοηθήσει να δηλώσει συμμετοχή στις παραπάνω σελίδες ή να απευθυνθεί στο κ. Βασίλειο Βλάχο (στοιχεία επικοινωνίας υπάρχουν στα παραπάνω site). &lt;br /&gt;
&lt;br /&gt;
Καταχωρήθηκε το [http://www.owasp.gr OWASP.gr]! &lt;br /&gt;
&lt;br /&gt;
Με τη βοήθεια του Αναστάσιου Καζακώνη μετέφράστηκαν το &amp;quot;OWASP Top Ten Vulnerabilties in Web Application Security&amp;quot; και το OWASP AppSec FAQ στα Ελληνικά. Έτσι είναι πλέον διαθέσιμες οι ελληνικές εκδόσεις του [http://www.owasp.org/images/8/8b/OWASP_Top_Ten_2004_Greek.pdf OWASP Top Ten] και του [http://www.owasp.org/images/e/ed/OWASP_faq_Greek.pdf OWASP AppSec FAQ]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meetings ====&lt;br /&gt;
&lt;br /&gt;
== Call for Presentations ==&lt;br /&gt;
Anything related to '''Application''' or '''Information Security'''&lt;br /&gt;
*Secure Coding Practices&lt;br /&gt;
*Secure Application Development Lifecycle&lt;br /&gt;
*Penetration Testing and Exploitation&lt;br /&gt;
*Code Reviewing&lt;br /&gt;
*Projects and Tools&lt;br /&gt;
*Methodologies&lt;br /&gt;
*Best Practices&lt;br /&gt;
&lt;br /&gt;
Send:&lt;br /&gt;
*Title&lt;br /&gt;
*Abstract&lt;br /&gt;
*Name and affiliation&lt;br /&gt;
*Short Bio&lt;br /&gt;
To: [mailto:konstantinos@owasp.org konstantinos@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== Meetings ==&lt;br /&gt;
&lt;br /&gt;
=== 19/4/2013 ===&lt;br /&gt;
Χώρος: PWC / Κηφισίας 260, Χαλάνδρι&lt;br /&gt;
&lt;br /&gt;
Περιγραφή: [https://www.owasp.org/images/e/e0/Training_19.04.13_ISACA_OWASP.pdf https://www.owasp.org/images/e/e0/Training_19.04.13_ISACA_OWASP.pdf]&lt;br /&gt;
&lt;br /&gt;
* '''Being a spammer for 40 minutes: how spam works, why it's slowly going away and why it won't disappear''' - '''Martijn Grooten''' (Virus Bulletin) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 5/5/2011 ===&lt;br /&gt;
Χώρος: [http://www.di.uoa.gr/ Τμήμα Πληροφορικής και Τηλεπικοινωνιών/ΕΚΠΑ]&lt;br /&gt;
&lt;br /&gt;
Περιγραφή: [http://owaspgr02.eventbrite.com/ http://owaspgr02.eventbrite.com/]&lt;br /&gt;
&lt;br /&gt;
* '''Welcome and OWASP News''' - '''Konstantinos Papapanagiotou''' (OWASP Greek Chapter Leader/Syntax IT Inc) '''([[Media:OWASP_gr_meeting_2011_02.pdf‎|PDF]])'''&lt;br /&gt;
* '''Protecting the Core: Kernel Exploitation Mitigations''' - '''Patroklos Argyroudis and Dimitris Glynos''' (Census) '''([http://census.gr/media/bheu-2011-slides.pdf PDF])'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 16/3/2011 ===&lt;br /&gt;
Χώρος: [http://www.colabworkspace.com/ coLab Athens Workspace]&lt;br /&gt;
&lt;br /&gt;
Περιγραφή: [http://owaspgr01.eventbrite.com/ http://owaspgr01.eventbrite.com/]&lt;br /&gt;
&lt;br /&gt;
* '''Welcome and Intro to OWASP Meetings''' '''([[Media:OWASP_gr_meeting_2011_01_intro.pdf‎‎|PDF]])'''&lt;br /&gt;
* '''Application Security for the Masses''' - '''Konstantinos Papapanagiotou''' (OWASP Greek Chapter Leader/Syntax IT Inc) '''([[Media:OWASP_gr_meeting_2011_01_appsec_masses.pdf|PDF]])'''&lt;br /&gt;
* '''Cyberdefense and the Kobayashi Maru''' - '''Yiorgos Adamopoulos''' (TEE) '''([[Media:Adamopoulos_Cyberdefense_and_the_Kobayashi_Maru.pdf‎|PDF]])'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Events ====&lt;br /&gt;
&lt;br /&gt;
'''26/9/2009''' - Το OWASP.gr συνδιοργανώνει ένα session με θέμα Web Application Security στα πλαίσια του 4th Mediterranean Conference on Information Systems ([http://www.mcis2009.org MCIS 2009]) στις 26 Σεπτεμβρίου 2009 και ώρα 15:30 στο Οικονομικό Πανεπιστήμιο Αθηνών. Το αναλυτικό πρόγραμμα του συνεδρίου καθώς και περισσότερες πληροφορίες υπάρχουν [http://www.mcis2009.org εδώ]. Το session θα συντονίζει ο [mailto:vsvlachosATowasp.gr Βασίλης Βλάχος], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα. &lt;br /&gt;
&lt;br /&gt;
'''18/3/2009''' - Συμμετοχή του OWASP.gr στην [http://www.tsomokos.gr/projects2.php EXPOSEC 2009] που θα πραγματοποιηθεί στις 17 και 18 Μαρτίου στο Ζάππειο Μέγαρο. Ο [mailto:conpapATowasp.gr Κωνσταντίνος Παπαπαναγιώτου], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, θα συντονίσει στις 18 Μαρτίου την ενότητα &amp;quot;Πρότυπα και Νομικές Απαιτήσεις&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
'''17 και 18/10/2008''' - Παρουσίαση του OWASP.gr στα πλαίσια του '''Athens Digital Week''' που πραγματοποιείται από τις 13 ως τις 19 Οκτωβρίου στην Τεχνόπολη στο Γκάζι (http://www.athensdigitalweek.gr). Σύμφωνα με το [http://www.athensdigitalweek.gr/el/the-core/talk-zone πρόγραμμα], η παρουσίαση θα γίνει την Παρασκευή, 17 Οκτωβρίου 2008 και ώρα 16:30 καθώς και το Σάββατο, 18 Οκτωβρίου 2008 και ώρα 18:00. &lt;br /&gt;
&lt;br /&gt;
'''27/5/2008''' - Παρουσίαση του OWASP.gr στα πλαίσια του '''3ου Συνεδρίου Ελεύθερου Λογισμικού / Λογισμικού Ανοιχτού Κώδικα''' που πραγματοποιείται στις 27 και 28 Μαΐου στο Εθνικό Μετσόβειο Πολυτεχνείο (http://conf.ellak.gr). Σύμφωνα με το [http://conf.ellak.gr/2008/index.php?option=com_jcalpro&amp;amp;Itemid=138&amp;amp;extmode=week&amp;amp;date=2008-05-25 πρόγραμμα] του συνεδρίου, η παρουσίαση θα γίνει την Τρίτη, 27 Μαΐου 2008 και ώρα 11:15. &lt;br /&gt;
&lt;br /&gt;
'''22/3/2008''' - Παρουσίαση του OWASP.gr στα πλαίσια του '''1ου Συνέδριο Κοινοτήτων Ελεύθερου Λογισμικού/Λογισμικού Ανοιχτού Κώδικα''' που διοργανώνεται στις 21 και 22 Μαρτίου στο Εθνικό Μετσόβειο Πολυτεχνείο (http://www.fosscomm.gr/). Σύμφωνα με το [http://www.fosscomm.gr/xoops20171/htdocs/uploads/programma_synedriou.html πρόγραμμα], η παρουσίαση θα γίνει στις 17:50. &lt;br /&gt;
&lt;br /&gt;
'''2/2/2008''' - Παρουσίαση της ομάδας IA4 του E-Business Forum (Προπαρασκευαστικές δράσεις για τη δημιουργία Ελληνικού Κέντρου Επείγουσας Αντιμετώπισης Ψηφιακών Απειλών GR-CERT) στα πλαίσια του '''Money Show 2008'''. &lt;br /&gt;
&lt;br /&gt;
==== Archive  ====&lt;br /&gt;
&lt;br /&gt;
== Μηνιαίο Ενημερωτικό Δελτίο  ==&lt;br /&gt;
&lt;br /&gt;
Καλώς ήλθατε στο μηνιαίο ενημερωτικό δελτίο της Ελληνικής ομάδας εργασίας του OWASP. Στόχος μας είναι η ενημέρωση γύρω από τα θέματα της ελληνικής επικαιρότητας που αφορούν στην ασφάλεια των εφαρμογών διαδικτύου αλλά και στην ασφάλεια γενικότερα. Αν και στο Internet υπάρχουν ήδη πολλές πηγές ενημέρωσης γύρω από θέματα ασφάλειας (π.χ. securityfocus, cryptogram, blogs, κλπ), αυτές επικεντρώνονται συνήθως στη διεθνή επικαιρότητα. Έτσι, μοιραία η ενημέρωση για τα security θέματα που αφορούν στην Ελλάδα προέρχεται από τα τοπικά ειδησεογραφικά site και μέσα. &lt;br /&gt;
&lt;br /&gt;
Με το μηνιαίο αυτό newsletter στοχεύουμε στην αποτύπωση των κυριότερων θεμάτων ασφάλειας που απασχολούν την Ελληνική επικαιρότητα κάθε μήνα, αλλά και σημαντικών νέων από τη διεθνή infosec επικαιρότητα που κρίνουμε πως πρέπει να σχολιάσουμε. Παράλληλα, θα υπάρχουν ενδιαφέροντα επιστημονικά θέματα αλλά και ενημέρωση γύρω από τη δραστηριότητα του OWASP. Το newsletter θα διαμοιράζεται μέσω της mailing list του OWASP.gr, ενώ ταυτόχρονα θα δημοσιεύεται και εδώ σε μορφή pdf. Υπεύθυνος για την έκδοσή του είναι ο συνεργάτης του OWASP.gr Γιάννης Αναστασόπουλος. &lt;br /&gt;
&lt;br /&gt;
Ελπίζουμε πως θα βρείτε το newsletter αυτό ενδιαφέρον και χρήσιμο. Φυσικά, βρίσκεται σε… εμβρυικό στάδιο. Για το λόγο αυτό κάθε συνεισφορά σας στη δημιουργία του θα ήταν ιδιαίτερα σημαντική, για να γίνει το newsletter πιο χρήσιμο για όλους. Έτσι, για οποιαδήποτε σχόλια, προσθήκες, προτάσεις, παρατηρήσεις ή συζητήσεις μπορείτε να απευθύνεστε στη mailing list του OWASP.gr ([mailto:owasp-greece@lists.owasp.org owasp-greece@lists.owasp.org]). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; [http://www.owasp.org/images/2/21/OWASP_gr_newsletter_1.pdf Ενημερωτικό Δελτίο νο1 - Δεκέμβριος 2006] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/0/0a/OWASP_gr_newsletter_2.pdf Ενημερωτικό Δελτίο νο2 - Ιανουάριος 2007] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/4/4e/OWASP_gr_newsletter_3.pdf Ενημερωτικό Δελτίο νο3 - Φεβρουάριος 2007] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/b/b1/OWASP_gr_newsletter_4.pdf Ενημερωτικό Δελτίο νο4 - Μάρτιος-Απρίλιος 2007] &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/1/11/OWASP_gr_newsletter_5.pdf Ενημερωτικό Δελτίο νο5 - Ιανουάριος 2008] &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/3/3f/OWASP_gr_newsletter_6.pdf Ενημερωτικό Δελτίο νο6 - Φεβρουάριος 2008] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects_Summit_2013/Attendes&amp;diff=159331</id>
		<title>Projects Summit 2013/Attendes</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects_Summit_2013/Attendes&amp;diff=159331"/>
				<updated>2013-09-27T08:22:36Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: /* Attendees List and availability */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page has the current list of projected attendee.&lt;br /&gt;
&lt;br /&gt;
If you are going to be at the Projects Summit, please add your name to the list bellow, indicating your availability&lt;br /&gt;
&lt;br /&gt;
===Legend:===&lt;br /&gt;
&lt;br /&gt;
* AD = All Day&lt;br /&gt;
* MO = Morning&lt;br /&gt;
* AF = Afternoon&lt;br /&gt;
* EV = Evening&lt;br /&gt;
&lt;br /&gt;
===Attendees List and availability===&lt;br /&gt;
 &lt;br /&gt;
* '''Andrew van der Stock''': Mon (AD) Tue (AD), Wed (MO)&lt;br /&gt;
* '''Andrew Muller''': Mon (AD) Tue (AD), Wed (MO)&lt;br /&gt;
* '''Chris Smith''': Mon (AD) Tue (AD), Wed (MO)&lt;br /&gt;
* '''Dennis Groves''': Sun (MO), Mon (AD) Tue (AD), Wed (MO), &lt;br /&gt;
* '''Dinis Cruz''': Sun (AD), Mon (AD) Tue (AD), Wed (MO), Thu (MO) &lt;br /&gt;
* '''Fabio Cerullo''':&lt;br /&gt;
* '''Jonathan Marcil''':&lt;br /&gt;
* '''Konstantinos Papapanagiotou''':  Sun (AD), Mon (AD) Tue (AD), Wed (AD), Thu (AF) &lt;br /&gt;
* '''Larry Conklin''':&lt;br /&gt;
* '''Martin Knobloch''':&lt;br /&gt;
* '''Simon Bennetts''': Tue (EV), Wed(MO), Thu (MO)&lt;br /&gt;
* '''Samantha Groves''': Sun (AD), Mon (AD) Tue (AD), Wed (AD), Thu (AD), Fri (AD) &lt;br /&gt;
* '''Seba Deleersnyder''': Wed (AD), Thu (AD)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Projects_Summit_2013/Navigation}}&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2013_Ideas&amp;diff=149460</id>
		<title>GSoC2013 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2013_Ideas&amp;diff=149460"/>
				<updated>2013-04-08T20:45:57Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==OWASP Project Requests==&lt;br /&gt;
===OWASP PHP Security Project===&lt;br /&gt;
&lt;br /&gt;
'''Description:'''&lt;br /&gt;
OWASP PHP Security project plans to gather around secure PHP libraries, and provide a full featured framework of libraries for secure web applications in PHP, both as separate de-coupled libraries and as a whole secure web application framework. Many aspects of this project are already handled, and are being added to OWASP.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results: ''' Result of this project is much more security among PHP applications. Most PHP applications are vulnerable and there's no central approach to secure them (due to open source nature). Many people look at OWASP for such information.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Anyone with adequate PHP programming language experience (possibly web application development in PHP).  There are hard and easy parts of this project. For tougher parts, familiarity with security concepts, advanced SQL, and advanced PHP and web server configuration is required. &lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]]&lt;br /&gt;
&lt;br /&gt;
===OWASP RBAC Project===&lt;br /&gt;
'''Description:''' ''For the last 6 years, improper access control has been the issue behind two of the Top Ten lists''. &lt;br /&gt;
&lt;br /&gt;
RBAC stands for Role Based Access Control and is the de-facto access control and authorization standard. It simplifies access control and its maintenance for small and enterprise systems alike. NIST RBAC standard has four levels, the second level hierarchical RBAC is intended for this project.&lt;br /&gt;
&lt;br /&gt;
Unfortunately because of many performance and development problems, no suitable RBAC implementation was available until recently, so developers and admins mostly used ACLs and other forms of simple access control methods, which leads to broken and unmaintainable access control over the time. &lt;br /&gt;
&lt;br /&gt;
OWASP provides the RBAC project, as a stand-alone library with very fast access control checks and standard mature code-base. Currently [[PHPRBAC]] which is the PHP version of the RBAC project is released.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' Standard NIST level 2 hierarchical RBAC libraries for different programming languages, specially web-based ones such as C/C++/Java/ASP/ASPX/Python/Perl/etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Good SQL knowledge, library development schemes, familiarity with one of the programming languages.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]]&lt;br /&gt;
&lt;br /&gt;
'''Skill Level:''' Advanced&lt;br /&gt;
&lt;br /&gt;
For more info, visit [http://phprbac.net phprbac.net]&lt;br /&gt;
&lt;br /&gt;
===OWASP XSSer Project===&lt;br /&gt;
&lt;br /&gt;
XSSer has a correct engine implementation to search/exploit XSS vulnerabilities, but it is necessary to work on some different fields to obtain better results. Some of them are: to fight against &amp;quot;false positive&amp;quot; results, to implemenet a better human-readable output results and to develop some new features (like; CSSer, Code checks user inputs, etc...). Also, it will be nice to update the tool with more valid XSS vectors (DOM, DCP, reflected, etc...) and some &amp;quot;anti-anti-XSS&amp;quot; systems for more common browsers. &lt;br /&gt;
&lt;br /&gt;
There is a roadmap on a pdf file with all tasks required to advance to next release of 'XSSer' (v1.7b - Total Swarm!)&lt;br /&gt;
&lt;br /&gt;
Download: http://xsser.sourceforge.net/xsser/xsser-roadmap.pdf &lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Below is shown a structure of phases and milestones code areas.&lt;br /&gt;
&lt;br /&gt;
Milestones:&lt;br /&gt;
    • Phase 1: Core:&lt;br /&gt;
        + Bugfixing:&lt;br /&gt;
             - False positives&lt;br /&gt;
             - Fix “swarm” results&lt;br /&gt;
             - Fix 'maximize' screen (bug reported)&lt;br /&gt;
             - Add auto-update revision&lt;br /&gt;
             - Fix multithreading (review)&lt;br /&gt;
             - Research 'glibc' corruption&lt;br /&gt;
&lt;br /&gt;
        + Add crawlering for POST+GET (auto test 'whole' page forms)&lt;br /&gt;
        + Update XSS payloads (vectors.py / DOM.py / DCP.py / etc...)&lt;br /&gt;
        + Advance Statistics results (show more detailed outputs)&lt;br /&gt;
        + Advance Exporting methods (create 'whitehat' reports (xml/json))&lt;br /&gt;
        + Advance “WebSockets” technology on XSSer 'fortune' option&lt;br /&gt;
        + Update Interface (GTK+)&lt;br /&gt;
&lt;br /&gt;
    • Phase 2: New features:&lt;br /&gt;
        + Add 'code pre-check' option: Users can set which code will return target's website, to try to evade false positive results.&lt;br /&gt;
        + Add 'CSSer' option: Payloads for CSS injections.&lt;br /&gt;
        + Research/Search anti-IDS/NIDS/IPS... codes to evade XSS filters.&lt;br /&gt;
        + BurpXSSer: Create a Burp plugin (with Jython libs)&lt;br /&gt;
        + ZAPXSSer: Create a ZAP plugin (with Jython libs)&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* To deploy a new stable version of XSSer with GTk+/Web/Shell main features working propertly,&lt;br /&gt;
&lt;br /&gt;
The code should be:&lt;br /&gt;
&lt;br /&gt;
* Clean and easy to follow&lt;br /&gt;
* Include a full set of unit tests&lt;br /&gt;
* Include good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
XSSer is written in Python, so a good knowledge of this language is recommended, as is knowledge of HTML and Javascript. Also, is necessary to have some knowledge of application security and more in concret about XSS techniques.&lt;br /&gt;
&lt;br /&gt;
'''Skill Level:''' Medium&lt;br /&gt;
&lt;br /&gt;
'''Mentor: epsylon (psy) - OWASP XSSer Project Leader'''&lt;br /&gt;
&lt;br /&gt;
===OWASP ZAP: Dynamically Configurable actions===&lt;br /&gt;
&lt;br /&gt;
ZAP provides various mechanisms which allow HTTP requests and responses to be changed dynamically. So (for example) a string in an HTTP request can automatically be changed to another string.&lt;br /&gt;
&lt;br /&gt;
It also supports a scripting interface, which is very powerful but at the moment difficult to use.&lt;br /&gt;
&lt;br /&gt;
This project would introduce something inbetween thess 2 options - a powerful way of defining (potentially) complex rules using a wizard based interface.&lt;br /&gt;
&lt;br /&gt;
The challenge will be to make it as usable as possible while still providing a wide range of functionality.&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
This component would provide a set of highly configurable 'actions' which the user would see up via a wizard.&lt;br /&gt;
&lt;br /&gt;
So they would initially define when the action applies, based on things like regex matching on request elements. And they should be able to define multiple criteria with ANDs and ORs.&lt;br /&gt;
&lt;br /&gt;
Then they would define the actions, which could include:&lt;br /&gt;
&lt;br /&gt;
* Changing the request (adding, removing or replacing strings)&lt;br /&gt;
* Raising alerts&lt;br /&gt;
* Breaking (to replace existing break points)&lt;br /&gt;
* Running custom scripts (which could do pretty much anything) &lt;br /&gt;
&lt;br /&gt;
They would then be able to switch the actions on and off from the full list of defined actions using checkboxes&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* A new ZAP add-on providing the above functionality&lt;br /&gt;
The code should be:&lt;br /&gt;
* Clean and easy to follow&lt;br /&gt;
* Include a full set of unit tests&lt;br /&gt;
* Include good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Simon Bennetts - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===OWASP ZAP: Enhanced HTTP Session Handling===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP can currently manage multiple sessions. This development would allow ZAP to better handle HTTP Sessions to provide different views of a given target depending on the different user's permissions that the targeted site supports.&lt;br /&gt;
&lt;br /&gt;
This implementation such provide a set of methods to answer questions such as: 1)What nodes(pages) are available to a group of users and not to other groups of users 2)What nodes are available to different users but these contain significant differences in the HTTP headers and/or in the body content.&lt;br /&gt;
&lt;br /&gt;
This will allow ZAP to be used to detect access control issues which would otherwise require manual testing.&lt;br /&gt;
Expected results:&lt;br /&gt;
&lt;br /&gt;
* ZAP will have an understanding of both users and roles and be able to associate them with HTTP sessions.&lt;br /&gt;
* The user will be able to associate credentials with different roles allowing ZAP to automatically authenticate as any user / role.&lt;br /&gt;
* ZAP will be able to spider an application using a given user/role.&lt;br /&gt;
* ZAP will be able to report the differences between different HTTP sessions.&lt;br /&gt;
* ZAP will be able to show different views of the site in the site's tree tab with the pages visible for each session.&lt;br /&gt;
* ZAP will be able to attack one session based on the URLs accessed in another session and report which appear to work. &lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
Users will be able to:&lt;br /&gt;
* specify exactly which alerts are included, by context, site or on an individual alert basis&lt;br /&gt;
* specify what information is included and how it is layed out&lt;br /&gt;
* specify a range of output formats, at least including HTML and PDF&lt;br /&gt;
* include details of what testing has been performed (automatically generated where possible)&lt;br /&gt;
* apply their own branding&lt;br /&gt;
* save report templates, and apply templates downloaded from the ZAP marketplace &lt;br /&gt;
The code should be:&lt;br /&gt;
* Clean and easy to follow&lt;br /&gt;
* Include a full set of unit tests&lt;br /&gt;
* Include good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML and the HTTP protocol specification. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Guifre Ruiz - OWASP ZAP Dev Team'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===OWASP ZAP: Advanced reporting===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The reports that ZAP generates are in a fixed format which is not particularly useful or attractive. This development would provide the user with a fine grained control over the contents, layout and branding of the reports.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
A new user interface for genrating reports which is easy to use and provides the user with a wide range of options.&lt;br /&gt;
The code should be:&lt;br /&gt;
* Clean and easy to follow&lt;br /&gt;
* Include a full set of unit tests&lt;br /&gt;
* Include good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Simon Bennetts - OWASP ZAP Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===OWASP ZAP - SAML 2.0 Support===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
SAML 2.0 is an XML-based federated single sign-on (FSSO) protocol that uses security tokens containing assertions to pass information about a principal (usually an end user) between a SAML authority, that is an identity provider, and a SAML consumer, that is a service provider. SAML 2.0 enables web-based authentication and authorization scenarios including cross-domain single sign-on (SSO). SAML specifications support many ways, called profiles and bindings, to generate and transport assertions between trusted entities The Web Browser SSO profile is of particular interest here since it enables web applications from 2 separate domains to leverage SSO easily by exchanging assertions via a web browser session.&lt;br /&gt;
&lt;br /&gt;
ZAP provides various mechanisms which allow HTTP requests and responses to be changed dynamically. This project will enhance those capabilities to be able to detect and fuzz various elements and attributes of a SAML Assertion.&lt;br /&gt;
&lt;br /&gt;
The scope of this project is limited to the following SAML bindings, profiles and protocols:&lt;br /&gt;
&lt;br /&gt;
Profiles :&lt;br /&gt;
* Web Browser SSO &lt;br /&gt;
&lt;br /&gt;
Bindings:&lt;br /&gt;
* HTTP POST&lt;br /&gt;
* HTTP Redirect &lt;br /&gt;
&lt;br /&gt;
Protocols:&lt;br /&gt;
* Authentication Request Protocol &lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
This component would enable ZAP to:&lt;br /&gt;
* Detect SAML Assertions in HTTP requests and responses&lt;br /&gt;
* Decode SAML Assertions&lt;br /&gt;
* Fuzz various entities and attributes within a SAML assertion&lt;br /&gt;
* Re-encode the assertion and send it forward &lt;br /&gt;
The code should be:&lt;br /&gt;
* Clean and easy to follow&lt;br /&gt;
* Include a full set of unit tests&lt;br /&gt;
* Include good documentation&lt;br /&gt;
&lt;br /&gt;
Users would have a choice either to fuzz the attributes within an assertion or just add/remove arbitrary attribute (to check for XML and SAML Schema Conformance).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML and SAML 2.0 Protocol. Some knowledge of application security would be useful, but not essential. Understanding of SSO and Federated SSO is preferred.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Prasad N. Shenoy'''&lt;br /&gt;
&lt;br /&gt;
===OWASP Security Research and Development Framework ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
This is a free open source Development Framework created to support writing security tools and malware analysis tools. And to convert the security researches and ideas from the theoretical approach to the practical implementation. &lt;br /&gt;
&lt;br /&gt;
This development framework created mainly to support the malware field to create malware analysis tools and anti-virus tools easily without reinventing the wheel and inspire the innovative minds to write their researches on this field and implement them using SRDF. &lt;br /&gt;
&lt;br /&gt;
Targeted Applications:&lt;br /&gt;
&lt;br /&gt;
* Packet Analysis Tools (Personal Firewalls, HIDS/HIPS, WAF, Network Analysis, Network Capture)&lt;br /&gt;
* Malware Analysis Tools (Static, Dynamic, Behavioral)&lt;br /&gt;
* Antivirus and Virus Removal Tools (Signature-based, Behavioral-based)&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
 &lt;br /&gt;
* Implement XRAY Tool, Recursive Disassembler Tool (based on our disassembler)&lt;br /&gt;
* Improve Pokas Emulator and its disassembler engine&lt;br /&gt;
* Improve The Kernel-Mode Part and more beta-testing&lt;br /&gt;
* Integrate SRDF in python using SWIG&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
We need variety of skills in different languages and platforms. We need a good knowledge in C++ in windows. We need a python developer for integrating SRDF in python. We need C++ developers have a good knowledge in Assembly (for working in disassembling part) and we need C++ developers have a knowledge in Kernel-Mode(for Kernel-Mode improvement and beta-testing)&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Amr Thabet - OWASP Security Research and Development Framework Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP ModSecurity CRS - Create &amp;quot;Sniffer-Mode&amp;quot; ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:''' &lt;br /&gt;
&lt;br /&gt;
The ModSecurity code includes a &amp;quot;standalone&amp;quot; version that wraps a light weight Apache/APR around the ModSecurity code.  This is used as the basis for the ports to the IIS/Nginx web server platforms.  The goal for this project task is to extend this standalone version so that it can accept a data feed of network traffic (e.g. libpcap) data as input and apply the ModSecurity CRS rules.  One possible solution would be create a ModSecurity &amp;quot;plugin&amp;quot; for the Snort IDS.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
This new sniffer mode would allow organizations to run ModSecurity/OWASP ModSecurity CRS in an out of line mode as they do IDS systems.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP ModSecurity CRS - Port to Java ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:''' &lt;br /&gt;
&lt;br /&gt;
The goal is to have a ModSecurity version that can be used within Java servers (e.g. Tomcat).  There may be methods to use JNI to call the standalone code from a filter in Tomcat.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
This new version allow organizations to run ModSecurity/OWASP ModSecurity CRS in Java web servers.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP ModSecurity CRS - Implement libinjection Code ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:''' https://www.modsecurity.org/tracker/browse/MODSEC-327&lt;br /&gt;
&lt;br /&gt;
libinjection (https://github.com/client9/libinjection) is a C library that detects SQLi attacks in user input. It is designed to be embedded in existing or new applications:&lt;br /&gt;
&lt;br /&gt;
*Fast &amp;gt; 100k inspections per second&lt;br /&gt;
*No memory allocation&lt;br /&gt;
*No threads&lt;br /&gt;
*Stable memory usage (approximately 500 bytes on stack)&lt;br /&gt;
*500 lines of C code (plus a few kiobytes of data)&lt;br /&gt;
&lt;br /&gt;
It is based on lexical analysis of SQL and SQLi attempts and does not use regular expressions.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The new C code in ModSecurity will allow us to add new SQL Injection detection methods to the OWASP ModSecurity CRS.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP ModSecurity CRS - Implement DoS Prevention Code ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:''' https://www.modsecurity.org/tracker/browse/MODSEC-265&lt;br /&gt;
&lt;br /&gt;
Implement a request velocity learning engine to identify dynamic DoS thresholds for both the site and for the particular URL.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The new C code in ModSecurity will allow us to add new DoS Protection methods to the OWASP ModSecurity CRS.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP ModSecurity CRS - Create a Positive Learning/Profile Engine ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:''' https://www.modsecurity.org/tracker/browse/MODSEC-193&lt;br /&gt;
&lt;br /&gt;
ModSecurity needs a profiling engine that implements the various AppSensor Detection Points - http://blog.spiderlabs.com/2011/08/implementing-appsensor-detection-points-in-modsecurity.html.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The new engine will implement more detection points to detect abnormal request attributes.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP ModSecurity CRS - Create an Engine to Detect Application Flow Anomalies ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Need an engine that can track normal application flow paths (click-flows) for business logic transactions - such as transferring money from accounts.  After profiling normal application path flows, we want to then be able to alert to anomalies.  This type of logic can help to prevent Banking Trojan attacks.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
The engine will be able to alert on anomalous application flows.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
C programming and ModSecurity Development Guidelines - http://www.modsecurity.org/developers/.&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Ryan Barnett - OWASP ModSecurity Core Rule Set Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Reporting ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
A common complaint about OWASP OWTF so far has been that the report is not very shiny. The intention here is to:&lt;br /&gt;
* Move as much of the HTML away from python files into template files: This will facilitate web designer's work in the future.&lt;br /&gt;
* Apply some nice web design to the report so that it is more nice and comfortable to work with: Clear the HTML, CSS, etc&lt;br /&gt;
* Identify and fix areas of improvement in click flow: For example, try to reduce the distance to move the mouse&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* The first reaction when an OWASP OWTF users opens the report is now &amp;quot;wow&amp;quot;&lt;br /&gt;
* The report is reliable and easy to work with, even when more than 30 URLs have been assessed (i.e. a lot of data in the report does not crash or make the browser slow)&lt;br /&gt;
* The improved design is lightweight and keeps the browser responsive at all times&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
HTML, JavaScript, CSS and a bit of Python. Web Designer background or experience would be beneficial for this.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Multiprocessing ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF can be quite slow when scanning multiple URLs simultanously due to not scanning several hosts in parallel. We would like to use the multiprocessing python library over the threading one to take full advantage of multi-core processors without the global interpreter lock (GIL) issues associated with the threading libary :)&lt;br /&gt;
* We would like to scan in parallel several websites when on a different IP: &lt;br /&gt;
* We would like to monitor the host machine resources to avoid crashing it before spawning new processes :)&lt;br /&gt;
* We would like to run plugins in parallel as much as possible but without compromising integrity: Using file locks where appropriate and so on&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Reliability&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, multiprocessing experience would be beneficial for this&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader'''&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - SQL database ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF scans may take a large amount of disk space due to saving information in text files, we would like to add an option to use a SQL database, probably using the sqlalchemy python library.&lt;br /&gt;
* Keep the current text file format as an option&lt;br /&gt;
* Add a database storage option using the sqlalchemy library &lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Reliability: Both with the sql database option and the text file options.&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, sqlalchemy experience would be beneficial for this&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - New challenges ===&lt;br /&gt;
&lt;br /&gt;
''''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The challenges that have been implemented so far include: web application challenges covering several vulnerabilities included in the OWASP Top 10, cryptographic challenges, entire virtual machines including several vulnerabilities. New challenges need to be created in order to cover a broader set of vulnerabilities.&lt;br /&gt;
Also existing challenges can be modified to accept a broader set of valid answers, e.g. by using regular expressions.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New challenges&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Java. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' Konstantinos Papapanagiotou - Hackademic Challenges Project Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Source Code testing environment ===&lt;br /&gt;
&lt;br /&gt;
''''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Existing challenges are based on a dynamic application testing concept. We would like to work on a project that will give the capability to the attacker to review a vulnerable piece of source code, make corrections and see the result in a realistic (but yet safe) runtime environment. The code can either be run if needed or tested for correctness and security. The implementation challenges of such a project can be numerous, including creating a realistic but also secure environment, testing submitted solutions and grading them in an automatic manner. At the same time there are now numerous sites that support submitting code and then simulate or implement a compiler's functionality.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A source code testing and improvement environment where a user will be able to review, improve and test the result of a piece of source code.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Java. Good understanding of Application Security, source code analysis and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' Konstantinos Papapanagiotou - Hackademic Challenges Project Leader&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - CMS improvements ===&lt;br /&gt;
&lt;br /&gt;
''''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The new CMS was created during last year's GSOC. We have received feedback from users that suggest various improvements regarding functionality e.g. better user, teacher and challenges management. There are also some security improvements that are needed and in general any functionality that adds up to the educational nature of the project is more than welcome.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
User experience, new features  and security improvements on the CMS part of the project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Java. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' Konstantinos Papapanagiotou - Hackademic Challenges Project Leader&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Greece&amp;diff=149012</id>
		<title>Greece</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Greece&amp;diff=149012"/>
				<updated>2013-04-02T07:10:21Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Greekchapterlogo.gif]] &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Greece|extra=The chapter leader is [mailto:konstantinos@owasp.org Konstantinos Papapanagiotou]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-greece|emailarchives=http://lists.owasp.org/pipermail/owasp-greece}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Greece&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Greek Chapter Committee ==&lt;br /&gt;
&lt;br /&gt;
Chapter Leader: [mailto:conpapATowasp.gr Konstantinos Papapanagiotou]&lt;br /&gt;
&lt;br /&gt;
Committee Members: [mailto:manosATowasp.gr Emmanouel Kellinis], [mailto:steliosATowasp.gr Stelios Tigkas], [mailto:vsvlachosATowasp.gr Vasileios Vlachos]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Τι είναι το OWASP  ==&lt;br /&gt;
&lt;br /&gt;
Το ΟWASP (Open Web Application Security Project – http://www.owasp.org) αποτελεί μία πρωτοβουλία που αποσκοπεί στον εντοπισμό και στην καταπολέμηση των τρωτών σημείων του λογισμικού τέτοιων εφαρμογών. Όντας ένας μη κερδοσκοπικός οργανισμός, ακολουθεί την ιδεολογία του Ελεύθερου/Ανοικτού λογισμικού, παρέχοντας δωρεάν αλλά επαγγελματικής ποιότητας έγγραφα, εργαλεία και πρότυπα. Παράλληλα, ενισχύει τη διοργάνωση συνεδρίων και τοπικών ομάδων εργασίας (local chapters), τη δημοσίευση άρθρων και συγγραμμάτων, καθώς και την ανταλλαγή απόψεων μέσα από forums και mailing lists. Το OWASP απαριθμεί μέλη σε όλο τον πλανήτη, συμπεριλαμβανομένων μεγάλων οργανισμών και εταιριών του χώρου όπως VISA, Deloitte, Unisys, Foundstone, και άλλες. &lt;br /&gt;
&lt;br /&gt;
== Η Ελληνική Κοινότητα ==&lt;br /&gt;
&lt;br /&gt;
Η ελληνική ομάδα εργασίας του OWASP δημιουργήθηκε το 2005, με κύριο στόχο την ενημέρωση και την αφύπνιση της ελληνικής κοινότητας αναφορικά με τους κινδύνους ασφαλείας στις διαδικτυακές εφαρμογές. Αφορμή για τη δημιουργία της αποτέλεσαν ουσιαστικά τα ολοένα αυξανόμενα περιστατικά ασφαλείας στο διαδίκτυο, όπως τα κρούσματα phishing σε ελληνικές τράπεζες. &lt;br /&gt;
&lt;br /&gt;
Σήμερα, η ελληνική ομάδα του OWASP δραστηριοποιείται σε προγράμματα Ελεύθερου/Ανοικτού λογισμικού καθώς και μεταφράσεις κειμένων του OWASP στα ελληνικά, προωθώντας την ιδέα του OWASP σε τοπικό επίπεδο. Παράλληλα, μέσα από τη mailing list της ενημερώνει και προκαλεί συζητήσεις σχετικά με επίκαιρα θέματα ασφάλειας στο διαδίκτυο, ενώ εκδίδει και μηνιαίο newsletter. &lt;br /&gt;
&lt;br /&gt;
== Συμμετοχή  ==&lt;br /&gt;
&lt;br /&gt;
Η ελληνική κοινότητα του OWASP επιθυμεί να φέρει σε επαφή όλους όσους ενδιαφέρονται και προβληματίζονται για την ασφάλεια των διαδικτυακών εφαρμογών. Ταυτόχρονα, ευπρόσδεκτοι είναι και εθελοντές που προτίθενται να δουλέψουν σε προγράμματα Ελεύθερου/Ανοιχτού λογισμικού που συντονίζει το OWASP. Σας προσκαλούμε να μοιραστείτε μαζί μας ιδέες, σκέψεις και προβληματισμούς σχετικά με επιθέσεις, μεθόδους άμυνας και αντιμετώπισης, εργαλεία και βέλτιστες πρακτικές ασφάλειας στο διαδίκτυο. Ανεξάρτητα από το τεχνικό επίπεδο, το βάθος της προσέγγισης και τις χρησιμοποιούμενες μεθόδους, θα χαρούμε ιδιαίτερα αν έρθετε σε επαφή μαζί μας. &lt;br /&gt;
&lt;br /&gt;
Για να εγγραφείτε στη '''mailing list''' της ελληνικής ομάδας εργασίας επισκεφθείτε [http://lists.owasp.org/mailman/listinfo/owasp-greece αυτή τη σελίδα]. &lt;br /&gt;
&lt;br /&gt;
== Ευχαριστίες  ==&lt;br /&gt;
&lt;br /&gt;
Θα θέλαμε να ευχαριστήσουμε το [http://www.di.uoa.gr Τμήμα Πληροφορικής και Τηλεπικοινωνιών] του Πανεπιστημίου Αθηνών για τη βοήθεια που παρέχει στην ελληνική ομάδα εργασίας. &lt;br /&gt;
&lt;br /&gt;
[[Image:Universityofathenslogo.gif]] &lt;br /&gt;
&lt;br /&gt;
Επίσης θα θέλαμε να ευχαριστήσουμε θερμά το περιοδικό [http://www.linuxinside.gr/ Linux Inside] για την υποστήριξη και την προβολή καθώς και το [http://www.zero.gr zero.gr].&lt;br /&gt;
&lt;br /&gt;
[[Image:Linuxinside-logo.png]] [[Image:zerologo.png]]&lt;br /&gt;
&lt;br /&gt;
==== News ====&lt;br /&gt;
&lt;br /&gt;
== Ομάδες Εργασίας  ==&lt;br /&gt;
&lt;br /&gt;
Αυτήν την περίοδο ψάχνουμε για νέες project ιδέες. Εάν έχεις καινούρια ίδεα για κάποιο εργαλείο, στατιστικά στοιχεία για το πόσο σοβαρά λαμβάνουν στην Ελλάδα το application security οι προγραμματιστές, εταιρίες λογισμικού κτλ ή αν έχεις οποιάδηποτε άλλη ιδέα με κεντρικό θέμα το application security επικοινωνήστε μαζί μας. &lt;br /&gt;
&lt;br /&gt;
== Νέα  ==&lt;br /&gt;
&lt;br /&gt;
'''16/3/2011''' - Η πρώτη συνάντηση θα πραγματοποιηθεί στο [http://www.colabworkspace.com/ CoLab Athens Workspace]. Περισσότερες πληφορορίες και εγγραφές [http://owaspgr01.eventbrite.com/ εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''20/9/2009''' - Ο [mailto:vsvlachosATowasp.gr Βασίλης Βλάχος], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, θα συντονίσει στις 26/9/2009 τη συνεδρία με θέμα Web Application Security που συνδιοργανώνει το OWASP.gr στα πλάισια του συνεδρίου 4th Mediterranean Conference on Information Systems ([http://www.mcis2009.org MCIS 2009]). Η συνεδρία θα πραγματοποιηθεί στις 26 Σεπτεμβρίου 2009 και ώρα 15:30 στο Οικονομικό Πανεπιστήμιο Αθηνών. &lt;br /&gt;
&lt;br /&gt;
'''5/3/2009''' - Ο [mailto:conpapATowasp.gr Κωνσταντίνος Παπαπαναγιώτου], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, θα συντονίσει στις 18 Μαρτίου την ενότητα &amp;quot;Πρότυπα και Νομικές Απαιτήσεις&amp;quot; στα πλαίσια της [http://www.tsomokos.gr/projects2.php EXPOSEC 2009], που διεξάγεται στις 17 και 18 Μαρτίου στο Ζάππειο Μέγαρο. &lt;br /&gt;
&lt;br /&gt;
'''3/2/2009''' - Ο [mailto:conpapATowasp.gr Κωνσταντίνος Παπαπαναγιώτου], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, έδωσε ζωντανή συνέντευξη στην εκπομπή Ατζέντα+ της ψηφιακής πλατφόρμας της ΕΡΤ (κανάλι Σπορ+/Info+), όπου μίλησε για τις δραστηριότητες του OWASP στην Ελλάδα και έδωσε απλές συμβουλές για την ασφάλεια στο Internet. Μπορείτε να παρακολουθήσετε το βίντεο της συνέντευξης [http://www.youtube.com/watch?v=q0RPKaPGICI εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''10/10/2008''' - Το OWASP.gr συμμετέχει στο Athens Digital Week που πραγματοποιείται από τις 13 ως τις 19 Οκτωβρίου στη Τεχνόπολη στο Γκάζι (http://conf.ellak.gr). &lt;br /&gt;
&lt;br /&gt;
'''30/9/2008''' - Το OWASP.gr παρουσιάζει το πρώτο Ελληνικό blog με θέμα την ασφάλεια των διαδικτυακών εφαρμογών αλλά και των υπολογιστικών συστημάτων γενικότερα. Επισκεφθείτε το επίσημο blog της Ελληνικής ομάδας εργασίας του OWASP στο: http://blog.owasp.gr. &lt;br /&gt;
&lt;br /&gt;
'''5/6/2008''' - Η παρουσίαση του OWASP.gr στο 3ο Συνέδριο ΕΛ/ΛΑΚ είναι διαθέσιμη μέσα από την ενότητα [https://www.owasp.org/index.php/OWASP_Education_Presentation#Chapter_Presentations Chapter Presentations] και συγκεκριμένα [http://www.owasp.org/images/e/e5/OWASP_ellak-Greece.ppt εδώ]. Επίσης, βίντεο της παρουσίασης μπορείτε να βρείτε [http://conf.ellak.gr/2008/index.php?option=com_eventlist&amp;amp;Itemid=119&amp;amp;func=details&amp;amp;did=19 εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''26/5/2008''' - Το OWASP.gr αναπτύσσει έναν Web Vulnerability Scanner. Μπορείτε να κατεβάσετε την beta έκδοσή του από [https://www.owasp.org/images/6/65/WVS_beta-0.2.1.zip εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''15/5/2008''' - Το OWASP.gr συμμετέχει στο 3ο Συνέδριο ΕΛ/ΛΑΚ που πραγματοποιείται στις 27 και 28 Μαΐου στο Εθνικό Μετσόβιο Πολυτεχνείο (http://conf.ellak.gr). &lt;br /&gt;
&lt;br /&gt;
'''20/2/2008''' - Το OWASP.gr συμμετέχει στο 1ο Συνέδριο Κοινοτήτων Ελεύθερου Λογισμικού/Λογισμικού Ανοιχτού Κώδικα που διοργανώνεται στις 21 και 22 Μαρτίου στο Εθνικό Μετσόβειο Πολυτεχνείο (http://www.fosscomm.gr/). &lt;br /&gt;
&lt;br /&gt;
'''2/2/2008''' - Το OWASP.gr συμμετέχει στην παρουσίαση της ομάδας IA4 του E-Business Forum (Προπαρασκευαστικές δράσεις για τη δημιουργία Ελληνικού Κέντρου Επείγουσας Αντιμετώπισης Ψηφιακών Απειλών GR-CERT) στα πλαίσια του Money Show 2008 στις 2/2/2008 στην Αίγλη Ζαππείου. &lt;br /&gt;
&lt;br /&gt;
'''18/4/2007''' - Το E-Βusiness Forum (http://www.ebusinessforum.gr/) έχει δημιουργήσει μία ομάδα εργασίας η οποία έχει αναλάβει τις &amp;quot;'''Προπαρασκευαστικές δράσεις για τη δημιουργία Ελληνικού Κέντρου Επείγουσας Αντιμετώπισης Ψηφιακών Απειλών (GR-CERT)'''&amp;quot;. Πληροφορίες σχετικά με τους στόχους και τις δραστηριότητες της ομάδας υπάρχουν [http://www.ebusinessforum.gr/teams/teamsall/view/index.php?ctn=102&amp;amp;language=el εδώ] αλλά και [http://sense.dmst.aueb.gr/ia4/index.php/Main_Page εδώ]. Όποιος ενδιαφέρεται και μπορεί να βοηθήσει να δηλώσει συμμετοχή στις παραπάνω σελίδες ή να απευθυνθεί στο κ. Βασίλειο Βλάχο (στοιχεία επικοινωνίας υπάρχουν στα παραπάνω site). &lt;br /&gt;
&lt;br /&gt;
Καταχωρήθηκε το [http://www.owasp.gr OWASP.gr]! &lt;br /&gt;
&lt;br /&gt;
Με τη βοήθεια του Αναστάσιου Καζακώνη μετέφράστηκαν το &amp;quot;OWASP Top Ten Vulnerabilties in Web Application Security&amp;quot; και το OWASP AppSec FAQ στα Ελληνικά. Έτσι είναι πλέον διαθέσιμες οι ελληνικές εκδόσεις του [http://www.owasp.org/images/8/8b/OWASP_Top_Ten_2004_Greek.pdf OWASP Top Ten] και του [http://www.owasp.org/images/e/ed/OWASP_faq_Greek.pdf OWASP AppSec FAQ]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meetings ====&lt;br /&gt;
&lt;br /&gt;
== Call for Presentations ==&lt;br /&gt;
Anything related to '''Application''' or '''Information Security'''&lt;br /&gt;
*Secure Coding Practices&lt;br /&gt;
*Secure Application Development Lifecycle&lt;br /&gt;
*Penetration Testing and Exploitation&lt;br /&gt;
*Code Reviewing&lt;br /&gt;
*Projects and Tools&lt;br /&gt;
*Methodologies&lt;br /&gt;
*Best Practices&lt;br /&gt;
&lt;br /&gt;
Send:&lt;br /&gt;
*Title&lt;br /&gt;
*Abstract&lt;br /&gt;
*Name and affiliation&lt;br /&gt;
*Short Bio&lt;br /&gt;
To: [mailto:konstantinos@owasp.org konstantinos@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== Meetings ==&lt;br /&gt;
&lt;br /&gt;
=== 19/4/2013 ===&lt;br /&gt;
Χώρος: PWC / Κηφισίας 260, Χαλάνδρι&lt;br /&gt;
&lt;br /&gt;
Περιγραφή: [https://www.owasp.org/images/e/e0/Training_19.04.13_ISACA_OWASP.pdf https://www.owasp.org/images/e/e0/Training_19.04.13_ISACA_OWASP.pdf]&lt;br /&gt;
&lt;br /&gt;
* '''Being a spammer for 40 minutes: how spam works, why it's slowly going away and why it won't disappear''' - '''Martijn Grooten''' (Virus Bulletin) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 5/5/2011 ===&lt;br /&gt;
Χώρος: [http://www.di.uoa.gr/ Τμήμα Πληροφορικής και Τηλεπικοινωνιών/ΕΚΠΑ]&lt;br /&gt;
&lt;br /&gt;
Περιγραφή: [http://owaspgr02.eventbrite.com/ http://owaspgr02.eventbrite.com/]&lt;br /&gt;
&lt;br /&gt;
* '''Welcome and OWASP News''' - '''Konstantinos Papapanagiotou''' (OWASP Greek Chapter Leader/Syntax IT Inc) '''([[Media:OWASP_gr_meeting_2011_02.pdf‎|PDF]])'''&lt;br /&gt;
* '''Protecting the Core: Kernel Exploitation Mitigations''' - '''Patroklos Argyroudis and Dimitris Glynos''' (Census) '''([http://census.gr/media/bheu-2011-slides.pdf PDF])'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 16/3/2011 ===&lt;br /&gt;
Χώρος: [http://www.colabworkspace.com/ coLab Athens Workspace]&lt;br /&gt;
&lt;br /&gt;
Περιγραφή: [http://owaspgr01.eventbrite.com/ http://owaspgr01.eventbrite.com/]&lt;br /&gt;
&lt;br /&gt;
* '''Welcome and Intro to OWASP Meetings''' '''([[Media:OWASP_gr_meeting_2011_01_intro.pdf‎‎|PDF]])'''&lt;br /&gt;
* '''Application Security for the Masses''' - '''Konstantinos Papapanagiotou''' (OWASP Greek Chapter Leader/Syntax IT Inc) '''([[Media:OWASP_gr_meeting_2011_01_appsec_masses.pdf|PDF]])'''&lt;br /&gt;
* '''Cyberdefense and the Kobayashi Maru''' - '''Yiorgos Adamopoulos''' (TEE) '''([[Media:Adamopoulos_Cyberdefense_and_the_Kobayashi_Maru.pdf‎|PDF]])'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Events ====&lt;br /&gt;
&lt;br /&gt;
'''26/9/2009''' - Το OWASP.gr συνδιοργανώνει ένα session με θέμα Web Application Security στα πλαίσια του 4th Mediterranean Conference on Information Systems ([http://www.mcis2009.org MCIS 2009]) στις 26 Σεπτεμβρίου 2009 και ώρα 15:30 στο Οικονομικό Πανεπιστήμιο Αθηνών. Το αναλυτικό πρόγραμμα του συνεδρίου καθώς και περισσότερες πληροφορίες υπάρχουν [http://www.mcis2009.org εδώ]. Το session θα συντονίζει ο [mailto:vsvlachosATowasp.gr Βασίλης Βλάχος], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα. &lt;br /&gt;
&lt;br /&gt;
'''18/3/2009''' - Συμμετοχή του OWASP.gr στην [http://www.tsomokos.gr/projects2.php EXPOSEC 2009] που θα πραγματοποιηθεί στις 17 και 18 Μαρτίου στο Ζάππειο Μέγαρο. Ο [mailto:conpapATowasp.gr Κωνσταντίνος Παπαπαναγιώτου], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, θα συντονίσει στις 18 Μαρτίου την ενότητα &amp;quot;Πρότυπα και Νομικές Απαιτήσεις&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
'''17 και 18/10/2008''' - Παρουσίαση του OWASP.gr στα πλαίσια του '''Athens Digital Week''' που πραγματοποιείται από τις 13 ως τις 19 Οκτωβρίου στην Τεχνόπολη στο Γκάζι (http://www.athensdigitalweek.gr). Σύμφωνα με το [http://www.athensdigitalweek.gr/el/the-core/talk-zone πρόγραμμα], η παρουσίαση θα γίνει την Παρασκευή, 17 Οκτωβρίου 2008 και ώρα 16:30 καθώς και το Σάββατο, 18 Οκτωβρίου 2008 και ώρα 18:00. &lt;br /&gt;
&lt;br /&gt;
'''27/5/2008''' - Παρουσίαση του OWASP.gr στα πλαίσια του '''3ου Συνεδρίου Ελεύθερου Λογισμικού / Λογισμικού Ανοιχτού Κώδικα''' που πραγματοποιείται στις 27 και 28 Μαΐου στο Εθνικό Μετσόβειο Πολυτεχνείο (http://conf.ellak.gr). Σύμφωνα με το [http://conf.ellak.gr/2008/index.php?option=com_jcalpro&amp;amp;Itemid=138&amp;amp;extmode=week&amp;amp;date=2008-05-25 πρόγραμμα] του συνεδρίου, η παρουσίαση θα γίνει την Τρίτη, 27 Μαΐου 2008 και ώρα 11:15. &lt;br /&gt;
&lt;br /&gt;
'''22/3/2008''' - Παρουσίαση του OWASP.gr στα πλαίσια του '''1ου Συνέδριο Κοινοτήτων Ελεύθερου Λογισμικού/Λογισμικού Ανοιχτού Κώδικα''' που διοργανώνεται στις 21 και 22 Μαρτίου στο Εθνικό Μετσόβειο Πολυτεχνείο (http://www.fosscomm.gr/). Σύμφωνα με το [http://www.fosscomm.gr/xoops20171/htdocs/uploads/programma_synedriou.html πρόγραμμα], η παρουσίαση θα γίνει στις 17:50. &lt;br /&gt;
&lt;br /&gt;
'''2/2/2008''' - Παρουσίαση της ομάδας IA4 του E-Business Forum (Προπαρασκευαστικές δράσεις για τη δημιουργία Ελληνικού Κέντρου Επείγουσας Αντιμετώπισης Ψηφιακών Απειλών GR-CERT) στα πλαίσια του '''Money Show 2008'''. &lt;br /&gt;
&lt;br /&gt;
==== Archive  ====&lt;br /&gt;
&lt;br /&gt;
== Μηνιαίο Ενημερωτικό Δελτίο  ==&lt;br /&gt;
&lt;br /&gt;
Καλώς ήλθατε στο μηνιαίο ενημερωτικό δελτίο της Ελληνικής ομάδας εργασίας του OWASP. Στόχος μας είναι η ενημέρωση γύρω από τα θέματα της ελληνικής επικαιρότητας που αφορούν στην ασφάλεια των εφαρμογών διαδικτύου αλλά και στην ασφάλεια γενικότερα. Αν και στο Internet υπάρχουν ήδη πολλές πηγές ενημέρωσης γύρω από θέματα ασφάλειας (π.χ. securityfocus, cryptogram, blogs, κλπ), αυτές επικεντρώνονται συνήθως στη διεθνή επικαιρότητα. Έτσι, μοιραία η ενημέρωση για τα security θέματα που αφορούν στην Ελλάδα προέρχεται από τα τοπικά ειδησεογραφικά site και μέσα. &lt;br /&gt;
&lt;br /&gt;
Με το μηνιαίο αυτό newsletter στοχεύουμε στην αποτύπωση των κυριότερων θεμάτων ασφάλειας που απασχολούν την Ελληνική επικαιρότητα κάθε μήνα, αλλά και σημαντικών νέων από τη διεθνή infosec επικαιρότητα που κρίνουμε πως πρέπει να σχολιάσουμε. Παράλληλα, θα υπάρχουν ενδιαφέροντα επιστημονικά θέματα αλλά και ενημέρωση γύρω από τη δραστηριότητα του OWASP. Το newsletter θα διαμοιράζεται μέσω της mailing list του OWASP.gr, ενώ ταυτόχρονα θα δημοσιεύεται και εδώ σε μορφή pdf. Υπεύθυνος για την έκδοσή του είναι ο συνεργάτης του OWASP.gr Γιάννης Αναστασόπουλος. &lt;br /&gt;
&lt;br /&gt;
Ελπίζουμε πως θα βρείτε το newsletter αυτό ενδιαφέρον και χρήσιμο. Φυσικά, βρίσκεται σε… εμβρυικό στάδιο. Για το λόγο αυτό κάθε συνεισφορά σας στη δημιουργία του θα ήταν ιδιαίτερα σημαντική, για να γίνει το newsletter πιο χρήσιμο για όλους. Έτσι, για οποιαδήποτε σχόλια, προσθήκες, προτάσεις, παρατηρήσεις ή συζητήσεις μπορείτε να απευθύνεστε στη mailing list του OWASP.gr ([mailto:owasp-greece@lists.owasp.org owasp-greece@lists.owasp.org]). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; [http://www.owasp.org/images/2/21/OWASP_gr_newsletter_1.pdf Ενημερωτικό Δελτίο νο1 - Δεκέμβριος 2006] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/0/0a/OWASP_gr_newsletter_2.pdf Ενημερωτικό Δελτίο νο2 - Ιανουάριος 2007] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/4/4e/OWASP_gr_newsletter_3.pdf Ενημερωτικό Δελτίο νο3 - Φεβρουάριος 2007] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/b/b1/OWASP_gr_newsletter_4.pdf Ενημερωτικό Δελτίο νο4 - Μάρτιος-Απρίλιος 2007] &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/1/11/OWASP_gr_newsletter_5.pdf Ενημερωτικό Δελτίο νο5 - Ιανουάριος 2008] &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/3/3f/OWASP_gr_newsletter_6.pdf Ενημερωτικό Δελτίο νο6 - Φεβρουάριος 2008] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Training_19.04.13_ISACA_OWASP.pdf&amp;diff=149011</id>
		<title>File:Training 19.04.13 ISACA OWASP.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Training_19.04.13_ISACA_OWASP.pdf&amp;diff=149011"/>
				<updated>2013-04-02T06:59:44Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: OWASP Greek Chapter meeting 1/2013&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP Greek Chapter meeting 1/2013&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Greece&amp;diff=139376</id>
		<title>Greece</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Greece&amp;diff=139376"/>
				<updated>2012-11-13T20:44:41Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Greekchapterlogo.gif]] &lt;br /&gt;
[[File:2ndISACAConf.JPG|border|center|x149px|link=http://www.isaca.gr/images/stories/isaca/2ndISACAConference/2ndISACAAthens.pdf]]&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Greece|extra=The chapter leader is [mailto:konstantinos@owasp.org Konstantinos Papapanagiotou]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-greece|emailarchives=http://lists.owasp.org/pipermail/owasp-greece}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Greece&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Greek Chapter Committee ==&lt;br /&gt;
&lt;br /&gt;
Chapter Leader: [mailto:conpapATowasp.gr Konstantinos Papapanagiotou]&lt;br /&gt;
&lt;br /&gt;
Committee Members: [mailto:manosATowasp.gr Emmanouel Kellinis], [mailto:steliosATowasp.gr Stelios Tigkas], [mailto:vsvlachosATowasp.gr Vasileios Vlachos]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Τι είναι το OWASP  ==&lt;br /&gt;
&lt;br /&gt;
Το ΟWASP (Open Web Application Security Project – http://www.owasp.org) αποτελεί μία πρωτοβουλία που αποσκοπεί στον εντοπισμό και στην καταπολέμηση των τρωτών σημείων του λογισμικού τέτοιων εφαρμογών. Όντας ένας μη κερδοσκοπικός οργανισμός, ακολουθεί την ιδεολογία του Ελεύθερου/Ανοικτού λογισμικού, παρέχοντας δωρεάν αλλά επαγγελματικής ποιότητας έγγραφα, εργαλεία και πρότυπα. Παράλληλα, ενισχύει τη διοργάνωση συνεδρίων και τοπικών ομάδων εργασίας (local chapters), τη δημοσίευση άρθρων και συγγραμμάτων, καθώς και την ανταλλαγή απόψεων μέσα από forums και mailing lists. Το OWASP απαριθμεί μέλη σε όλο τον πλανήτη, συμπεριλαμβανομένων μεγάλων οργανισμών και εταιριών του χώρου όπως VISA, Deloitte, Unisys, Foundstone, και άλλες. &lt;br /&gt;
&lt;br /&gt;
== Η Ελληνική Κοινότητα ==&lt;br /&gt;
&lt;br /&gt;
Η ελληνική ομάδα εργασίας του OWASP δημιουργήθηκε το 2005, με κύριο στόχο την ενημέρωση και την αφύπνιση της ελληνικής κοινότητας αναφορικά με τους κινδύνους ασφαλείας στις διαδικτυακές εφαρμογές. Αφορμή για τη δημιουργία της αποτέλεσαν ουσιαστικά τα ολοένα αυξανόμενα περιστατικά ασφαλείας στο διαδίκτυο, όπως τα κρούσματα phishing σε ελληνικές τράπεζες. &lt;br /&gt;
&lt;br /&gt;
Σήμερα, η ελληνική ομάδα του OWASP δραστηριοποιείται σε προγράμματα Ελεύθερου/Ανοικτού λογισμικού καθώς και μεταφράσεις κειμένων του OWASP στα ελληνικά, προωθώντας την ιδέα του OWASP σε τοπικό επίπεδο. Παράλληλα, μέσα από τη mailing list της ενημερώνει και προκαλεί συζητήσεις σχετικά με επίκαιρα θέματα ασφάλειας στο διαδίκτυο, ενώ εκδίδει και μηνιαίο newsletter. &lt;br /&gt;
&lt;br /&gt;
== Συμμετοχή  ==&lt;br /&gt;
&lt;br /&gt;
Η ελληνική κοινότητα του OWASP επιθυμεί να φέρει σε επαφή όλους όσους ενδιαφέρονται και προβληματίζονται για την ασφάλεια των διαδικτυακών εφαρμογών. Ταυτόχρονα, ευπρόσδεκτοι είναι και εθελοντές που προτίθενται να δουλέψουν σε προγράμματα Ελεύθερου/Ανοιχτού λογισμικού που συντονίζει το OWASP. Σας προσκαλούμε να μοιραστείτε μαζί μας ιδέες, σκέψεις και προβληματισμούς σχετικά με επιθέσεις, μεθόδους άμυνας και αντιμετώπισης, εργαλεία και βέλτιστες πρακτικές ασφάλειας στο διαδίκτυο. Ανεξάρτητα από το τεχνικό επίπεδο, το βάθος της προσέγγισης και τις χρησιμοποιούμενες μεθόδους, θα χαρούμε ιδιαίτερα αν έρθετε σε επαφή μαζί μας. &lt;br /&gt;
&lt;br /&gt;
Για να εγγραφείτε στη '''mailing list''' της ελληνικής ομάδας εργασίας επισκεφθείτε [http://lists.owasp.org/mailman/listinfo/owasp-greece αυτή τη σελίδα]. &lt;br /&gt;
&lt;br /&gt;
== Ευχαριστίες  ==&lt;br /&gt;
&lt;br /&gt;
Θα θέλαμε να ευχαριστήσουμε το [http://www.di.uoa.gr Τμήμα Πληροφορικής και Τηλεπικοινωνιών] του Πανεπιστημίου Αθηνών για τη βοήθεια που παρέχει στην ελληνική ομάδα εργασίας. &lt;br /&gt;
&lt;br /&gt;
[[Image:Universityofathenslogo.gif]] &lt;br /&gt;
&lt;br /&gt;
Επίσης θα θέλαμε να ευχαριστήσουμε θερμά το περιοδικό [http://www.linuxinside.gr/ Linux Inside] για την υποστήριξη και την προβολή καθώς και το [http://www.zero.gr zero.gr].&lt;br /&gt;
&lt;br /&gt;
[[Image:Linuxinside-logo.png]] [[Image:zerologo.png]]&lt;br /&gt;
&lt;br /&gt;
==== News ====&lt;br /&gt;
&lt;br /&gt;
== Ομάδες Εργασίας  ==&lt;br /&gt;
&lt;br /&gt;
Αυτήν την περίοδο ψάχνουμε για νέες project ιδέες. Εάν έχεις καινούρια ίδεα για κάποιο εργαλείο, στατιστικά στοιχεία για το πόσο σοβαρά λαμβάνουν στην Ελλάδα το application security οι προγραμματιστές, εταιρίες λογισμικού κτλ ή αν έχεις οποιάδηποτε άλλη ιδέα με κεντρικό θέμα το application security επικοινωνήστε μαζί μας. &lt;br /&gt;
&lt;br /&gt;
== Νέα  ==&lt;br /&gt;
&lt;br /&gt;
'''16/3/2011''' - Η πρώτη συνάντηση θα πραγματοποιηθεί στο [http://www.colabworkspace.com/ CoLab Athens Workspace]. Περισσότερες πληφορορίες και εγγραφές [http://owaspgr01.eventbrite.com/ εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''20/9/2009''' - Ο [mailto:vsvlachosATowasp.gr Βασίλης Βλάχος], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, θα συντονίσει στις 26/9/2009 τη συνεδρία με θέμα Web Application Security που συνδιοργανώνει το OWASP.gr στα πλάισια του συνεδρίου 4th Mediterranean Conference on Information Systems ([http://www.mcis2009.org MCIS 2009]). Η συνεδρία θα πραγματοποιηθεί στις 26 Σεπτεμβρίου 2009 και ώρα 15:30 στο Οικονομικό Πανεπιστήμιο Αθηνών. &lt;br /&gt;
&lt;br /&gt;
'''5/3/2009''' - Ο [mailto:conpapATowasp.gr Κωνσταντίνος Παπαπαναγιώτου], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, θα συντονίσει στις 18 Μαρτίου την ενότητα &amp;quot;Πρότυπα και Νομικές Απαιτήσεις&amp;quot; στα πλαίσια της [http://www.tsomokos.gr/projects2.php EXPOSEC 2009], που διεξάγεται στις 17 και 18 Μαρτίου στο Ζάππειο Μέγαρο. &lt;br /&gt;
&lt;br /&gt;
'''3/2/2009''' - Ο [mailto:conpapATowasp.gr Κωνσταντίνος Παπαπαναγιώτου], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, έδωσε ζωντανή συνέντευξη στην εκπομπή Ατζέντα+ της ψηφιακής πλατφόρμας της ΕΡΤ (κανάλι Σπορ+/Info+), όπου μίλησε για τις δραστηριότητες του OWASP στην Ελλάδα και έδωσε απλές συμβουλές για την ασφάλεια στο Internet. Μπορείτε να παρακολουθήσετε το βίντεο της συνέντευξης [http://www.youtube.com/watch?v=q0RPKaPGICI εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''10/10/2008''' - Το OWASP.gr συμμετέχει στο Athens Digital Week που πραγματοποιείται από τις 13 ως τις 19 Οκτωβρίου στη Τεχνόπολη στο Γκάζι (http://conf.ellak.gr). &lt;br /&gt;
&lt;br /&gt;
'''30/9/2008''' - Το OWASP.gr παρουσιάζει το πρώτο Ελληνικό blog με θέμα την ασφάλεια των διαδικτυακών εφαρμογών αλλά και των υπολογιστικών συστημάτων γενικότερα. Επισκεφθείτε το επίσημο blog της Ελληνικής ομάδας εργασίας του OWASP στο: http://blog.owasp.gr. &lt;br /&gt;
&lt;br /&gt;
'''5/6/2008''' - Η παρουσίαση του OWASP.gr στο 3ο Συνέδριο ΕΛ/ΛΑΚ είναι διαθέσιμη μέσα από την ενότητα [https://www.owasp.org/index.php/OWASP_Education_Presentation#Chapter_Presentations Chapter Presentations] και συγκεκριμένα [http://www.owasp.org/images/e/e5/OWASP_ellak-Greece.ppt εδώ]. Επίσης, βίντεο της παρουσίασης μπορείτε να βρείτε [http://conf.ellak.gr/2008/index.php?option=com_eventlist&amp;amp;Itemid=119&amp;amp;func=details&amp;amp;did=19 εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''26/5/2008''' - Το OWASP.gr αναπτύσσει έναν Web Vulnerability Scanner. Μπορείτε να κατεβάσετε την beta έκδοσή του από [https://www.owasp.org/images/6/65/WVS_beta-0.2.1.zip εδώ]. &lt;br /&gt;
&lt;br /&gt;
'''15/5/2008''' - Το OWASP.gr συμμετέχει στο 3ο Συνέδριο ΕΛ/ΛΑΚ που πραγματοποιείται στις 27 και 28 Μαΐου στο Εθνικό Μετσόβιο Πολυτεχνείο (http://conf.ellak.gr). &lt;br /&gt;
&lt;br /&gt;
'''20/2/2008''' - Το OWASP.gr συμμετέχει στο 1ο Συνέδριο Κοινοτήτων Ελεύθερου Λογισμικού/Λογισμικού Ανοιχτού Κώδικα που διοργανώνεται στις 21 και 22 Μαρτίου στο Εθνικό Μετσόβειο Πολυτεχνείο (http://www.fosscomm.gr/). &lt;br /&gt;
&lt;br /&gt;
'''2/2/2008''' - Το OWASP.gr συμμετέχει στην παρουσίαση της ομάδας IA4 του E-Business Forum (Προπαρασκευαστικές δράσεις για τη δημιουργία Ελληνικού Κέντρου Επείγουσας Αντιμετώπισης Ψηφιακών Απειλών GR-CERT) στα πλαίσια του Money Show 2008 στις 2/2/2008 στην Αίγλη Ζαππείου. &lt;br /&gt;
&lt;br /&gt;
'''18/4/2007''' - Το E-Βusiness Forum (http://www.ebusinessforum.gr/) έχει δημιουργήσει μία ομάδα εργασίας η οποία έχει αναλάβει τις &amp;quot;'''Προπαρασκευαστικές δράσεις για τη δημιουργία Ελληνικού Κέντρου Επείγουσας Αντιμετώπισης Ψηφιακών Απειλών (GR-CERT)'''&amp;quot;. Πληροφορίες σχετικά με τους στόχους και τις δραστηριότητες της ομάδας υπάρχουν [http://www.ebusinessforum.gr/teams/teamsall/view/index.php?ctn=102&amp;amp;language=el εδώ] αλλά και [http://sense.dmst.aueb.gr/ia4/index.php/Main_Page εδώ]. Όποιος ενδιαφέρεται και μπορεί να βοηθήσει να δηλώσει συμμετοχή στις παραπάνω σελίδες ή να απευθυνθεί στο κ. Βασίλειο Βλάχο (στοιχεία επικοινωνίας υπάρχουν στα παραπάνω site). &lt;br /&gt;
&lt;br /&gt;
Καταχωρήθηκε το [http://www.owasp.gr OWASP.gr]! &lt;br /&gt;
&lt;br /&gt;
Με τη βοήθεια του Αναστάσιου Καζακώνη μετέφράστηκαν το &amp;quot;OWASP Top Ten Vulnerabilties in Web Application Security&amp;quot; και το OWASP AppSec FAQ στα Ελληνικά. Έτσι είναι πλέον διαθέσιμες οι ελληνικές εκδόσεις του [http://www.owasp.org/images/8/8b/OWASP_Top_Ten_2004_Greek.pdf OWASP Top Ten] και του [http://www.owasp.org/images/e/ed/OWASP_faq_Greek.pdf OWASP AppSec FAQ]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Meetings ====&lt;br /&gt;
&lt;br /&gt;
== Call for Presentations ==&lt;br /&gt;
Anything related to '''Application''' or '''Information Security'''&lt;br /&gt;
*Secure Coding Practices&lt;br /&gt;
*Secure Application Development Lifecycle&lt;br /&gt;
*Penetration Testing and Exploitation&lt;br /&gt;
*Code Reviewing&lt;br /&gt;
*Projects and Tools&lt;br /&gt;
*Methodologies&lt;br /&gt;
*Best Practices&lt;br /&gt;
&lt;br /&gt;
Send:&lt;br /&gt;
*Title&lt;br /&gt;
*Abstract&lt;br /&gt;
*Name and affiliation&lt;br /&gt;
*Short Bio&lt;br /&gt;
To: [mailto:konstantinos@owasp.org konstantinos@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== Meetings ==&lt;br /&gt;
&lt;br /&gt;
=== 5/5/2011 ===&lt;br /&gt;
Χώρος: [http://www.di.uoa.gr/ Τμήμα Πληροφορικής και Τηλεπικοινωνιών/ΕΚΠΑ]&lt;br /&gt;
&lt;br /&gt;
Περιγραφή: [http://owaspgr02.eventbrite.com/ http://owaspgr02.eventbrite.com/]&lt;br /&gt;
&lt;br /&gt;
* '''Welcome and OWASP News''' - '''Konstantinos Papapanagiotou''' (OWASP Greek Chapter Leader/Syntax IT Inc) '''([[Media:OWASP_gr_meeting_2011_02.pdf‎|PDF]])'''&lt;br /&gt;
* '''Protecting the Core: Kernel Exploitation Mitigations''' - '''Patroklos Argyroudis and Dimitris Glynos''' (Census) '''([http://census.gr/media/bheu-2011-slides.pdf PDF])'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 16/3/2011 ===&lt;br /&gt;
Χώρος: [http://www.colabworkspace.com/ coLab Athens Workspace]&lt;br /&gt;
&lt;br /&gt;
Περιγραφή: [http://owaspgr01.eventbrite.com/ http://owaspgr01.eventbrite.com/]&lt;br /&gt;
&lt;br /&gt;
* '''Welcome and Intro to OWASP Meetings''' '''([[Media:OWASP_gr_meeting_2011_01_intro.pdf‎‎|PDF]])'''&lt;br /&gt;
* '''Application Security for the Masses''' - '''Konstantinos Papapanagiotou''' (OWASP Greek Chapter Leader/Syntax IT Inc) '''([[Media:OWASP_gr_meeting_2011_01_appsec_masses.pdf|PDF]])'''&lt;br /&gt;
* '''Cyberdefense and the Kobayashi Maru''' - '''Yiorgos Adamopoulos''' (TEE) '''([[Media:Adamopoulos_Cyberdefense_and_the_Kobayashi_Maru.pdf‎|PDF]])'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Events ====&lt;br /&gt;
&lt;br /&gt;
'''26/9/2009''' - Το OWASP.gr συνδιοργανώνει ένα session με θέμα Web Application Security στα πλαίσια του 4th Mediterranean Conference on Information Systems ([http://www.mcis2009.org MCIS 2009]) στις 26 Σεπτεμβρίου 2009 και ώρα 15:30 στο Οικονομικό Πανεπιστήμιο Αθηνών. Το αναλυτικό πρόγραμμα του συνεδρίου καθώς και περισσότερες πληροφορίες υπάρχουν [http://www.mcis2009.org εδώ]. Το session θα συντονίζει ο [mailto:vsvlachosATowasp.gr Βασίλης Βλάχος], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα. &lt;br /&gt;
&lt;br /&gt;
'''18/3/2009''' - Συμμετοχή του OWASP.gr στην [http://www.tsomokos.gr/projects2.php EXPOSEC 2009] που θα πραγματοποιηθεί στις 17 και 18 Μαρτίου στο Ζάππειο Μέγαρο. Ο [mailto:conpapATowasp.gr Κωνσταντίνος Παπαπαναγιώτου], μέλος της ομάδας συντονισμού του OWASP στην Ελλάδα, θα συντονίσει στις 18 Μαρτίου την ενότητα &amp;quot;Πρότυπα και Νομικές Απαιτήσεις&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
'''17 και 18/10/2008''' - Παρουσίαση του OWASP.gr στα πλαίσια του '''Athens Digital Week''' που πραγματοποιείται από τις 13 ως τις 19 Οκτωβρίου στην Τεχνόπολη στο Γκάζι (http://www.athensdigitalweek.gr). Σύμφωνα με το [http://www.athensdigitalweek.gr/el/the-core/talk-zone πρόγραμμα], η παρουσίαση θα γίνει την Παρασκευή, 17 Οκτωβρίου 2008 και ώρα 16:30 καθώς και το Σάββατο, 18 Οκτωβρίου 2008 και ώρα 18:00. &lt;br /&gt;
&lt;br /&gt;
'''27/5/2008''' - Παρουσίαση του OWASP.gr στα πλαίσια του '''3ου Συνεδρίου Ελεύθερου Λογισμικού / Λογισμικού Ανοιχτού Κώδικα''' που πραγματοποιείται στις 27 και 28 Μαΐου στο Εθνικό Μετσόβειο Πολυτεχνείο (http://conf.ellak.gr). Σύμφωνα με το [http://conf.ellak.gr/2008/index.php?option=com_jcalpro&amp;amp;Itemid=138&amp;amp;extmode=week&amp;amp;date=2008-05-25 πρόγραμμα] του συνεδρίου, η παρουσίαση θα γίνει την Τρίτη, 27 Μαΐου 2008 και ώρα 11:15. &lt;br /&gt;
&lt;br /&gt;
'''22/3/2008''' - Παρουσίαση του OWASP.gr στα πλαίσια του '''1ου Συνέδριο Κοινοτήτων Ελεύθερου Λογισμικού/Λογισμικού Ανοιχτού Κώδικα''' που διοργανώνεται στις 21 και 22 Μαρτίου στο Εθνικό Μετσόβειο Πολυτεχνείο (http://www.fosscomm.gr/). Σύμφωνα με το [http://www.fosscomm.gr/xoops20171/htdocs/uploads/programma_synedriou.html πρόγραμμα], η παρουσίαση θα γίνει στις 17:50. &lt;br /&gt;
&lt;br /&gt;
'''2/2/2008''' - Παρουσίαση της ομάδας IA4 του E-Business Forum (Προπαρασκευαστικές δράσεις για τη δημιουργία Ελληνικού Κέντρου Επείγουσας Αντιμετώπισης Ψηφιακών Απειλών GR-CERT) στα πλαίσια του '''Money Show 2008'''. &lt;br /&gt;
&lt;br /&gt;
==== Archive  ====&lt;br /&gt;
&lt;br /&gt;
== Μηνιαίο Ενημερωτικό Δελτίο  ==&lt;br /&gt;
&lt;br /&gt;
Καλώς ήλθατε στο μηνιαίο ενημερωτικό δελτίο της Ελληνικής ομάδας εργασίας του OWASP. Στόχος μας είναι η ενημέρωση γύρω από τα θέματα της ελληνικής επικαιρότητας που αφορούν στην ασφάλεια των εφαρμογών διαδικτύου αλλά και στην ασφάλεια γενικότερα. Αν και στο Internet υπάρχουν ήδη πολλές πηγές ενημέρωσης γύρω από θέματα ασφάλειας (π.χ. securityfocus, cryptogram, blogs, κλπ), αυτές επικεντρώνονται συνήθως στη διεθνή επικαιρότητα. Έτσι, μοιραία η ενημέρωση για τα security θέματα που αφορούν στην Ελλάδα προέρχεται από τα τοπικά ειδησεογραφικά site και μέσα. &lt;br /&gt;
&lt;br /&gt;
Με το μηνιαίο αυτό newsletter στοχεύουμε στην αποτύπωση των κυριότερων θεμάτων ασφάλειας που απασχολούν την Ελληνική επικαιρότητα κάθε μήνα, αλλά και σημαντικών νέων από τη διεθνή infosec επικαιρότητα που κρίνουμε πως πρέπει να σχολιάσουμε. Παράλληλα, θα υπάρχουν ενδιαφέροντα επιστημονικά θέματα αλλά και ενημέρωση γύρω από τη δραστηριότητα του OWASP. Το newsletter θα διαμοιράζεται μέσω της mailing list του OWASP.gr, ενώ ταυτόχρονα θα δημοσιεύεται και εδώ σε μορφή pdf. Υπεύθυνος για την έκδοσή του είναι ο συνεργάτης του OWASP.gr Γιάννης Αναστασόπουλος. &lt;br /&gt;
&lt;br /&gt;
Ελπίζουμε πως θα βρείτε το newsletter αυτό ενδιαφέρον και χρήσιμο. Φυσικά, βρίσκεται σε… εμβρυικό στάδιο. Για το λόγο αυτό κάθε συνεισφορά σας στη δημιουργία του θα ήταν ιδιαίτερα σημαντική, για να γίνει το newsletter πιο χρήσιμο για όλους. Έτσι, για οποιαδήποτε σχόλια, προσθήκες, προτάσεις, παρατηρήσεις ή συζητήσεις μπορείτε να απευθύνεστε στη mailing list του OWASP.gr ([mailto:owasp-greece@lists.owasp.org owasp-greece@lists.owasp.org]). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; [http://www.owasp.org/images/2/21/OWASP_gr_newsletter_1.pdf Ενημερωτικό Δελτίο νο1 - Δεκέμβριος 2006] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/0/0a/OWASP_gr_newsletter_2.pdf Ενημερωτικό Δελτίο νο2 - Ιανουάριος 2007] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/4/4e/OWASP_gr_newsletter_3.pdf Ενημερωτικό Δελτίο νο3 - Φεβρουάριος 2007] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/b/b1/OWASP_gr_newsletter_4.pdf Ενημερωτικό Δελτίο νο4 - Μάρτιος-Απρίλιος 2007] &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/1/11/OWASP_gr_newsletter_5.pdf Ενημερωτικό Δελτίο νο5 - Ιανουάριος 2008] &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/3/3f/OWASP_gr_newsletter_6.pdf Ενημερωτικό Δελτίο νο6 - Φεβρουάριος 2008] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:2ndISACAConf.JPG&amp;diff=139373</id>
		<title>File:2ndISACAConf.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:2ndISACAConf.JPG&amp;diff=139373"/>
				<updated>2012-11-13T20:39:23Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_SecuringDevelopmentwithPMD.pdf&amp;diff=135289</id>
		<title>File:AppSecEU2012 SecuringDevelopmentwithPMD.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_SecuringDevelopmentwithPMD.pdf&amp;diff=135289"/>
				<updated>2012-09-04T09:05:32Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Wilander.pdf&amp;diff=135158</id>
		<title>File:AppSecEU2012 Wilander.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Wilander.pdf&amp;diff=135158"/>
				<updated>2012-08-31T07:06:37Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_heap.pdf&amp;diff=135070</id>
		<title>File:AppSecEU2012 heap.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_heap.pdf&amp;diff=135070"/>
				<updated>2012-08-30T12:37:25Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Welcome.pdf&amp;diff=135069</id>
		<title>File:AppSecEU2012 Welcome.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Welcome.pdf&amp;diff=135069"/>
				<updated>2012-08-30T12:33:00Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Jackpotting.pdf&amp;diff=135068</id>
		<title>File:AppSecEU2012 Jackpotting.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Jackpotting.pdf&amp;diff=135068"/>
				<updated>2012-08-30T12:24:42Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_PCI.pdf&amp;diff=135067</id>
		<title>File:AppSecEU2012 PCI.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_PCI.pdf&amp;diff=135067"/>
				<updated>2012-08-30T12:20:32Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_MitB.pdf&amp;diff=135066</id>
		<title>File:AppSecEU2012 MitB.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_MitB.pdf&amp;diff=135066"/>
				<updated>2012-08-30T12:18:09Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Benoist.pdf&amp;diff=135065</id>
		<title>File:AppSecEU2012 Benoist.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Benoist.pdf&amp;diff=135065"/>
				<updated>2012-08-30T12:17:39Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Oracle.pdf&amp;diff=135064</id>
		<title>File:AppSecEU2012 Oracle.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Oracle.pdf&amp;diff=135064"/>
				<updated>2012-08-30T12:16:58Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Spaghetti.pdf&amp;diff=135063</id>
		<title>File:AppSecEU2012 Spaghetti.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Spaghetti.pdf&amp;diff=135063"/>
				<updated>2012-08-30T12:15:44Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Livshits.pdf&amp;diff=135062</id>
		<title>File:AppSecEU2012 Livshits.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Livshits.pdf&amp;diff=135062"/>
				<updated>2012-08-30T12:12:41Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Winckles.pdf&amp;diff=135061</id>
		<title>File:AppSecEU2012 Winckles.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Winckles.pdf&amp;diff=135061"/>
				<updated>2012-08-30T12:10:35Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_zombies_decade_swsec12.pdf&amp;diff=134435</id>
		<title>File:AppSecEU2012 zombies decade swsec12.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_zombies_decade_swsec12.pdf&amp;diff=134435"/>
				<updated>2012-08-16T21:15:04Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_WhatPermissionsDoesYourDatabaseUserREALLYNeed.pdf&amp;diff=134434</id>
		<title>File:AppSecEU2012 WhatPermissionsDoesYourDatabaseUserREALLYNeed.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_WhatPermissionsDoesYourDatabaseUserREALLYNeed.pdf&amp;diff=134434"/>
				<updated>2012-08-16T21:14:12Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Top_Ten_Defenses.pdf&amp;diff=134433</id>
		<title>File:AppSecEU2012 Top Ten Defenses.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Top_Ten_Defenses.pdf&amp;diff=134433"/>
				<updated>2012-08-16T21:11:17Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_SS_goes_mobile.pdf&amp;diff=134432</id>
		<title>File:AppSecEU2012 SS goes mobile.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_SS_goes_mobile.pdf&amp;diff=134432"/>
				<updated>2012-08-16T21:09:05Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Screw_You.pdf&amp;diff=134431</id>
		<title>File:AppSecEU2012 Screw You.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Screw_You.pdf&amp;diff=134431"/>
				<updated>2012-08-16T21:02:05Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_ScannerBenchmarking.pdf&amp;diff=134430</id>
		<title>File:AppSecEU2012 ScannerBenchmarking.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_ScannerBenchmarking.pdf&amp;diff=134430"/>
				<updated>2012-08-16T21:01:16Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_PASTA.pdf&amp;diff=134429</id>
		<title>File:AppSecEU2012 PASTA.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_PASTA.pdf&amp;diff=134429"/>
				<updated>2012-08-16T20:59:13Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: uploaded a new version of &amp;amp;quot;File:AppSecEU2012 PASTA.pdf&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_PASTA.pdf&amp;diff=134428</id>
		<title>File:AppSecEU2012 PASTA.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_PASTA.pdf&amp;diff=134428"/>
				<updated>2012-08-16T20:50:26Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Mobile_Risks.pdf&amp;diff=134427</id>
		<title>File:AppSecEU2012 Mobile Risks.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Mobile_Risks.pdf&amp;diff=134427"/>
				<updated>2012-08-16T20:49:14Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Everything_u_know_about_InjectionAttack.pdf&amp;diff=134426</id>
		<title>File:AppSecEU2012 Everything u know about InjectionAttack.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AppSecEU2012_Everything_u_know_about_InjectionAttack.pdf&amp;diff=134426"/>
				<updated>2012-08-16T20:47:00Z</updated>
		
		<summary type="html">&lt;p&gt;Conpap: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Conpap</name></author>	</entry>

	</feed>