<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Delta24</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Delta24"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Delta24"/>
		<updated>2026-04-11T18:19:59Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=249236</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=249236"/>
				<updated>2019-03-24T06:25:18Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* Brief Explanation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF==&lt;br /&gt;
&lt;br /&gt;
=== Idea 1 Improving the Machine Learning chatbot: ===&lt;br /&gt;
We want to extend the functionality of SKF Bot. (Security Knowledge Framework Chatbot):&lt;br /&gt;
&lt;br /&gt;
Some improvements or the suggestions which we can do to improve the functionality are:&lt;br /&gt;
&lt;br /&gt;
1.    Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
&lt;br /&gt;
2.    Create a Plugin or website bot which we can add in the website for better chat experience for the user.&lt;br /&gt;
&lt;br /&gt;
3.    Extend the bots capability to do the google search (using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
&lt;br /&gt;
4.    Add basic conversation flow which makes SKF Bot friendly and provides the better user experience. Example: Replies to the general queries like How are you? What is your Name etc?&lt;br /&gt;
&lt;br /&gt;
5.    Extend the bot capability to reply to what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
# Extend the bot to different platforms like Facebook, telegram, slack, Google Assistant etc.&lt;br /&gt;
Existing chatbot implementation is on Gitter. You can test the bot by typing @skfchatbot on Gitter Community.&lt;br /&gt;
&lt;br /&gt;
'''Getting started:'''&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the architecture and code base of SKF (Security Knowledge Framework)&lt;br /&gt;
&lt;br /&gt;
·         Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
·         Python 3+, Flask, Coffee Script&lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Priyanka Jain (Mentor)&lt;br /&gt;
&lt;br /&gt;
=== Idea 2 Improving and building Lab challenges and write-ups: ===&lt;br /&gt;
Build lab examples and write-ups (how to test) for different vulnerabilities over different technology stacks. These challenges are to be delivered in Docker so they can be &lt;br /&gt;
&lt;br /&gt;
easily deployed.&lt;br /&gt;
&lt;br /&gt;
In the current situation the security knowledge framework ultimately presents a list of security controls with correlating knowledge base items that contain a description and &lt;br /&gt;
&lt;br /&gt;
a solution. The new labs are used to give the software developers or application security specialists a more in depth understanding and approach on how to test the &lt;br /&gt;
&lt;br /&gt;
vulnerabilities in their own code.  &lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
The images that are pushed to the Github repository are already automatically build and pushed to a docker registry where the SKF users can easily pull the images from to get their&lt;br /&gt;
&lt;br /&gt;
labs running. Of course they can download it and build it themselves from source by pulling the original repository.  &lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''  &lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool and is used as the backbone for security programs. It is easy to get started with to work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
'''Issue Tracking:'''&lt;br /&gt;
&lt;br /&gt;
Enhancement [https://github.com/DefectDojo/django-DefectDojo/issues?q=is%3Aissue+is%3Aopen+label%3Aenhancement requests] and [https://github.com/DefectDojo/django-DefectDojo/issues?q=is%3Aissue+is%3Aopen+label%3Abug bugfixes] are located in Github issues. This project could implement a whole bunch of new features one by one and release them over the course of several small releases. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 5 or more new features or functional enhancements of significant scope for OWASP DefectDojo&lt;br /&gt;
* Each feature comes with full functional unit and integration tests&lt;br /&gt;
'''Getting started:'''&lt;br /&gt;
* Get familiar with the architecture and code base of the application built on Django&lt;br /&gt;
* Review the application functionality and familiarize yourself with Products, Engagements, Tests and Findings.&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python, Django, Javascript, Unit/Integration testing.&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[Mailto:aaron.weaver2+gsoc@gmail.com|Aaron Weaver]] - DefectDojo Project Leader&lt;br /&gt;
* [[Mailto:greg.anderson@owasp.org|Greg Anderson]] - DefectDojo Project Leader&lt;br /&gt;
* [[Mailto:matt.tesauro@owasp.org|Matt Tesauro]] - DefectDojo Project Leader&lt;br /&gt;
'''Option 1: Unit Tests - Difficulty: Easy'''&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
* Review the current [https://github.com/DefectDojo/django-DefectDojo/tree/dev/dojo/unittests unit tests]  &lt;br /&gt;
* Complete Code Coverage Testing&lt;br /&gt;
** Validate Tests exist for the following (create any that are missing):&lt;br /&gt;
*** Finding, Test, Engagement, Reports, Endpoints &lt;br /&gt;
*** Import from all scanners &lt;br /&gt;
'''Option 2: Python3 Completion'''&lt;br /&gt;
* DefectDojo is finishing up a migration to Python3&lt;br /&gt;
Test the current [https://github.com/DefectDojo/django-DefectDojo/tree/python3/dojo/unittests state] of Python3&lt;br /&gt;
* Ensure all features work&lt;br /&gt;
* Travis testing works correctly&lt;br /&gt;
'''Option 3: Scan 2.0 / Launch Containers'''&lt;br /&gt;
&lt;br /&gt;
Scan 2.0 consists of automating the scanning orchestration within DefectDojo. Several proof of concepts exist for this using the AppSecpPipeline to launch containers and then push those finding into the appropriate product. &lt;br /&gt;
* Use the [https://github.com/appsecpipeline/AppSecPipeline-Specification AppSecPipeline] containers to build a scanning pipeline built on top of [https://www.openfaas.com/ OpenFaaS]&lt;br /&gt;
* Scans should be able to be scheduled by DefectDojo and then invoked via the REST API call to OpenFaaS&lt;br /&gt;
* Upon scan completion the results will be posted back to DefectDojo via DefectDojo's REST API and consumed as an engagement/test.&lt;br /&gt;
* Pick 2 or 3 popular open source scanners such as NMAP, ZAP and Nikto to start out with.&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Python_Honeypot|OWASP Honeypot]] is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to adding more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
&lt;br /&gt;
* Zero Bugs: Currently we may have several bugs in different conditions, and it's best to test the all functions and fix them&lt;br /&gt;
* Monitoring: Right now monitoring limited to the connections (send&amp;amp;recieve) and it's best to store and analysis the contents for farther investigations and recognizing incoming attacks.&lt;br /&gt;
* Duplicated codes: codes are complicated and duplicated in engine, should be fixed/clean up&lt;br /&gt;
* New modules: add some creative ICS/Network/Web modules andvulnerable web applications, services and stuff&lt;br /&gt;
* API: update API sync to all features&lt;br /&gt;
* WebUI: Demonstrate and add API on WebUI and Live version with all features&lt;br /&gt;
* WebUI Special Reports: Track the attacks more creative and provide high risk IPs&lt;br /&gt;
* Database: Better database structure, faster and use queue&lt;br /&gt;
* Data analysis: Analysis stored data and attack signatures&lt;br /&gt;
* OWASP Top 10: Preparing useful processed/raw data for OWASP top 10 project&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis &amp;amp; Tshark &amp;amp; Libpcap&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
* Web Development Skills&lt;br /&gt;
* Honeypot and Deception knowledge&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and Angular. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the potential mentors (@bkimminich, @J12934 and @CaptainFreak) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Feature Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new functionality and &amp;quot;business&amp;quot; features are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Afeature GitHub issues labeled &amp;quot;feature&amp;quot;]. This project could implement a whole bunch of new features one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
''Coming up with good additional ideas for features and new functionality in the proposal could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 5 or more new features or functional enhancements of significant scope for OWASP Juice Shop (not necessarily including corresponding challenges)&lt;br /&gt;
* Each feature comes with full functional unit and integration tests&lt;br /&gt;
* Extending the functional walk-through chapter of the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, security knowledge is optional.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Juice Shop Mobile ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
A complete mobile client for Juice-Shop API which will serve a legit mobile experience for Juice-Shop user as well as a plethora of Mobile app vulnerabilities and challenges around them to solve. Should in the best case translate the idea of Juice Shop's hacking challenges with a score board and success notifications into the mobile world.&lt;br /&gt;
&lt;br /&gt;
''Coming up with a sophisticated proposal (optimally even with a good initial sample implementation) could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's RESTful backend&lt;br /&gt;
* Get familiar with Native App developement&lt;br /&gt;
* Get familiar with Mobile vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A mobile App with consistent UI/UX for Juice-Shop with standard client side vulnerabilities.&lt;br /&gt;
* Sufficient initial release quality (en par with Juice Shop and Juice Shop CTF) to make it an official extension project hosted in its own GitHub repository ''bkimminich/juice-shop-mobile''&lt;br /&gt;
* Code follows existing styleguides and applies similar quality gates regarding code smells, test coverage etc. as the main project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) React Native and NodeJS/Express, some Mobile security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
''Coming up with good additional ideas for challenges in the proposal could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges)&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Hacking Instructor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
While the Juice Shop is offering a lot of long-lasting motivation and challenges for security experts, it might be a bit daunting for newcomers and less experienced hackers.&lt;br /&gt;
The &amp;quot;Hacking Instructor&amp;quot; as sketched in [https://github.com/bkimminich/juice-shop/issues/440 GitHub issue #440] could guide users from this target audience through at least some of the hacking challenges. As this would be an entirely new and relatively independent feature of the Juice Shop, students should be able to bring in their own creativity and ideas a lot.&lt;br /&gt;
&lt;br /&gt;
''For this project, a good proposal with a design &amp;amp; implementation proposal more sophisticated than the rough ideas in [https://github.com/bkimminich/juice-shop/issues/440 #440] is paramount to be selected as a student!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A working implementation of e.g. an avatar-style &amp;quot;Hacking Instructor&amp;quot; or other solution based on the students own proposal&lt;br /&gt;
* Coverage of at least the trivial (1-star) and some easy (2-star) challenges&lt;br /&gt;
* Documentation how to configure or script the &amp;quot;Hacking Instructor&amp;quot; for challenges in general&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular, some UI/UX experience would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP-Securetea Tools Project ==&lt;br /&gt;
The OWASP SecureTea Project is a application designed to help Secure a person's laptop or computer / server with IoT (Internet Of Things) for notify users (via various communication mechanisms), whenever someone accesses their computer / server. This application uses the touchpad/mouse/wireless mouse to determine activity and is developed in Python and tested on various machines (Linux, Mac &amp;amp; Windows)&lt;br /&gt;
. -&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project/blob/master/README.md&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
We are looking any awesome idea to improve Securetea Project that is not on this list? We are expecting make this project will be useful to everyone to secure their Small IoT. &lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Below roadmap and expect  results you can choose to improve Securetea Project . &lt;br /&gt;
if any bugs please help to fix it&lt;br /&gt;
&lt;br /&gt;
===Roadmap=== &lt;br /&gt;
See Our Roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project#roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Protection /firewall&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Antivirus&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Whatsapp&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by SMS Alerts&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Line&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Telegram&amp;lt;br&amp;gt;&lt;br /&gt;
Intelligent Log Monitoring  include Web Deface Detection&amp;lt;br&amp;gt;&lt;br /&gt;
Detection of malicious devices &amp;lt;br&amp;gt;&lt;br /&gt;
Login History&amp;lt;br&amp;gt;&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Javascript &lt;br /&gt;
* Angular and NodeJS/Express&lt;br /&gt;
* Database&lt;br /&gt;
* Linux&lt;br /&gt;
&lt;br /&gt;
=== Mentors === &lt;br /&gt;
&lt;br /&gt;
* [mailto:ade.putra@owasp.org Ade Yoseman Putra] - (OWASP Securetea Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
* [mailto:rejah.rehim@owasp.org Rejah Rehim.A.A]]- (OWASP Securetea Project Leader)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Passive Online scanner improvements ===&lt;br /&gt;
'''Brief Explanation'''&lt;br /&gt;
&lt;br /&gt;
OWTF allows many passive tests, such as those using third party websites like Google, Bing, etc. searches, as well as handy &amp;quot;Search for vulnerability&amp;quot; search boxes (i.e. Fingerprinting plugin). This feature involves the creation of a '''script''' that produces an interactive OWTF report with the intention of hosting it in the github.io site. The idea here is to have a passive, JavaScript-only interactive report available on the owtf.github.io site, so that people can try OWTF '''without installing anything''', simply visiting a URL.&lt;br /&gt;
&lt;br /&gt;
This would be a normal OWTF interactive report where the user can:&lt;br /&gt;
* Enter a target&lt;br /&gt;
* Try passive plugins (only the parts that use no tools)&lt;br /&gt;
* Play with boilerplate templates from the OWTF interactive report&lt;br /&gt;
An old version of the passive online scanner is hosted at https://owtf.github.io/online-passive-scanner.&lt;br /&gt;
&lt;br /&gt;
'''LEGAL CLARIFICATION (Just in case!)''': The passive online scanner, simply makes OWTF passive testing '''through third party websites''' more accessible to anybody, however it is the user that must 1) click the link manually + 2) do something bad with that afterwards + 3) doing 1 + 2 WITHOUT permission :). Therefore this passive online scanner does not do anything illegal [http://www.slideshare.net/abrahamaranguren/legal-and-efficient-web-app-testing-without-permission More information about why this is not illegal here] (recommended reading!)&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code]/ES6 JavaScript code in all modified code and surrounding areas.'''&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
A good knowledge of JavaScript and writing ES6 compliant React/TypeScript is needed. Previous exposure to security concepts and penetration testing is not required but recommended and some lack of this can be compensated with pre-GSoC involvement and will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP iGoat (draft) ==&lt;br /&gt;
'''Idea 1:''' Completing OWASP iGoat documentation at https://docs.igoatapp.com/ and creating demo videos at for OWASP iGoat YouTube channel for learning purpose.&lt;br /&gt;
&lt;br /&gt;
'''Idea 2:''' Adding new challenge pack / CTF for iGoat. It should be one point solution for learning iOS app security&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid ==&lt;br /&gt;
[[OWASP SeraphimDroid Project|OWASP Seraphimdroid]] is Android security and privacy app, with features to enhance user's knowledge about security and privacy on his/her mobile device. If you are interested in this project and working on it during Google Summer of Code, please contact [[User:Nikola Milosevic|Nikola Milosevic]] and express your interest.&lt;br /&gt;
&lt;br /&gt;
=== Idea 1: Anomaly detection of device state ===&lt;br /&gt;
The idea is that certain features of a device would be constantly monitored (battery use, internet usage, opp calls, etc.). Initially, the usual behaviour of the device would be learned. Later, anomalies normal behavior would be reported to the user. This should involve some explanations, such as which applications are causing an anomaly the device behaviors &lt;br /&gt;
&lt;br /&gt;
=== Idea 2: On device machine learning of maliciousness of an app ===&lt;br /&gt;
Tensor-flow for on-device processing and some other libraries have been released that enable machine learning. We have previously applied a system, that based on permissions, is able to distinguish malicious apps from non-malicious. Now, we would like to learn also from other outputs and things one can monitor about application whether it can be malicious. &lt;br /&gt;
&lt;br /&gt;
=== Idea 3:  Enhansing privacy features ===&lt;br /&gt;
The vision of Seraphimdroid is to be aware of privacy threats. This may be achieved throug knowing which applications are using user accounts or other information that uthe user has on phone to send to the server, or just by knowing which applications may be doing it. Knowledgebase shouldbbeextending with the suggestions on how to improve privacy. Also, automated settings of various apps to use encryption should be proposed.&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
=== Active Scanning WebSockets ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesn't currently support active scanning (automated attacking) of websocket traffic (messages).&lt;br /&gt;
: We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* An pluggable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated Authentication Detection and Configuration ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
: This is time consuming and error prone.&lt;br /&gt;
: Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== IoT Goat ==&lt;br /&gt;
IoT Goat will be a deliberately insecure firmware based on OpenWrt. The project’s goal is to teach users about the most common vulnerabilities typically found in IoT devices. The vulnerabilities will be based on the [https://www.owasp.org/images/1/1c/OWASP-IoT-Top-10-2018-final.pdf IoT Top 10 2018]. &lt;br /&gt;
&lt;br /&gt;
===Idea 1: Insecure firmware web application ecosystem===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
A vulnerable web application, and backend API/web services deployed in OpenWrt containing critical vulnerabilities showcasing the traditional IoT problems.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Have a look at the getting started page to get familiar with virtualizing OpenWrt: https://github.com/scriptingxss/IoTGoat#-getting-started-&lt;br /&gt;
* Create a GitHub account to be added as a collaborator to the repository&lt;br /&gt;
* Review the example vulnerabilities and challenges: https://github.com/scriptingxss/IoTGoat/blob/master/challenges/challenges.md&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Development of a simple web application user interface with web services and API's deployed locally on the OpenWrt firmware. Documented challenges of how to discover and remediate web software security vulnerabilities. The insecure web application services must contain the following vulnerabilities to be used with the IoT testing guide: &lt;br /&gt;
* Command injection&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Local file inclusion &lt;br /&gt;
* XXE injection,Insufficient Authentication&lt;br /&gt;
* Transfer sensitive data using insecure channels&lt;br /&gt;
* Store sensitive data insecurely&lt;br /&gt;
Vulnerable SOAP web services and REST API implementations are in-scope. &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Working Linux knowledge&lt;br /&gt;
* Embedded and/or web development (nice to have)&lt;br /&gt;
** Web application code can be developed using the following common embedded programming languages:&lt;br /&gt;
*** Lua&lt;br /&gt;
*** PHP&lt;br /&gt;
*** C/C++&lt;br /&gt;
*** JavaScript&lt;br /&gt;
&lt;br /&gt;
===Idea 2: Insecure network services===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Deliberately insecure services configured within OpenWrt such as an miniupnp daemon configured with secure_mode off (Secure mode; client can only redirect an incoming port to the client itself (same IP as the request comes from), to demonstrate a port mapping attack where an attacker from inside the network exposes a service that typically should be behind a LAN to the internet). &lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Have a look at the getting started page to get familiar with virtualizing OpenWrt: https://github.com/scriptingxss/IoTGoat#-getting-started-&lt;br /&gt;
* Create a GitHub account to be added as a collaborator to the repository&lt;br /&gt;
* Review the example vulnerabilities and challenges: https://github.com/scriptingxss/IoTGoat/blob/master/challenges/challenges.md&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Documented challenges of how to discover and remediate insecure network service vulnerabilities. The network services can be inherently insecure or have insecure configurations that can be abused during the challenges.&lt;br /&gt;
* Example of network insecure services include:&lt;br /&gt;
** FTP&lt;br /&gt;
** Telnet&lt;br /&gt;
** miniupnpd&lt;br /&gt;
** HTTP&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Working Linux knowledge&lt;br /&gt;
* Network security&lt;br /&gt;
&lt;br /&gt;
===Idea 3: Insecure firmware build system===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Develop custom firmware builds of the latest OpenWrt version (18.06) demonstrating the process of incorporating debug services/tools, misconfigurations, and usage of vulnerable software packages. &lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Review OpenWrt's developer guide to get familiar with creating custom firmware builds&lt;br /&gt;
** https://openwrt.org/docs/guide-developer/start&lt;br /&gt;
** https://openwrt.org/docs/guide-developer/build-system/install-buildsystem&lt;br /&gt;
** https://github.com/openwrt/openwrt&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Provide walkthrough examples of insecure design choices for building firmware. &lt;br /&gt;
* Provide suggested mitigation security controls&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Working Linux knowledge&lt;br /&gt;
* Embedded development (C/C++)&lt;br /&gt;
&lt;br /&gt;
===Suggest your own ideas===&lt;br /&gt;
You may suggest additional challenges or ideas that fit this project's objectives.&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
* Aaron Guzman - OWASP IoT Goat Contributor (Project leader of the IoT and Embedded AppSec project)&lt;br /&gt;
* Fotios Chantzis - OWASP IoT Goat Contributor (and former GSoC Student/GSoc Mentor)&lt;br /&gt;
* [[User:Calderpwn|Paulino Calderon]] - OWASP IoT Goat Contributor (and former GSoC 2011 Student/GSoc Mentor in 2015 and 2017)&lt;br /&gt;
&lt;br /&gt;
==OWASP Web Honeypot Project ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Honeypot Project is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks. Within this project, Anglia Ruskin University is leading the collection, storage and analysis of threat intelligence data. &lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Honeypot_Project&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/Honeypot-Project/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The purpose of this part of the project is to capture intelligence on attacker activity against web applications and utilise this intelligence as ways to protect software against attacks. Honeypots are an established industry technique to provide a realistic target to entice a criminal, whilst encouraging them to divulge the tools and techniques they use during an attack. Like bees to a honeypot. These honeypots are safely designed to contain no information of monetary use to an attacker, and hence provide no risk to the businesses implementing them. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The project will create honeypots that the community can distribute within their own networks. With enough honeypots globally distributed, we will be in a position to aggregate attack techniques to better understand and protect against the techniques used by attackers. With this information, we will be in a position to create educational information, such as rules and strategies, that application writers can use to ensure that any detected bugs and vulnerabilities are closed. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Project progression: &lt;br /&gt;
* Honeypot software. The honeypot software that is to be provided to the community to place in their networks has been written. Honeypots are available in a variety of forms, to make deployment as flexible as possible and appeal to a diverse a user set as possible.&lt;br /&gt;
* Collection software. The centralised collection software has been written and evaluated in a student driven proof-of-concept project. Honeypots have been attacked in a laboratory situation and have reported both the steps taken by the attacker and what they have attacked, back to the collection software.&lt;br /&gt;
* Rollout to the Community. The project now needs a dedicated infrastructure platform in place that is available to the entire community to start collecting intelligence back from community deployed honeypots. This infrastructure will run the collector software, analysis programmes and provide a portal for communicating our finds and recommendations back to the community in a meaningful manner.&lt;br /&gt;
* Going Forward. Toolkits and skills used by attackers do not stand still.  As existing bugs are plugged, others open. Follow up stages for the project will be to create a messaging system to automatically update the community on findings of significant risk in their existing code that requires attention. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&lt;br /&gt;
Some of the ideas from last year's summit&lt;br /&gt;
&lt;br /&gt;
* Setup Proof of Concept to understand how Mod Security baed Honeypot/Probe interacts with a receiving console (develop a VM and/or Docker based test solution to store logs from multiple probes).&lt;br /&gt;
* Evaluate console options to visualise threat data received from ModSecurity Honeypots/probes in MosSecurity Audit Console, WAF-FLE, Fluent and bespoke scripts for single and multiple probes.&lt;br /&gt;
* Develop a mechanism to convert from stored MySQL to JSON format.&lt;br /&gt;
* Provide a mechanism to convert ModSecurity mlogc audit log output into JSON format.&lt;br /&gt;
* Provide a mechanism to convert mlogc audit log output directly into ELK (ElasticSearch/Logstash/Kibana) to visualise the data.&lt;br /&gt;
* Provide a mechanism to forward honest output into threat intelligence format such as STIX using something like the MISP project(https://www.misp-project.org) to share Threat data coming from the Honeypots making it easy to export/import data from formats such as STIX and TAXII., may require use of concurrent logs in a format that MISP can deal with.&lt;br /&gt;
* Consider new alternatives for log transfer including the use of MLOGC-NG or other possible approaches.&lt;br /&gt;
* Develop a new VM based honeypot/robe based on CRS v3.0.&lt;br /&gt;
* Develop new alternative small footprint honeypot/probe formats utilising Docker &amp;amp; Raspberry Pi.&lt;br /&gt;
* Develop machine learning approach to automatically be able to update the rule set being used by the probe based on cyber threat intelligence received.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
Some of the skills we are looking for:&lt;br /&gt;
&lt;br /&gt;
* Apache/Tomcat &lt;br /&gt;
* Any experience of MISP&lt;br /&gt;
* MySQL &amp;amp; JSON&lt;br /&gt;
* ELK &lt;br /&gt;
* STIX/TAXII&lt;br /&gt;
* Python&lt;br /&gt;
* ModSecurity/mlogc&lt;br /&gt;
* OWASP Core RuleSet (CRS)&lt;br /&gt;
* Linux&lt;br /&gt;
* VM/Docker&lt;br /&gt;
&lt;br /&gt;
=== Mentors === &lt;br /&gt;
&lt;br /&gt;
* [mailto:adrian.winckles@owasp.org Adrian Winckles] - (OWASP Web Honeypot Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Suggest your own ideas===&lt;br /&gt;
&lt;br /&gt;
You may suggest additional challenges or ideas that fit this project's objectives.&lt;br /&gt;
&lt;br /&gt;
==OWASP Risk Assessment Framework ==&lt;br /&gt;
Tool projects aim to assessment more than one or many web application using owasp risk rating mathodologies.&lt;br /&gt;
https://github.com/OWASP/RiskAssessmentFramework&lt;br /&gt;
&lt;br /&gt;
'''Idea 1:''' make dashboard with databases and can assess many website based owasp risk rating mathodologies, create graph  and report in pdf,word &amp;amp; excel format.&lt;br /&gt;
=== Mentors === &lt;br /&gt;
* [mailto:ade.putra@owasp.org Ade Yoseman] -  &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=249235</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=249235"/>
				<updated>2019-03-24T06:24:51Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF==&lt;br /&gt;
&lt;br /&gt;
=== Idea 1 Improving the Machine Learning chatbot: ===&lt;br /&gt;
We want to extend the functionality of SKF Bot. (Security Knowledge Framework Chatbot):&lt;br /&gt;
&lt;br /&gt;
Some improvements or the suggestions which we can do to improve the functionality are:&lt;br /&gt;
&lt;br /&gt;
1.    Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
&lt;br /&gt;
2.    Create a Plugin or website bot which we can add in the website for better chat experience for the user.&lt;br /&gt;
&lt;br /&gt;
3.    Extend the bots capability to do the google search (using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
&lt;br /&gt;
4.    Add basic conversation flow which makes SKF Bot friendly and provides the better user experience. Example: Replies to the general queries like How are you? What is your Name etc?&lt;br /&gt;
&lt;br /&gt;
5.    Extend the bot capability to reply to what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
# Extend the bot to different platforms like Facebook, telegram, slack, Google Assistant etc.&lt;br /&gt;
Existing chatbot implementation is on Gitter. You can test the bot by typing @skfchatbot on Gitter Community.&lt;br /&gt;
&lt;br /&gt;
'''Getting started:'''&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the architecture and code base of SKF (Security Knowledge Framework)&lt;br /&gt;
&lt;br /&gt;
·         Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
·         Python 3+, Flask, Coffee Script&lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Priyanka Jain (Mentor)&lt;br /&gt;
&lt;br /&gt;
=== Idea 2 Improving and building Lab challenges and write-ups: ===&lt;br /&gt;
Build lab examples and write-ups (how to test) for different vulnerabilities over different technology stacks. These challenges are to be delivered in Docker so they can be &lt;br /&gt;
&lt;br /&gt;
easily deployed.&lt;br /&gt;
&lt;br /&gt;
In the current situation the security knowledge framework ultimately presents a list of security controls with correlating knowledge base items that contain a description and &lt;br /&gt;
&lt;br /&gt;
a solution. The new labs are used to give the software developers or application security specialists a more in depth understanding and approach on how to test the &lt;br /&gt;
&lt;br /&gt;
vulnerabilities in their own code.  &lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
The images that are pushed to the Github repository are already automatically build and pushed to a docker registry where the SKF users can easily pull the images from to get their&lt;br /&gt;
&lt;br /&gt;
labs running. Of course they can download it and build it themselves from source by pulling the original repository.  &lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''  &lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool and is used as the backbone for security programs. It is easy to get started with to work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
'''Issue Tracking:'''&lt;br /&gt;
&lt;br /&gt;
Enhancement [https://github.com/DefectDojo/django-DefectDojo/issues?q=is%3Aissue+is%3Aopen+label%3Aenhancement requests] and [https://github.com/DefectDojo/django-DefectDojo/issues?q=is%3Aissue+is%3Aopen+label%3Abug bugfixes] are located in Github issues. This project could implement a whole bunch of new features one by one and release them over the course of several small releases. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 5 or more new features or functional enhancements of significant scope for OWASP DefectDojo&lt;br /&gt;
* Each feature comes with full functional unit and integration tests&lt;br /&gt;
'''Getting started:'''&lt;br /&gt;
* Get familiar with the architecture and code base of the application built on Django&lt;br /&gt;
* Review the application functionality and familiarize yourself with Products, Engagements, Tests and Findings.&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python, Django, Javascript, Unit/Integration testing.&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[Mailto:aaron.weaver2+gsoc@gmail.com|Aaron Weaver]] - DefectDojo Project Leader&lt;br /&gt;
* [[Mailto:greg.anderson@owasp.org|Greg Anderson]] - DefectDojo Project Leader&lt;br /&gt;
* [[Mailto:matt.tesauro@owasp.org|Matt Tesauro]] - DefectDojo Project Leader&lt;br /&gt;
'''Option 1: Unit Tests - Difficulty: Easy'''&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
* Review the current [https://github.com/DefectDojo/django-DefectDojo/tree/dev/dojo/unittests unit tests]  &lt;br /&gt;
* Complete Code Coverage Testing&lt;br /&gt;
** Validate Tests exist for the following (create any that are missing):&lt;br /&gt;
*** Finding, Test, Engagement, Reports, Endpoints &lt;br /&gt;
*** Import from all scanners &lt;br /&gt;
'''Option 2: Python3 Completion'''&lt;br /&gt;
* DefectDojo is finishing up a migration to Python3&lt;br /&gt;
Test the current [https://github.com/DefectDojo/django-DefectDojo/tree/python3/dojo/unittests state] of Python3&lt;br /&gt;
* Ensure all features work&lt;br /&gt;
* Travis testing works correctly&lt;br /&gt;
'''Option 3: Scan 2.0 / Launch Containers'''&lt;br /&gt;
&lt;br /&gt;
Scan 2.0 consists of automating the scanning orchestration within DefectDojo. Several proof of concepts exist for this using the AppSecpPipeline to launch containers and then push those finding into the appropriate product. &lt;br /&gt;
* Use the [https://github.com/appsecpipeline/AppSecPipeline-Specification AppSecPipeline] containers to build a scanning pipeline built on top of [https://www.openfaas.com/ OpenFaaS]&lt;br /&gt;
* Scans should be able to be scheduled by DefectDojo and then invoked via the REST API call to OpenFaaS&lt;br /&gt;
* Upon scan completion the results will be posted back to DefectDojo via DefectDojo's REST API and consumed as an engagement/test.&lt;br /&gt;
* Pick 2 or 3 popular open source scanners such as NMAP, ZAP and Nikto to start out with.&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Python_Honeypot|OWASP Honeypot]] is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to adding more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
&lt;br /&gt;
* Zero Bugs: Currently we may have several bugs in different conditions, and it's best to test the all functions and fix them&lt;br /&gt;
* Monitoring: Right now monitoring limited to the connections (send&amp;amp;recieve) and it's best to store and analysis the contents for farther investigations and recognizing incoming attacks.&lt;br /&gt;
* Duplicated codes: codes are complicated and duplicated in engine, should be fixed/clean up&lt;br /&gt;
* New modules: add some creative ICS/Network/Web modules andvulnerable web applications, services and stuff&lt;br /&gt;
* API: update API sync to all features&lt;br /&gt;
* WebUI: Demonstrate and add API on WebUI and Live version with all features&lt;br /&gt;
* WebUI Special Reports: Track the attacks more creative and provide high risk IPs&lt;br /&gt;
* Database: Better database structure, faster and use queue&lt;br /&gt;
* Data analysis: Analysis stored data and attack signatures&lt;br /&gt;
* OWASP Top 10: Preparing useful processed/raw data for OWASP top 10 project&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis &amp;amp; Tshark &amp;amp; Libpcap&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
* Web Development Skills&lt;br /&gt;
* Honeypot and Deception knowledge&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and Angular. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the potential mentors (@bkimminich, @J12934 and @CaptainFreak) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Feature Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new functionality and &amp;quot;business&amp;quot; features are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Afeature GitHub issues labeled &amp;quot;feature&amp;quot;]. This project could implement a whole bunch of new features one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
''Coming up with good additional ideas for features and new functionality in the proposal could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 5 or more new features or functional enhancements of significant scope for OWASP Juice Shop (not necessarily including corresponding challenges)&lt;br /&gt;
* Each feature comes with full functional unit and integration tests&lt;br /&gt;
* Extending the functional walk-through chapter of the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, security knowledge is optional.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Juice Shop Mobile ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
A complete mobile client for Juice-Shop API which will serve a legit mobile experience for Juice-Shop user as well as a plethora of Mobile app vulnerabilities and challenges around them to solve. Should in the best case translate the idea of Juice Shop's hacking challenges with a score board and success notifications into the mobile world.&lt;br /&gt;
&lt;br /&gt;
''Coming up with a sophisticated proposal (optimally even with a good initial sample implementation) could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's RESTful backend&lt;br /&gt;
* Get familiar with Native App developement&lt;br /&gt;
* Get familiar with Mobile vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A mobile App with consistent UI/UX for Juice-Shop with standard client side vulnerabilities.&lt;br /&gt;
* Sufficient initial release quality (en par with Juice Shop and Juice Shop CTF) to make it an official extension project hosted in its own GitHub repository ''bkimminich/juice-shop-mobile''&lt;br /&gt;
* Code follows existing styleguides and applies similar quality gates regarding code smells, test coverage etc. as the main project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) React Native and NodeJS/Express, some Mobile security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
''Coming up with good additional ideas for challenges in the proposal could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges)&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Hacking Instructor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
While the Juice Shop is offering a lot of long-lasting motivation and challenges for security experts, it might be a bit daunting for newcomers and less experienced hackers.&lt;br /&gt;
The &amp;quot;Hacking Instructor&amp;quot; as sketched in [https://github.com/bkimminich/juice-shop/issues/440 GitHub issue #440] could guide users from this target audience through at least some of the hacking challenges. As this would be an entirely new and relatively independent feature of the Juice Shop, students should be able to bring in their own creativity and ideas a lot.&lt;br /&gt;
&lt;br /&gt;
''For this project, a good proposal with a design &amp;amp; implementation proposal more sophisticated than the rough ideas in [https://github.com/bkimminich/juice-shop/issues/440 #440] is paramount to be selected as a student!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A working implementation of e.g. an avatar-style &amp;quot;Hacking Instructor&amp;quot; or other solution based on the students own proposal&lt;br /&gt;
* Coverage of at least the trivial (1-star) and some easy (2-star) challenges&lt;br /&gt;
* Documentation how to configure or script the &amp;quot;Hacking Instructor&amp;quot; for challenges in general&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular, some UI/UX experience would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP-Securetea Tools Project ==&lt;br /&gt;
The OWASP SecureTea Project is a application designed to help Secure a person's laptop or computer / server with IoT (Internet Of Things) for notify users (via various communication mechanisms), whenever someone accesses their computer / server. This application uses the touchpad/mouse/wireless mouse to determine activity and is developed in Python and tested on various machines (Linux, Mac &amp;amp; Windows)&lt;br /&gt;
. -&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project/blob/master/README.md&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
We are looking any awesome idea to improve Securetea Project that is not on this list? We are expecting make this project will be useful to everyone to secure their Small IoT. &lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Below roadmap and expect  results you can choose to improve Securetea Project . &lt;br /&gt;
if any bugs please help to fix it&lt;br /&gt;
&lt;br /&gt;
===Roadmap=== &lt;br /&gt;
See Our Roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project#roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Protection /firewall&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Antivirus&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Whatsapp&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by SMS Alerts&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Line&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Telegram&amp;lt;br&amp;gt;&lt;br /&gt;
Intelligent Log Monitoring  include Web Deface Detection&amp;lt;br&amp;gt;&lt;br /&gt;
Detection of malicious devices &amp;lt;br&amp;gt;&lt;br /&gt;
Login History&amp;lt;br&amp;gt;&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Javascript &lt;br /&gt;
* Angular and NodeJS/Express&lt;br /&gt;
* Database&lt;br /&gt;
* Linux&lt;br /&gt;
&lt;br /&gt;
=== Mentors === &lt;br /&gt;
&lt;br /&gt;
* [mailto:ade.putra@owasp.org Ade Yoseman Putra] - (OWASP Securetea Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
* [mailto:rejah.rehim@owasp.org Rejah Rehim.A.A]]- (OWASP Securetea Project Leader)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Passive Online scanner improvements ===&lt;br /&gt;
&lt;br /&gt;
==== Brief Explanation ====&lt;br /&gt;
OWTF allows many passive tests, such as those using third party websites like Google, Bing, etc. searches, as well as handy &amp;quot;Search for vulnerability&amp;quot; search boxes (i.e. Fingerprinting plugin). This feature involves the creation of a '''script''' that produces an interactive OWTF report with the intention of hosting it in the github.io site. The idea here is to have a passive, JavaScript-only interactive report available on the owtf.github.io site, so that people can try OWTF '''without installing anything''', simply visiting a URL.&lt;br /&gt;
&lt;br /&gt;
This would be a normal OWTF interactive report where the user can:&lt;br /&gt;
* Enter a target&lt;br /&gt;
* Try passive plugins (only the parts that use no tools)&lt;br /&gt;
* Play with boilerplate templates from the OWTF interactive report&lt;br /&gt;
An old version of the passive online scanner is hosted at https://owtf.github.io/online-passive-scanner.&lt;br /&gt;
&lt;br /&gt;
'''LEGAL CLARIFICATION (Just in case!)''': The passive online scanner, simply makes OWTF passive testing '''through third party websites''' more accessible to anybody, however it is the user that must 1) click the link manually + 2) do something bad with that afterwards + 3) doing 1 + 2 WITHOUT permission :). Therefore this passive online scanner does not do anything illegal [http://www.slideshare.net/abrahamaranguren/legal-and-efficient-web-app-testing-without-permission More information about why this is not illegal here] (recommended reading!)&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code]/ES6 JavaScript code in all modified code and surrounding areas.'''&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
A good knowledge of JavaScript and writing ES6 compliant React/TypeScript is needed. Previous exposure to security concepts and penetration testing is not required but recommended and some lack of this can be compensated with pre-GSoC involvement and will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP iGoat (draft) ==&lt;br /&gt;
'''Idea 1:''' Completing OWASP iGoat documentation at https://docs.igoatapp.com/ and creating demo videos at for OWASP iGoat YouTube channel for learning purpose.&lt;br /&gt;
&lt;br /&gt;
'''Idea 2:''' Adding new challenge pack / CTF for iGoat. It should be one point solution for learning iOS app security&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid ==&lt;br /&gt;
[[OWASP SeraphimDroid Project|OWASP Seraphimdroid]] is Android security and privacy app, with features to enhance user's knowledge about security and privacy on his/her mobile device. If you are interested in this project and working on it during Google Summer of Code, please contact [[User:Nikola Milosevic|Nikola Milosevic]] and express your interest.&lt;br /&gt;
&lt;br /&gt;
=== Idea 1: Anomaly detection of device state ===&lt;br /&gt;
The idea is that certain features of a device would be constantly monitored (battery use, internet usage, opp calls, etc.). Initially, the usual behaviour of the device would be learned. Later, anomalies normal behavior would be reported to the user. This should involve some explanations, such as which applications are causing an anomaly the device behaviors &lt;br /&gt;
&lt;br /&gt;
=== Idea 2: On device machine learning of maliciousness of an app ===&lt;br /&gt;
Tensor-flow for on-device processing and some other libraries have been released that enable machine learning. We have previously applied a system, that based on permissions, is able to distinguish malicious apps from non-malicious. Now, we would like to learn also from other outputs and things one can monitor about application whether it can be malicious. &lt;br /&gt;
&lt;br /&gt;
=== Idea 3:  Enhansing privacy features ===&lt;br /&gt;
The vision of Seraphimdroid is to be aware of privacy threats. This may be achieved throug knowing which applications are using user accounts or other information that uthe user has on phone to send to the server, or just by knowing which applications may be doing it. Knowledgebase shouldbbeextending with the suggestions on how to improve privacy. Also, automated settings of various apps to use encryption should be proposed.&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
=== Active Scanning WebSockets ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesn't currently support active scanning (automated attacking) of websocket traffic (messages).&lt;br /&gt;
: We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* An pluggable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated Authentication Detection and Configuration ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
: This is time consuming and error prone.&lt;br /&gt;
: Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== IoT Goat ==&lt;br /&gt;
IoT Goat will be a deliberately insecure firmware based on OpenWrt. The project’s goal is to teach users about the most common vulnerabilities typically found in IoT devices. The vulnerabilities will be based on the [https://www.owasp.org/images/1/1c/OWASP-IoT-Top-10-2018-final.pdf IoT Top 10 2018]. &lt;br /&gt;
&lt;br /&gt;
===Idea 1: Insecure firmware web application ecosystem===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
A vulnerable web application, and backend API/web services deployed in OpenWrt containing critical vulnerabilities showcasing the traditional IoT problems.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Have a look at the getting started page to get familiar with virtualizing OpenWrt: https://github.com/scriptingxss/IoTGoat#-getting-started-&lt;br /&gt;
* Create a GitHub account to be added as a collaborator to the repository&lt;br /&gt;
* Review the example vulnerabilities and challenges: https://github.com/scriptingxss/IoTGoat/blob/master/challenges/challenges.md&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Development of a simple web application user interface with web services and API's deployed locally on the OpenWrt firmware. Documented challenges of how to discover and remediate web software security vulnerabilities. The insecure web application services must contain the following vulnerabilities to be used with the IoT testing guide: &lt;br /&gt;
* Command injection&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Local file inclusion &lt;br /&gt;
* XXE injection,Insufficient Authentication&lt;br /&gt;
* Transfer sensitive data using insecure channels&lt;br /&gt;
* Store sensitive data insecurely&lt;br /&gt;
Vulnerable SOAP web services and REST API implementations are in-scope. &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Working Linux knowledge&lt;br /&gt;
* Embedded and/or web development (nice to have)&lt;br /&gt;
** Web application code can be developed using the following common embedded programming languages:&lt;br /&gt;
*** Lua&lt;br /&gt;
*** PHP&lt;br /&gt;
*** C/C++&lt;br /&gt;
*** JavaScript&lt;br /&gt;
&lt;br /&gt;
===Idea 2: Insecure network services===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Deliberately insecure services configured within OpenWrt such as an miniupnp daemon configured with secure_mode off (Secure mode; client can only redirect an incoming port to the client itself (same IP as the request comes from), to demonstrate a port mapping attack where an attacker from inside the network exposes a service that typically should be behind a LAN to the internet). &lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Have a look at the getting started page to get familiar with virtualizing OpenWrt: https://github.com/scriptingxss/IoTGoat#-getting-started-&lt;br /&gt;
* Create a GitHub account to be added as a collaborator to the repository&lt;br /&gt;
* Review the example vulnerabilities and challenges: https://github.com/scriptingxss/IoTGoat/blob/master/challenges/challenges.md&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
Documented challenges of how to discover and remediate insecure network service vulnerabilities. The network services can be inherently insecure or have insecure configurations that can be abused during the challenges.&lt;br /&gt;
* Example of network insecure services include:&lt;br /&gt;
** FTP&lt;br /&gt;
** Telnet&lt;br /&gt;
** miniupnpd&lt;br /&gt;
** HTTP&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Working Linux knowledge&lt;br /&gt;
* Network security&lt;br /&gt;
&lt;br /&gt;
===Idea 3: Insecure firmware build system===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Develop custom firmware builds of the latest OpenWrt version (18.06) demonstrating the process of incorporating debug services/tools, misconfigurations, and usage of vulnerable software packages. &lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Review OpenWrt's developer guide to get familiar with creating custom firmware builds&lt;br /&gt;
** https://openwrt.org/docs/guide-developer/start&lt;br /&gt;
** https://openwrt.org/docs/guide-developer/build-system/install-buildsystem&lt;br /&gt;
** https://github.com/openwrt/openwrt&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Provide walkthrough examples of insecure design choices for building firmware. &lt;br /&gt;
* Provide suggested mitigation security controls&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Working Linux knowledge&lt;br /&gt;
* Embedded development (C/C++)&lt;br /&gt;
&lt;br /&gt;
===Suggest your own ideas===&lt;br /&gt;
You may suggest additional challenges or ideas that fit this project's objectives.&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
* Aaron Guzman - OWASP IoT Goat Contributor (Project leader of the IoT and Embedded AppSec project)&lt;br /&gt;
* Fotios Chantzis - OWASP IoT Goat Contributor (and former GSoC Student/GSoc Mentor)&lt;br /&gt;
* [[User:Calderpwn|Paulino Calderon]] - OWASP IoT Goat Contributor (and former GSoC 2011 Student/GSoc Mentor in 2015 and 2017)&lt;br /&gt;
&lt;br /&gt;
==OWASP Web Honeypot Project ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Honeypot Project is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks. Within this project, Anglia Ruskin University is leading the collection, storage and analysis of threat intelligence data. &lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Honeypot_Project&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/Honeypot-Project/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The purpose of this part of the project is to capture intelligence on attacker activity against web applications and utilise this intelligence as ways to protect software against attacks. Honeypots are an established industry technique to provide a realistic target to entice a criminal, whilst encouraging them to divulge the tools and techniques they use during an attack. Like bees to a honeypot. These honeypots are safely designed to contain no information of monetary use to an attacker, and hence provide no risk to the businesses implementing them. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The project will create honeypots that the community can distribute within their own networks. With enough honeypots globally distributed, we will be in a position to aggregate attack techniques to better understand and protect against the techniques used by attackers. With this information, we will be in a position to create educational information, such as rules and strategies, that application writers can use to ensure that any detected bugs and vulnerabilities are closed. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Project progression: &lt;br /&gt;
* Honeypot software. The honeypot software that is to be provided to the community to place in their networks has been written. Honeypots are available in a variety of forms, to make deployment as flexible as possible and appeal to a diverse a user set as possible.&lt;br /&gt;
* Collection software. The centralised collection software has been written and evaluated in a student driven proof-of-concept project. Honeypots have been attacked in a laboratory situation and have reported both the steps taken by the attacker and what they have attacked, back to the collection software.&lt;br /&gt;
* Rollout to the Community. The project now needs a dedicated infrastructure platform in place that is available to the entire community to start collecting intelligence back from community deployed honeypots. This infrastructure will run the collector software, analysis programmes and provide a portal for communicating our finds and recommendations back to the community in a meaningful manner.&lt;br /&gt;
* Going Forward. Toolkits and skills used by attackers do not stand still.  As existing bugs are plugged, others open. Follow up stages for the project will be to create a messaging system to automatically update the community on findings of significant risk in their existing code that requires attention. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&lt;br /&gt;
Some of the ideas from last year's summit&lt;br /&gt;
&lt;br /&gt;
* Setup Proof of Concept to understand how Mod Security baed Honeypot/Probe interacts with a receiving console (develop a VM and/or Docker based test solution to store logs from multiple probes).&lt;br /&gt;
* Evaluate console options to visualise threat data received from ModSecurity Honeypots/probes in MosSecurity Audit Console, WAF-FLE, Fluent and bespoke scripts for single and multiple probes.&lt;br /&gt;
* Develop a mechanism to convert from stored MySQL to JSON format.&lt;br /&gt;
* Provide a mechanism to convert ModSecurity mlogc audit log output into JSON format.&lt;br /&gt;
* Provide a mechanism to convert mlogc audit log output directly into ELK (ElasticSearch/Logstash/Kibana) to visualise the data.&lt;br /&gt;
* Provide a mechanism to forward honest output into threat intelligence format such as STIX using something like the MISP project(https://www.misp-project.org) to share Threat data coming from the Honeypots making it easy to export/import data from formats such as STIX and TAXII., may require use of concurrent logs in a format that MISP can deal with.&lt;br /&gt;
* Consider new alternatives for log transfer including the use of MLOGC-NG or other possible approaches.&lt;br /&gt;
* Develop a new VM based honeypot/robe based on CRS v3.0.&lt;br /&gt;
* Develop new alternative small footprint honeypot/probe formats utilising Docker &amp;amp; Raspberry Pi.&lt;br /&gt;
* Develop machine learning approach to automatically be able to update the rule set being used by the probe based on cyber threat intelligence received.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
Some of the skills we are looking for:&lt;br /&gt;
&lt;br /&gt;
* Apache/Tomcat &lt;br /&gt;
* Any experience of MISP&lt;br /&gt;
* MySQL &amp;amp; JSON&lt;br /&gt;
* ELK &lt;br /&gt;
* STIX/TAXII&lt;br /&gt;
* Python&lt;br /&gt;
* ModSecurity/mlogc&lt;br /&gt;
* OWASP Core RuleSet (CRS)&lt;br /&gt;
* Linux&lt;br /&gt;
* VM/Docker&lt;br /&gt;
&lt;br /&gt;
=== Mentors === &lt;br /&gt;
&lt;br /&gt;
* [mailto:adrian.winckles@owasp.org Adrian Winckles] - (OWASP Web Honeypot Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Suggest your own ideas===&lt;br /&gt;
&lt;br /&gt;
You may suggest additional challenges or ideas that fit this project's objectives.&lt;br /&gt;
&lt;br /&gt;
==OWASP Risk Assessment Framework ==&lt;br /&gt;
Tool projects aim to assessment more than one or many web application using owasp risk rating mathodologies.&lt;br /&gt;
https://github.com/OWASP/RiskAssessmentFramework&lt;br /&gt;
&lt;br /&gt;
'''Idea 1:''' make dashboard with databases and can assess many website based owasp risk rating mathodologies, create graph  and report in pdf,word &amp;amp; excel format.&lt;br /&gt;
=== Mentors === &lt;br /&gt;
* [mailto:ade.putra@owasp.org Ade Yoseman] -  &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=246729</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=246729"/>
				<updated>2019-01-21T19:30:51Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: added owtf&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF (draft)==&lt;br /&gt;
Idea 1: &lt;br /&gt;
&lt;br /&gt;
Build lab examples and write-ups (how to test) for different vulnerabilities over different technology stacks. These challenges are to be delivered in Docker so they can be &lt;br /&gt;
&lt;br /&gt;
easily deployed.&lt;br /&gt;
&lt;br /&gt;
In the current situation the security knowledge framework ultimately presents a list of security controls with correlating knowledge base items that contain a description and &lt;br /&gt;
&lt;br /&gt;
a solution. The new labs are used to give the software developers or application security specialists a more in depth understanding and approach on how to test the &lt;br /&gt;
&lt;br /&gt;
vulnerabilities in their own code.  &lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
The images that are pushed to the Github repository are already automatically build and pushed to a docker registry where the SKF users can easily pull the images from to get their&lt;br /&gt;
&lt;br /&gt;
labs running. Of course they can download it and build it themselves from source by pulling the original repository.  &lt;br /&gt;
&lt;br /&gt;
Idea 2: &lt;br /&gt;
&lt;br /&gt;
We want to extend the Machine learning chatbot functionality in SKF.&lt;br /&gt;
* Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
* Extend the bots capability to do the google search(using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
* Extend the bot capability to reply what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
* Extend the bot to different platforms like Facebook, telegram, slack etc.&lt;br /&gt;
** Now the working chatbot implementation for example is only for Gitter&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool, used as the backbone for security programs. It is easy to get started with and work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
Option 1: Unit Tests - Difficulty: Easy&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
Option 2: Feature Enhancement - Difficulty: Varies&lt;br /&gt;
* The functionality of DefectDojo is constantly expanding.&lt;br /&gt;
* Feature enhancements offer programming challenges for all levels of experience.&lt;br /&gt;
Option 3: Pull Request Review - Difficulty: Moderate - Hard&lt;br /&gt;
* Test pull requests and provide feedback on code.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
OWASP Honeypot is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to add more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Roadmap ===&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and Angular. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the potential mentors (@bkimminich, @wurstbrot and @J12934) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges)&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Hacking Instructor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP-Securetea Tools Project ==&lt;br /&gt;
The purpose of this application is to warn the user (via various communication mechanisms) whenever their laptop accessed. This small application was developed and tested in python in Linux machine is likely to work well on the Raspberry Pi as well. -&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project/blob/master/README.md&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
We are looking any awesome idea to improve Securetea Project that is not on this list? We are expecting make this project will be useful to everyone to secure their Small IoT. &lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Below roadmap and expect  results you can choose to improve Securetea Project . &lt;br /&gt;
if any bugs please help to fix it&lt;br /&gt;
&lt;br /&gt;
===Roadmap=== &lt;br /&gt;
See Our Roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project#roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Twitter (done)&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Dashboard / Gui (done)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Protection /firewall&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Antivirus&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Whatsapp&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by SMS Alerts&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Line&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Telegram&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Javascript &lt;br /&gt;
* Angular and NodeJS/Express&lt;br /&gt;
* Database&lt;br /&gt;
* Linux&lt;br /&gt;
&lt;br /&gt;
==='''Mentors '''=== &lt;br /&gt;
&lt;br /&gt;
* [mailto:ade.putra@owasp.org Ade Yoseman Putra] - (OWASP Securetea Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
* [mailto:rejah.rehim@owasp.org Rejah Rehim.A.A]]- (OWASP Securetea Project Leader)&lt;br /&gt;
* [https://github.com/sananthu Ananthu S] - (Mentor)&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=239205</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=239205"/>
				<updated>2018-04-02T01:07:16Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |[https://www.openhub.net/p/owasp-owtf/reviews/new Review this project]&lt;br /&gt;
&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
=== '''The latest version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.3b OWTF 2.3b &amp;quot;MacinOWTF&amp;quot;].''' ===&lt;br /&gt;
&lt;br /&gt;
Project Leaders&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat.bhalodia@owasp.org Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
* [https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
* [http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
* [https://gitter.im/owtf/owtf OWASP OWTF Gitter Channel]&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2018 ! If you'd like to participate then see the  [https://www.owasp.org/index.php/GSOC2018_Ideas OWASP Google Summer of Code 2018 Ideas page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Presentation and talks==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/blob/develop/LICENSE.md LICENSE]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |[[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; |[[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* April 6th, 2017 - [https://github.com/owtf/owtf/releases/tag/v2.1a OWTF 2.1a &amp;quot;Chicken Korma&amp;quot;] is here!&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
* [http://browserstack.com Browserstack] for providing a platform to test OWTF on multiple devices!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=239204</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=239204"/>
				<updated>2018-04-02T01:06:47Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |[https://www.openhub.net/p/owasp-owtf/reviews/new Review this project]&lt;br /&gt;
&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
=== '''The latest version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.3b OWTF 2.3b &amp;quot;MacinOWTF&amp;quot;].''' ===&lt;br /&gt;
&lt;br /&gt;
Project Leaders&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat.bhalodia@owasp.org Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
* [https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
* [http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
* [https://gitter.im/owtf/owtf OWASP OWTF Gitter Channel]&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2018 ! If you'd like to participate then see the  [https://www.owasp.org/index.php/GSOC2018_Ideas OWASP Google Summer of Code 2018 Ideas page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Presentation and talks==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;iframe src=&amp;quot;//www.slideshare.net/slideshow/embed_code/key/5BOo24YsYCvXbO&amp;quot; width=&amp;quot;595&amp;quot; height=&amp;quot;485&amp;quot; frameborder=&amp;quot;0&amp;quot; marginwidth=&amp;quot;0&amp;quot; marginheight=&amp;quot;0&amp;quot; scrolling=&amp;quot;no&amp;quot; style=&amp;quot;border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;&amp;quot; allowfullscreen&amp;gt;&amp;lt;/iframe&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/blob/develop/LICENSE.md LICENSE]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |[[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; |[[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* April 6th, 2017 - [https://github.com/owtf/owtf/releases/tag/v2.1a OWTF 2.1a &amp;quot;Chicken Korma&amp;quot;] is here!&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
* [http://browserstack.com Browserstack] for providing a platform to test OWTF on multiple devices!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=239203</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=239203"/>
				<updated>2018-04-02T01:05:29Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |[https://www.openhub.net/p/owasp-owtf/reviews/new Review this project]&lt;br /&gt;
&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
=== '''The latest version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.3b OWTF 2.3b &amp;quot;MacinOWTF&amp;quot;].''' ===&lt;br /&gt;
&lt;br /&gt;
Project Leaders&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat.bhalodia@owasp.org Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
* [https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
* [http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
* [https://gitter.im/owtf/owtf OWASP OWTF Gitter Channel]&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2018 ! If you'd like to participate then see the  [https://www.owasp.org/index.php/GSOC2018_Ideas OWASP Google Summer of Code 2018 Ideas page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Presentation and talks==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;iframe src=&amp;quot;//www.slideshare.net/slideshow/embed_code/key/5BOo24YsYCvXbO&amp;quot; width=&amp;quot;595&amp;quot; height=&amp;quot;485&amp;quot; frameborder=&amp;quot;0&amp;quot; marginwidth=&amp;quot;0&amp;quot; marginheight=&amp;quot;0&amp;quot; scrolling=&amp;quot;no&amp;quot; style=&amp;quot;border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;&amp;quot; allowfullscreen&amp;gt; &amp;lt;/iframe&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/blob/develop/LICENSE.md LICENSE]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |[[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; |[[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* April 6th, 2017 - [https://github.com/owtf/owtf/releases/tag/v2.1a OWTF 2.1a &amp;quot;Chicken Korma&amp;quot;] is here!&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
* [http://browserstack.com Browserstack] for providing a platform to test OWTF on multiple devices!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=239202</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=239202"/>
				<updated>2018-04-02T01:04:24Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |[https://www.openhub.net/p/owasp-owtf/reviews/new Review this project]&lt;br /&gt;
&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
=== '''The latest version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.3b OWTF 2.3b &amp;quot;MacinOWTF&amp;quot;].''' ===&lt;br /&gt;
&lt;br /&gt;
Project Leaders&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat.bhalodia@owasp.org Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
* [https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
* [http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
* [https://gitter.im/owtf/owtf OWASP OWTF Gitter Channel]&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2018 ! If you'd like to participate then see the  [https://www.owasp.org/index.php/GSOC2018_Ideas OWASP Google Summer of Code 2018 Ideas page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Presentation and talks==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&amp;lt;iframe src=&amp;quot;//www.slideshare.net/slideshow/embed_code/key/5BOo24YsYCvXbO&amp;quot; width=&amp;quot;595&amp;quot; height=&amp;quot;485&amp;quot; frameborder=&amp;quot;0&amp;quot; marginwidth=&amp;quot;0&amp;quot; marginheight=&amp;quot;0&amp;quot; scrolling=&amp;quot;no&amp;quot; style=&amp;quot;border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;&amp;quot; allowfullscreen&amp;gt; &amp;lt;/iframe&amp;gt;&amp;lt;/nowiki&amp;gt; &amp;lt;nowiki&amp;gt;&amp;lt;div style=&amp;quot;margin-bottom:5px&amp;quot;&amp;gt; &amp;lt;strong&amp;gt; &amp;lt;a href=&amp;quot;//www.slideshare.net/JerodBrennenCISSP/automating-security-testing-with-the-owtf&amp;quot; title=&amp;quot;Automating Security Testing with the OWTF&amp;quot; target=&amp;quot;_blank&amp;quot;&amp;gt;Automating Security Testing with the OWTF&amp;lt;/a&amp;gt;&amp;lt;/nowiki&amp;gt; &amp;lt;nowiki&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/nowiki&amp;gt; from &amp;lt;nowiki&amp;gt;&amp;lt;strong&amp;gt;&amp;lt;a href=&amp;quot;https://www.slideshare.net/JerodBrennenCISSP&amp;quot; target=&amp;quot;_blank&amp;quot;&amp;gt;Jerod Brennen&amp;lt;/a&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;nowiki&amp;gt;&amp;lt;/strong&amp;gt;&amp;lt;/nowiki&amp;gt; &amp;lt;nowiki&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/blob/develop/LICENSE.md LICENSE]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |[[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; |[[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* April 6th, 2017 - [https://github.com/owtf/owtf/releases/tag/v2.1a OWTF 2.1a &amp;quot;Chicken Korma&amp;quot;] is here!&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
* [http://browserstack.com Browserstack] for providing a platform to test OWTF on multiple devices!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=239201</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=239201"/>
				<updated>2018-04-02T00:54:27Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |[https://www.openhub.net/p/owasp-owtf/reviews/new Review this project]&lt;br /&gt;
&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
=== '''The latest version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.3b OWTF 2.3b &amp;quot;MacinOWTF&amp;quot;].''' ===&lt;br /&gt;
&lt;br /&gt;
Project Leaders&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat.bhalodia@owasp.org Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
* [https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
* [http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
* [https://gitter.im/owtf/owtf OWASP OWTF Gitter Channel]&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2018 ! If you'd like to participate then see the  [https://www.owasp.org/index.php/GSOC2018_Ideas OWASP Google Summer of Code 2018 Ideas page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Presentation and talks==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/blob/develop/LICENSE.md LICENSE]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |[[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; |[[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* April 6th, 2017 - [https://github.com/owtf/owtf/releases/tag/v2.1a OWTF 2.1a &amp;quot;Chicken Korma&amp;quot;] is here!&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
* [http://browserstack.com Browserstack] for providing a platform to test OWTF on multiple devices!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=237499</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=237499"/>
				<updated>2018-02-12T17:18:40Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Active Scanning WebSockets===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesnt current support active scanning (automated attacking) of websockets.&lt;br /&gt;
&lt;br /&gt;
We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* An plugable infrastructure that allows us to active scan websockets&lt;br /&gt;
* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
* Implementing new websocket specific scan rules&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== React Handling  ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP doesnt understand React applications as well as it should be able to.&lt;br /&gt;
&lt;br /&gt;
It would be great if ZAP had a much better understanding of such applications, including how to explore and attack them more effectively.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* ZAP able to explore React applications more effectively&lt;br /&gt;
* ZAP able to attack React applications more effectively&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* As React is written in JavaScript, good knowledge of this language is recommended. ZAP is written in Java, so some knowledge of this language would be useful. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated authentication detection and configuration  ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is time consuming and error prone.&lt;br /&gt;
&lt;br /&gt;
Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Detect login and registration pages&lt;br /&gt;
* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
&lt;br /&gt;
A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A documented definition of a text representation for Zest&lt;br /&gt;
* A parser that converts the text representation into a working Zest script&lt;br /&gt;
* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Develop Bamboo Addon ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
It would be great to have an official ZAP add-on for [https://www.atlassian.com/software/bamboo Bamboo], equivalent to the one we now have for [https://wiki.jenkins.io/display/JENKINS/zap+plugin Jenkins]&lt;br /&gt;
&lt;br /&gt;
For more information about Bamboo plugins see the [https://developer.atlassian.com/server/bamboo/bamboo-plugin-guide/ Bamboo plugin guide].&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A Bamboo addon that supports:&lt;br /&gt;
* Spidering (using the traditional and Ajax spiders)&lt;br /&gt;
* Active Scanning&lt;br /&gt;
* Authentication&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP and Bamboo are written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2018 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] user story])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Frontend Technology Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frontend framework AngularJS 1.x along with Bootstrap 3. Several major releases later, there now are [https://github.com/bkimminich/juice-shop/issues/165 Angular 5] and [https://github.com/bkimminich/juice-shop/issues/400 Bootstrap 4] available as well as other mature web frontend frameworks. Migrating the OWASP Juice Shop to the latest version of Angular and Bootstrap is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target client-architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, testing and building&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== UI/Graphics Design Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The UI of OWASP Juice Shop was written following recommendations from Twitter Bootstrap to be responsive, but it never had an actual designer or graphics artist take a look or add some insight. Currently the look &amp;amp; feel comes &amp;quot;out of the box&amp;quot; from a [https://bootswatch.com Bootswatch] theme and [https://fontawesome.com Font Awesome 5] icons. This gives it a quite modern look, but also leaves it very generic. The project could greatly benefit from involvement of someone with actual UI/UX Design expertise. Having a matching theme for [https://ctfd.io CTFd] would be another big achievement for the Juice Shop.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Design concepts to pick or have the user community vote on (including color schemes, sample screens, icons etc.)&lt;br /&gt;
* Overhauling the overall UI look &amp;amp; feel, e.g. by making an individual Bootswatch theme or designing some individual icons&lt;br /&gt;
* Getting rid of the stock images by providing individually designed product images for the standard inventory of the shop&lt;br /&gt;
* Add more flexibility and options to the existing theming/customization of the UI (see [https://github.com/bkimminich/juice-shop/issues/379 #379])&lt;br /&gt;
* Design a [https://github.com/bkimminich/juice-shop-ctf/issues/9 &amp;quot;Juice Shop&amp;quot; CTFd-theme] playing well with the look &amp;amp; feel of the application&lt;br /&gt;
* Execution of migration without breaking functionality or client-side unit and end-to-end tests along the way&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the existing HTML views and CSS of the frontend&lt;br /&gt;
* Get a feeling for the high quality bar by inspecting the existing client-side unit and e2e test suites&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Strong web and graphic design experience&lt;br /&gt;
* Sophisticated HTML and CSS experience&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* [[User:Timo Pagel|Timo Pagel]] - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework - Chatbot machine learning feature==&lt;br /&gt;
&lt;br /&gt;
=== Brief Explanation ===&lt;br /&gt;
We want to create a SKF Chatbot service using the knowledge already inside SKF like the knowledge base items, code examples and the security controls like ASVS and PCI DSS.&lt;br /&gt;
&lt;br /&gt;
The chatbot service and core of this new feature can be consumed by website’s as an addon, IDE of developers and website chat channels like Gitter.im.&lt;br /&gt;
&lt;br /&gt;
The core of the SKF Chatbot will be using machine learning to accomplish the hard task of correlating data and merging different sources as a response/answer.&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
# A Defined Knowledge Base (Data Structure / DB) which can be used to define and search for entities. For example: if a query is:&lt;br /&gt;
## How to mitigate CSRF in PHP   the system should be able to understand or translate it to:  {How: intent} to {mitigate: solution} {CSRF: attack} in {PHP: programming language}  This kind of query can be further user to fetch right information in the knowledge base and provide right solution (code example) for mitigating CSRF in PHP.&lt;br /&gt;
## What is CSRF?   the system should be able to understand or translate it to:  {What: intent} is {CSRF: attack/defense}  This kind of query can be further user to fetch right information in the knowledge base that explains CSRF and provide the security control from example ASVS&lt;br /&gt;
# An ETL process to convert existing SKF Knowledge data and ASVS data to above mentioned data structure.&lt;br /&gt;
# A Chatbot (using existing frameworks) to:&lt;br /&gt;
## Understand at least two intent like (How to, What is …..) and be able to enrich the user query as mentioned above.&lt;br /&gt;
## Based on enriched query fetch relevant information from knowledge base and return.&lt;br /&gt;
# An integration to some chat system like Gitter.im, IRC, Slack etc.&lt;br /&gt;
&lt;br /&gt;
=== Knowledge Prerequisites ===&lt;br /&gt;
* Programming languages:&lt;br /&gt;
** OWASP-SKF API is build in Python 3.6/3.7&lt;br /&gt;
** OWASP-SKF Frontend is build with Angular 4 TS&lt;br /&gt;
* Machine learning enthusiastic/interest&lt;br /&gt;
&lt;br /&gt;
=== Proposal from student ===&lt;br /&gt;
* We want to ask from the student to write a proposal on how to approach the problem we described.&lt;br /&gt;
'''Mentors''':&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org] Minhaz [mailto:minhaz@owasp.org]&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
if you need more details please visit the [https://github.com/viraintel/OWASP-Nettacker GitHub page] or contact a leader([mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:reza.espargham@owasp.org Reza Espargham]).&lt;br /&gt;
&lt;br /&gt;
===Getting started===&lt;br /&gt;
&lt;br /&gt;
* You may read the available documents in the [https://github.com/viraintel/OWASP-Nettacker/wiki wiki page]. Developers and users documents are separated.&lt;br /&gt;
&lt;br /&gt;
'''A Better Penetration Testing Automated Framework'''&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
The expected results are to contribute the OWASP Nettacker framework [https://github.com/viraintel/OWASP-Nettacker/issues issues] (mostly help wanted or enhancement). Please check the GitHub repo to learn more.&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* The whole framework was written in Python language. You must be familiar with Python 2.x, 3.x.&lt;br /&gt;
* Good knowledge of computer security (and penetration testing)&lt;br /&gt;
* Knowledge of OS (Linux, Windows, Mac...) and Services&lt;br /&gt;
* Familiar with IDS/IPS/Firewalls and ...&lt;br /&gt;
* To develop the API you should be familiar with HTTP, Database...&lt;br /&gt;
&lt;br /&gt;
===Mentors===&lt;br /&gt;
Mentors are: [mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:abiusx@owasp.org Abbas Naderi Afooshteh]&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP CSRF Protector ==&lt;br /&gt;
[[CSRFProtector Project|OWASP CSRF Protector Project]] is a project started with the goal to help developer to mitigate CSRF in web applications with ease. It's based on [[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet|Synchronizer Token Pattern]] and leverages an injected java-script code to provide CSRF mitigation without much developer intervention. So far it has been implemented as a [https://github.com/mebjas/CSRF-Protector-PHP PHP Library] and an [[CSRFProtector Project|Apache 2.2.x module]]. Although different libraries and frameworks provide CSRF mitigation these days - all of them require developer to explicitly inject tokens with every form. &lt;br /&gt;
===OWASP CSRF Protector - Extending the design as a python package to work with Flask and an Express JS (Node.JS) middleware===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The design of CSRF Protector involves a server side middle-ware that intercepts every incoming request and validates them for CSRF attacks. If the validation is successful the flow of control goes to business logic and the tokens are refreshed. In case of failed validation configured actions are taken. Post that, another middle ware takes care of injecting a JavaScript code (refer [https://github.com/mebjas/CSRF-Protector-PHP/blob/master/js/csrfprotector.js CSRF Protector PHP JS Code]) to HTML output. On the client side this code ensures that, for every request that require validation - the correct token is sent along with the request.&lt;br /&gt;
&lt;br /&gt;
Check [https://github.com/mebjas/CSRF-Protector-PHP/wiki GitHub Wiki] for some reference;&lt;br /&gt;
&lt;br /&gt;
The goal of this project would be to:&lt;br /&gt;
# Port this design to a python module that can be used easily with Flask - [https://github.com/mebjas/CSRF-Protector-py/projects/1?add_cards_query=is%3Aopen Kanban Board]&lt;br /&gt;
# Port this design to a node js module that can work well with express js (a popular Node.JS based framework). - [https://github.com/mebjas/CSRF-Protector-JS Initial Repo Link]&lt;br /&gt;
# Fix some outstanding issues with java-script code used in library: [https://github.com/mebjas/CSRF-Protector-PHP/issues?q=is%3Aopen+is%3Aissue+label%3AJS Issues] &lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: Clean, maintainable (ES6 compatible and using recommended design patterns) in case of Node.JS'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Javascript (Client Side), Python (having worked with flask preferable), Node.JS (having worked with node.js and middle wares preferable)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Contact: [mailto:minhaz@owasp.org;minhazv@microsoft.com Minhaz A V]&lt;br /&gt;
&lt;br /&gt;
== OWASP Code Review Guide ==&lt;br /&gt;
===Brief Explanation:===&lt;br /&gt;
&lt;br /&gt;
OWASP Code Review Guide is a technical book written for those responsible for code reviews (management, developers, security professionals). The primarily focus of this book has been divided into two main sections. Section one is why and how of code reviews and sections two is devoted to what vulnerabilities need to be to look for during a manual code review. While security scanners are improving every day the need for manual security code reviews still needs to have a prominent place in organizations SDLC (Secure development life cycle) that desires good secure code in production.&lt;br /&gt;
&lt;br /&gt;
Check OWASP Code Review Guide [https://www.owasp.org/index.php/Category:OWASP_Code_Review_Project] for some reference;&lt;br /&gt;
&lt;br /&gt;
===Needs:===&lt;br /&gt;
'''Techincal writers'''&lt;br /&gt;
&lt;br /&gt;
===Expected Results:===&lt;br /&gt;
* Move work in pdf and Adobe InDesign to OWASP wiki. See OWASP Testing Guide&lt;br /&gt;
* Move work in pdf and Adobe InDesign to GitBook format&lt;br /&gt;
* Move work in pdf and Adobe InDesign to OWASP OWASP lulu eBook format&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisite:===&lt;br /&gt;
Good techincal writting skills, Adode InDesign&lt;br /&gt;
&lt;br /&gt;
===Proposals from student:===&lt;br /&gt;
* Proposal on different formats to use to help increase the awareness and use of the OWASP Code Review Guide&lt;br /&gt;
* Recommendations on how to use social applications to promote OWASP Code Review Guide to developers and IT management&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* Gary Robinson [mailto:Gary.Robinson@owasp.org]  - OWASP Code Review Guide Project Leader&lt;br /&gt;
 &lt;br /&gt;
* Larry Conklin [mailto:Larry.Conklin@owasp.org] Larry Conklin - OWASP Code Review Guide Project Leader&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Delta24&amp;diff=236670</id>
		<title>User:Delta24</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Delta24&amp;diff=236670"/>
				<updated>2018-01-08T09:54:42Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Grad student at Carnegie Mellon Univerisity! Interested in application security, cryptography and general vulnerability research. I try to participate in bug-bounty programs and CTFs.&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=236669</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=236669"/>
				<updated>2018-01-08T09:52:40Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Zest Text Representation and Parser===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
&lt;br /&gt;
A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A documented definition of a text representation for Zest&lt;br /&gt;
* A parser that converts the text representation into a working Zest script&lt;br /&gt;
* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== SAMPLE: OWASP Hackademic Challenges ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Hackademic Challenges Project]]  helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment. After a wonderfull 2016 GSoC with 100 new challenges and a couple of new plugins we're mainly looking to get new features in and maybe a couple of challenges. Bellow is a list of proposed features.&lt;br /&gt;
* Check our [https://github.com/Hackademic/hackademic github repository] and especially the [https://github.com/Hackademic/hackademic/issues open tickets]&lt;br /&gt;
&lt;br /&gt;
=== REST API for the sandbox ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
During the last summer code sprint Hackademic got challenge sandboxing in the form of vagrant and docker wrappers as well as an engine to start and stop the container or vm instances.&lt;br /&gt;
What is needed now is a rest api which supports endpoint authentication and authorization which enables the sandbox engine to be completely independed from the rest of the project.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
Since the sandbox is written in python, you will be using Django to implement the api.&lt;br /&gt;
The endpoint authorization can be done via certificates or plain signature or username/password type authentication. We would like to see what's your idea on the matter.&lt;br /&gt;
However the communication between the two has to be over a secure channel.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A REST style api which allows an authenticated remote entity control the parts of the  sandbox engine it has access to.&lt;br /&gt;
* PEP8 compliant code&lt;br /&gt;
* Acceptable unit test coverage&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Since this has been a popular project here's a suggestion on how to get started.&lt;br /&gt;
* Check the excellent work done by mebjas and a0xnirudh in their respective brances in the project's repository&lt;br /&gt;
* Take a brief look at the code and try to get a feeling of the functionality included. (Essentially it's CRUD operations on vms or containers)&lt;br /&gt;
* Read on what Docker and Vagrant are and take a look at their respective py-libraries&lt;br /&gt;
* If you think that contributing helps perhaps it would be a good idea to start with lettuce tests on the current CRUD operations of the existing functionality(which won't change and can eventually be ported to the final project) &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python, test driven development, some idea what REST is, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:konstantinos.papapanaqiotou@owasp.org Konstantinos Papapanagiotou][mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== New CMS ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The CMS part of the project is really old and has accumulated a significant amount of technical debt.&lt;br /&gt;
In addition many design decisions are either outdated or could be improved. &lt;br /&gt;
Therefore it may be a good idea to leverage the power of modern web frameworks to create a new CMS.&lt;br /&gt;
The new cms can be written in python using Django.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* New cms with same functionality as the old one (3 types of users -- student, teacher, admin--, 3 types of resources -- article challenge, class--, ACL type permissions, CRUD operations on every resource/user, all functionality can be extended by Plugins.&lt;br /&gt;
* REST endpoints in addition to classic ones&lt;br /&gt;
* tests covering all routes implemented, also complete ACL unit tests, it would be embarassing if a cms by OWASP has rights vulnerabilities.&lt;br /&gt;
* PEP 8 code&lt;br /&gt;
&lt;br /&gt;
''' Note: '''&lt;br /&gt;
This is a huge project, it is ok if the student implements a part of it. However whatever implemented must be up to spec.&lt;br /&gt;
If you decide to take on this project contact us and we can agree on a list of routes.&lt;br /&gt;
If you don't decide to take on this project contact us.&lt;br /&gt;
Generally contact us, we like it when students have insightful questions and the community is active&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting Started: '''&lt;br /&gt;
* Install and take a brief look around the old cms so you have an idea of the functionality needed&lt;br /&gt;
* It's ok to scream in frustration&lt;br /&gt;
* If you want to contribute to get a feeling of the platform a good idea would be lettuce tests for the current functionality (which won't change and you can port in the new cms eventually)&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python, Django, what REST is, the technologies used, some security knowledge would be nice.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:konstantinos.papapanaqiotou@owasp.org Konstantinos Papapanagiotou][mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell'''&lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
*Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
===Expected Results===&lt;br /&gt;
*Adding features to SKF project&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/369&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/367&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/68&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/95&lt;br /&gt;
*Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
*Adding/updating knowledge base items&lt;br /&gt;
*Adding CWE references to knowledgebase items&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/35&lt;br /&gt;
*Improve unit testing of the Angular quality, currently only 68% of the front-end is unit tested automated &lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/352&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
*For helping in the development of new features and functions  you need Python flask and for the frond-end we use Angular 4.0&lt;br /&gt;
*For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
*For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
*For writing the verification guide you need some penetration testing experience.&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
if you need more details please visit the [https://github.com/viraintel/OWASP-Nettacker GitHub page] or contact a leader([mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:reza.espargham@owasp.org Reza Espargham]).&lt;br /&gt;
&lt;br /&gt;
===Getting started===&lt;br /&gt;
&lt;br /&gt;
* You may read the available documents in the [https://github.com/viraintel/OWASP-Nettacker/wiki wiki page]. Developers and users documents are separated.&lt;br /&gt;
&lt;br /&gt;
'''A Better Penetration Testing Automated Framework'''&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Create more modules to the framework (web, network, IoT, etc.)&lt;br /&gt;
* Create more categories to the framework (already has scan and brute)&lt;br /&gt;
* Create API for the framework&lt;br /&gt;
* Optimize the core (speed, hardware usage, user-friendly...)&lt;br /&gt;
* Research and new methods and IDS/IPS detections.&lt;br /&gt;
* Create a benchmark with other competitors frameworks&lt;br /&gt;
* Improve documentation, languages and create a video library&lt;br /&gt;
* Create GUI&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* The whole framework was written in Python language. You must be familiar with Python 2.x, 3.x.&lt;br /&gt;
* Good knowledge of computer security (and penetration testing)&lt;br /&gt;
* Knowledge of OS (Linux, Windows, Mac...) and Services&lt;br /&gt;
* Familiar with IDS/IPS/Firewalls and ...&lt;br /&gt;
* To develop the API you should be familiar with HTTP, Database...&lt;br /&gt;
&lt;br /&gt;
===Mentors===&lt;br /&gt;
Mentors are: [mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:abiusx@owasp.org Abbas Naderi Afooshteh]&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2018 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] user story])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Frontend Tech/Design Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frontend framework AngularJS 1.x along with Bootstrap 3. Several major releases later, there now are [https://github.com/bkimminich/juice-shop/issues/165 Angular 5] and [https://github.com/bkimminich/juice-shop/issues/400 Bootstrap 4] available as well as other mature web frontend frameworks. Migrating the OWASP Juice Shop to the latest version of Angular and Bootstrap is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well. Furthermore, the OWASP Juice Shop could greatly benefit from involvement of someone with UI/UX Design expertise. Individual product images would be lovely, too.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target client-architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
* Iterative and incremental redesign of the UI/UX as well as the product image catalog&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, testing and building&lt;br /&gt;
* Additional web and/or graphic design experience would be highly welcome&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/ui-break.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=236668</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=236668"/>
				<updated>2018-01-08T09:16:02Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: Added and edited the ideas for OWTF.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Zest Text Representation and Parser===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
&lt;br /&gt;
A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A documented definition of a text representation for Zest&lt;br /&gt;
* A parser that converts the text representation into a working Zest script&lt;br /&gt;
* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== SAMPLE: OWASP Hackademic Challenges ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Hackademic Challenges Project]]  helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment. After a wonderfull 2016 GSoC with 100 new challenges and a couple of new plugins we're mainly looking to get new features in and maybe a couple of challenges. Bellow is a list of proposed features.&lt;br /&gt;
* Check our [https://github.com/Hackademic/hackademic github repository] and especially the [https://github.com/Hackademic/hackademic/issues open tickets]&lt;br /&gt;
&lt;br /&gt;
=== REST API for the sandbox ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
During the last summer code sprint Hackademic got challenge sandboxing in the form of vagrant and docker wrappers as well as an engine to start and stop the container or vm instances.&lt;br /&gt;
What is needed now is a rest api which supports endpoint authentication and authorization which enables the sandbox engine to be completely independed from the rest of the project.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
Since the sandbox is written in python, you will be using Django to implement the api.&lt;br /&gt;
The endpoint authorization can be done via certificates or plain signature or username/password type authentication. We would like to see what's your idea on the matter.&lt;br /&gt;
However the communication between the two has to be over a secure channel.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A REST style api which allows an authenticated remote entity control the parts of the  sandbox engine it has access to.&lt;br /&gt;
* PEP8 compliant code&lt;br /&gt;
* Acceptable unit test coverage&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Since this has been a popular project here's a suggestion on how to get started.&lt;br /&gt;
* Check the excellent work done by mebjas and a0xnirudh in their respective brances in the project's repository&lt;br /&gt;
* Take a brief look at the code and try to get a feeling of the functionality included. (Essentially it's CRUD operations on vms or containers)&lt;br /&gt;
* Read on what Docker and Vagrant are and take a look at their respective py-libraries&lt;br /&gt;
* If you think that contributing helps perhaps it would be a good idea to start with lettuce tests on the current CRUD operations of the existing functionality(which won't change and can eventually be ported to the final project) &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python, test driven development, some idea what REST is, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:konstantinos.papapanaqiotou@owasp.org Konstantinos Papapanagiotou][mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== New CMS ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The CMS part of the project is really old and has accumulated a significant amount of technical debt.&lt;br /&gt;
In addition many design decisions are either outdated or could be improved. &lt;br /&gt;
Therefore it may be a good idea to leverage the power of modern web frameworks to create a new CMS.&lt;br /&gt;
The new cms can be written in python using Django.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* New cms with same functionality as the old one (3 types of users -- student, teacher, admin--, 3 types of resources -- article challenge, class--, ACL type permissions, CRUD operations on every resource/user, all functionality can be extended by Plugins.&lt;br /&gt;
* REST endpoints in addition to classic ones&lt;br /&gt;
* tests covering all routes implemented, also complete ACL unit tests, it would be embarassing if a cms by OWASP has rights vulnerabilities.&lt;br /&gt;
* PEP 8 code&lt;br /&gt;
&lt;br /&gt;
''' Note: '''&lt;br /&gt;
This is a huge project, it is ok if the student implements a part of it. However whatever implemented must be up to spec.&lt;br /&gt;
If you decide to take on this project contact us and we can agree on a list of routes.&lt;br /&gt;
If you don't decide to take on this project contact us.&lt;br /&gt;
Generally contact us, we like it when students have insightful questions and the community is active&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting Started: '''&lt;br /&gt;
* Install and take a brief look around the old cms so you have an idea of the functionality needed&lt;br /&gt;
* It's ok to scream in frustration&lt;br /&gt;
* If you want to contribute to get a feeling of the platform a good idea would be lettuce tests for the current functionality (which won't change and you can port in the new cms eventually)&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python, Django, what REST is, the technologies used, some security knowledge would be nice.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:konstantinos.papapanaqiotou@owasp.org Konstantinos Papapanagiotou][mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell'''&lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
*Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
===Expected Results===&lt;br /&gt;
*Adding features to SKF project&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/369&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/367&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/68&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/95&lt;br /&gt;
*Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
*Adding/updating knowledge base items&lt;br /&gt;
*Adding CWE references to knowledgebase items&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/35&lt;br /&gt;
*Improve unit testing of the Angular quality, currently only 68% of the front-end is unit tested automated &lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/352&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
*For helping in the development of new features and functions  you need Python flask and for the frond-end we use Angular 4.0&lt;br /&gt;
*For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
*For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
*For writing the verification guide you need some penetration testing experience.&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
if you need more details please visit the [https://github.com/viraintel/OWASP-Nettacker GitHub page] or contact a leader([mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:reza.espargham@owasp.org Reza Espargham]).&lt;br /&gt;
&lt;br /&gt;
===Getting started===&lt;br /&gt;
&lt;br /&gt;
* You may read the available documents in the [https://github.com/viraintel/OWASP-Nettacker/wiki wiki page]. Developers and users documents are separated.&lt;br /&gt;
&lt;br /&gt;
'''A Better Penetration Testing Automated Framework'''&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Create more modules to the framework (web, network, IoT, etc.)&lt;br /&gt;
* Create more categories to the framework (already has scan and brute)&lt;br /&gt;
* Create API for the framework&lt;br /&gt;
* Optimize the core (speed, hardware usage, user-friendly...)&lt;br /&gt;
* Research and new methods and IDS/IPS detections.&lt;br /&gt;
* Create a benchmark with other competitors frameworks&lt;br /&gt;
* Improve documentation, languages and create a video library&lt;br /&gt;
* Create GUI&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* The whole framework was written in Python language. You must be familiar with Python 2.x, 3.x.&lt;br /&gt;
* Good knowledge of computer security (and penetration testing)&lt;br /&gt;
* Knowledge of OS (Linux, Windows, Mac...) and Services&lt;br /&gt;
* Familiar with IDS/IPS/Firewalls and ...&lt;br /&gt;
* To develop the API you should be familiar with HTTP, Database...&lt;br /&gt;
&lt;br /&gt;
===Mentors===&lt;br /&gt;
Mentors are: [mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:abiusx@owasp.org Abbas Naderi Afooshteh]&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2018 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] user story])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Frontend Tech/Design Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frontend framework AngularJS 1.x along with Bootstrap 3. Several major releases later, there now are [https://github.com/bkimminich/juice-shop/issues/165 Angular 5] and [https://github.com/bkimminich/juice-shop/issues/400 Bootstrap 4] available as well as other mature web frontend frameworks. Migrating the OWASP Juice Shop to the latest version of Angular and Bootstrap is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well. Furthermore, the OWASP Juice Shop could greatly benefit from involvement of someone with UI/UX Design expertise. Individual product images would be lovely, too.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target client-architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
* Iterative and incremental redesign of the UI/UX as well as the product image catalog&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, testing and building&lt;br /&gt;
* Additional web and/or graphic design experience would be highly welcome&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/ui-break.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code.'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=236667</id>
		<title>GSOC2018 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2018_Ideas&amp;diff=236667"/>
				<updated>2018-01-08T08:44:00Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: Added OWTF&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
===Zest Text Representation and Parser===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
&lt;br /&gt;
A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A documented definition of a text representation for Zest&lt;br /&gt;
* A parser that converts the text representation into a working Zest script&lt;br /&gt;
* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes ZAP even better&lt;br /&gt;
* Code that conforms to our Development Rules and Guidelines&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
&lt;br /&gt;
* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding section.&lt;br /&gt;
* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
'''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
== SAMPLE: OWASP Hackademic Challenges ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Hackademic Challenges Project]]  helps you test your knowledge on web application security. You can use it to actually attack web applications in a realistic but also controllable and safe environment. After a wonderfull 2016 GSoC with 100 new challenges and a couple of new plugins we're mainly looking to get new features in and maybe a couple of challenges. Bellow is a list of proposed features.&lt;br /&gt;
* Check our [https://github.com/Hackademic/hackademic github repository] and especially the [https://github.com/Hackademic/hackademic/issues open tickets]&lt;br /&gt;
&lt;br /&gt;
=== REST API for the sandbox ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
During the last summer code sprint Hackademic got challenge sandboxing in the form of vagrant and docker wrappers as well as an engine to start and stop the container or vm instances.&lt;br /&gt;
What is needed now is a rest api which supports endpoint authentication and authorization which enables the sandbox engine to be completely independed from the rest of the project.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
Since the sandbox is written in python, you will be using Django to implement the api.&lt;br /&gt;
The endpoint authorization can be done via certificates or plain signature or username/password type authentication. We would like to see what's your idea on the matter.&lt;br /&gt;
However the communication between the two has to be over a secure channel.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A REST style api which allows an authenticated remote entity control the parts of the  sandbox engine it has access to.&lt;br /&gt;
* PEP8 compliant code&lt;br /&gt;
* Acceptable unit test coverage&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Since this has been a popular project here's a suggestion on how to get started.&lt;br /&gt;
* Check the excellent work done by mebjas and a0xnirudh in their respective brances in the project's repository&lt;br /&gt;
* Take a brief look at the code and try to get a feeling of the functionality included. (Essentially it's CRUD operations on vms or containers)&lt;br /&gt;
* Read on what Docker and Vagrant are and take a look at their respective py-libraries&lt;br /&gt;
* If you think that contributing helps perhaps it would be a good idea to start with lettuce tests on the current CRUD operations of the existing functionality(which won't change and can eventually be ported to the final project) &lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python, test driven development, some idea what REST is, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:konstantinos.papapanaqiotou@owasp.org Konstantinos Papapanagiotou][mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== New CMS ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The CMS part of the project is really old and has accumulated a significant amount of technical debt.&lt;br /&gt;
In addition many design decisions are either outdated or could be improved. &lt;br /&gt;
Therefore it may be a good idea to leverage the power of modern web frameworks to create a new CMS.&lt;br /&gt;
The new cms can be written in python using Django.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* New cms with same functionality as the old one (3 types of users -- student, teacher, admin--, 3 types of resources -- article challenge, class--, ACL type permissions, CRUD operations on every resource/user, all functionality can be extended by Plugins.&lt;br /&gt;
* REST endpoints in addition to classic ones&lt;br /&gt;
* tests covering all routes implemented, also complete ACL unit tests, it would be embarassing if a cms by OWASP has rights vulnerabilities.&lt;br /&gt;
* PEP 8 code&lt;br /&gt;
&lt;br /&gt;
''' Note: '''&lt;br /&gt;
This is a huge project, it is ok if the student implements a part of it. However whatever implemented must be up to spec.&lt;br /&gt;
If you decide to take on this project contact us and we can agree on a list of routes.&lt;br /&gt;
If you don't decide to take on this project contact us.&lt;br /&gt;
Generally contact us, we like it when students have insightful questions and the community is active&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting Started: '''&lt;br /&gt;
* Install and take a brief look around the old cms so you have an idea of the functionality needed&lt;br /&gt;
* It's ok to scream in frustration&lt;br /&gt;
* If you want to contribute to get a feeling of the platform a good idea would be lettuce tests for the current functionality (which won't change and you can port in the new cms eventually)&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
Python, Django, what REST is, the technologies used, some security knowledge would be nice.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:konstantinos.papapanaqiotou@owasp.org Konstantinos Papapanagiotou][mailto:spyros.gasteratos@owasp.org Spyros Gasteratos] - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
==OWASP Security Knowledge Framework==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell'''&lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
*Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
===Expected Results===&lt;br /&gt;
*Adding features to SKF project&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/369&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/367&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/68&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/95&lt;br /&gt;
*Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
*Adding/updating knowledge base items&lt;br /&gt;
*Adding CWE references to knowledgebase items&lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/35&lt;br /&gt;
*Improve unit testing of the Angular quality, currently only 68% of the front-end is unit tested automated &lt;br /&gt;
**https://github.com/blabla1337/skf-flask/issues/352&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
*For helping in the development of new features and functions  you need Python flask and for the frond-end we use Angular 4.0&lt;br /&gt;
*For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
*For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
*For writing the verification guide you need some penetration testing experience.&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org] Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
==OWASP Nettacker==&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.&lt;br /&gt;
&lt;br /&gt;
if you need more details please visit the [https://github.com/viraintel/OWASP-Nettacker GitHub page] or contact a leader([mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:reza.espargham@owasp.org Reza Espargham]).&lt;br /&gt;
&lt;br /&gt;
===Getting started===&lt;br /&gt;
&lt;br /&gt;
* You may read the available documents in the [https://github.com/viraintel/OWASP-Nettacker/wiki wiki page]. Developers and users documents are separated.&lt;br /&gt;
&lt;br /&gt;
'''A Better Penetration Testing Automated Framework'''&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Create more modules to the framework (web, network, IoT, etc.)&lt;br /&gt;
* Create more categories to the framework (already has scan and brute)&lt;br /&gt;
* Create API for the framework&lt;br /&gt;
* Optimize the core (speed, hardware usage, user-friendly...)&lt;br /&gt;
* Research and new methods and IDS/IPS detections.&lt;br /&gt;
* Create a benchmark with other competitors frameworks&lt;br /&gt;
* Improve documentation, languages and create a video library&lt;br /&gt;
* Create GUI&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* The whole framework was written in Python language. You must be familiar with Python 2.x, 3.x.&lt;br /&gt;
* Good knowledge of computer security (and penetration testing)&lt;br /&gt;
* Knowledge of OS (Linux, Windows, Mac...) and Services&lt;br /&gt;
* Familiar with IDS/IPS/Firewalls and ...&lt;br /&gt;
* To develop the API you should be familiar with HTTP, Database...&lt;br /&gt;
&lt;br /&gt;
===Mentors===&lt;br /&gt;
Mentors are: [mailto:ali.razmjoo@owasp.org Ali Razmjoo Qalaei], [mailto:abiusx@owasp.org Abbas Naderi Afooshteh]&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2018 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] user story])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Frontend Tech/Design Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frontend framework AngularJS 1.x along with Bootstrap 3. Several major releases later, there now are [https://github.com/bkimminich/juice-shop/issues/165 Angular 5] and [https://github.com/bkimminich/juice-shop/issues/400 Bootstrap 4] available as well as other mature web frontend frameworks. Migrating the OWASP Juice Shop to the latest version of Angular and Bootstrap is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well. Furthermore, the OWASP Juice Shop could greatly benefit from involvement of someone with UI/UX Design expertise. Individual product images would be lovely, too.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target client-architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
* Iterative and incremental redesign of the UI/UX as well as the product image catalog&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, testing and building&lt;br /&gt;
* Additional web and/or graphic design experience would be highly welcome&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Report enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current OWTF report is very interactive but it cannot be exported in its current form. A reporter service can be written (which was in the very early releases of OWTF) which exports a nice report with template, findings, and additional pentester's notes into multiple formats.  A small set of export formats should be supported such as:&lt;br /&gt;
*HTML (pure static html here)&lt;br /&gt;
*PDF&lt;br /&gt;
*XML (for processing)&lt;br /&gt;
*JSON (for processing)&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python, React.JS and general JavaScript proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Distributed architecture===&lt;br /&gt;
To be updated soon!&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=228519</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=228519"/>
				<updated>2017-04-08T18:54:15Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* The latest version of OWASP OWTF is OWTF 2.1a &amp;quot;Chicken Korma&amp;quot;. */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
=== '''The latest version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.1a OWTF 2.1a &amp;quot;Chicken Korma&amp;quot;].''' ===&lt;br /&gt;
&lt;br /&gt;
Project Leaders&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat.bhalodia@owasp.org Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
* [https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
* [http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
* [https://gitter.im/owtf/owtf OWASP OWTF Gitter Channel]&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the OWASP Summer Code Sprint 2017! If you'd like to participate then see the [https://www.owasp.org/index.php/GSOC_2017_for_Students Summer Code Sprint 2017 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Presentation and talks==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/blob/develop/LICENSE.md LICENSE]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |[[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; |[[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* April 6th, 2017 - [https://github.com/owtf/owtf/releases/tag/v2.1a OWTF 2.1a &amp;quot;Chicken Korma&amp;quot;] is here!&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
* [http://browserstack.com Browserstack] for providing a platform to test OWTF on multiple devices!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=228518</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=228518"/>
				<updated>2017-04-08T18:51:20Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
=== '''The latest version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.1a OWTF 2.1a &amp;quot;Chicken Korma&amp;quot;].''' ===&lt;br /&gt;
&lt;br /&gt;
Project Leaders&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat.bhalodia@owasp.org Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
* [https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
* [http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
* OWASP OWTF Gitter Channel: [![Gitter](&amp;lt;nowiki&amp;gt;https://badges.gitter.im/owtf/owtf.svg&amp;lt;/nowiki&amp;gt;)](&amp;lt;nowiki&amp;gt;https://gitter.im/owtf/owtf&amp;lt;/nowiki&amp;gt;)&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the OWASP Summer Code Sprint 2017! If you'd like to participate then see the [https://www.owasp.org/index.php/GSOC_2017_for_Students Summer Code Sprint 2017 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Presentation and talks==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/blob/develop/LICENSE.md LICENSE]&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
{| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |[[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; |[[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* April 6th, 2017 - [https://github.com/owtf/owtf/releases/tag/v2.1a OWTF 2.1a &amp;quot;Chicken Korma&amp;quot;] is here!&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
* [http://browserstack.com Browserstack] for providing a platform to test OWTF on multiple devices!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226562</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226562"/>
				<updated>2017-02-21T00:57:02Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* Project Leader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2017! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2017%3A-Getting-started GSoC 2017 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.0a OWTF 2.0a &amp;quot;Tikka Masala&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat.bhalodia@owasp.org Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
* [http://browserstack.com Browserstack] for providing a platform to test OWTF on multiple devices!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226368</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226368"/>
				<updated>2017-02-14T21:58:05Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2017! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2017%3A-Getting-started GSoC 2017 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.0a OWTF 2.0a &amp;quot;Tikka Masala&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat001@gmail.com Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
* [http://browserstack.com Browserstack] for providing a platform to test OWTF on multiple devices!&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226367</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226367"/>
				<updated>2017-02-14T21:56:13Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* Tested on Browserstack! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2017! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2017%3A-Getting-started GSoC 2017 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.0a OWTF 2.0a &amp;quot;Tikka Masala&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat001@gmail.com Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226366</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226366"/>
				<updated>2017-02-14T21:55:58Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* Tested on Browserstack! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2017! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2017%3A-Getting-started GSoC 2017 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.0a OWTF 2.0a &amp;quot;Tikka Masala&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat001@gmail.com Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Tested on Browserstack! ==&lt;br /&gt;
 &lt;br /&gt;
| src=&amp;quot;http://i.imgur.com/SjxT3ju.png&amp;quot; style=&amp;quot;height=50px;width=50px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226365</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226365"/>
				<updated>2017-02-14T21:55:12Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* Openhub */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2017! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2017%3A-Getting-started GSoC 2017 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.0a OWTF 2.0a &amp;quot;Tikka Masala&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat001@gmail.com Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Tested on Browserstack! ==&lt;br /&gt;
&lt;br /&gt;
http://i.imgur.com/SjxT3ju.png &lt;br /&gt;
| style=&amp;quot;height=50px;width=50px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226364</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226364"/>
				<updated>2017-02-14T21:54:20Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* Openhub */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2017! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2017%3A-Getting-started GSoC 2017 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.0a OWTF 2.0a &amp;quot;Tikka Masala&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat001@gmail.com Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Tested on Browserstack!&lt;br /&gt;
----&lt;br /&gt;
http://i.imgur.com/SjxT3ju.png &lt;br /&gt;
| style=&amp;quot;height=50px;width=50px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226363</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226363"/>
				<updated>2017-02-14T21:53:52Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* Openhub */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2017! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2017%3A-Getting-started GSoC 2017 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.0a OWTF 2.0a &amp;quot;Tikka Masala&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat001@gmail.com Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Tested on Browserstack!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
| http://i.imgur.com/SjxT3ju.png style=&amp;quot;height=50px;width=50px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226362</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226362"/>
				<updated>2017-02-14T21:53:40Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* Openhub */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2017! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2017%3A-Getting-started GSoC 2017 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.0a OWTF 2.0a &amp;quot;Tikka Masala&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat001@gmail.com Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Tested on Browserstack!&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
| http://i.imgur.com/SjxT3ju.png style=&amp;quot;height=50px;width=50px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226361</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226361"/>
				<updated>2017-02-14T21:53:18Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* Openhub */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2017! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2017%3A-Getting-started GSoC 2017 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.0a OWTF 2.0a &amp;quot;Tikka Masala&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat001@gmail.com Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Tested on Browserstack!&lt;br /&gt;
&lt;br /&gt;
| http://i.imgur.com/SjxT3ju.png style=&amp;quot;height=50px;width=50px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226360</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226360"/>
				<updated>2017-02-14T21:52:21Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* Openhub */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2017! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2017%3A-Getting-started GSoC 2017 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.0a OWTF 2.0a &amp;quot;Tikka Masala&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat001@gmail.com Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Tested on Browserstack!&lt;br /&gt;
&lt;br /&gt;
[img]http://i.imgur.com/SjxT3ju.png[/img]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226359</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226359"/>
				<updated>2017-02-14T21:51:03Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* Openhub */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2017! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2017%3A-Getting-started GSoC 2017 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.0a OWTF 2.0a &amp;quot;Tikka Masala&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat001@gmail.com Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Tested on Browserstack!&lt;br /&gt;
----&lt;br /&gt;
[https://d3but80xmlhqzj.cloudfront.net/production/images/static/header/header-logo.svg]&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226219</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=226219"/>
				<updated>2017-02-10T19:18:40Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* OWASP OWTF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2017! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2017%3A-Getting-started GSoC 2017 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.0a OWTF 2.0a &amp;quot;Tikka Masala&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
* [mailto:viyat001@gmail.com Viyat Bhalodia]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=226010</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=226010"/>
				<updated>2017-02-05T16:16:07Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* OWASP OWTF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us on Github:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
*https://www.owasp.org/index.php/User:Ali_Razmjoo&lt;br /&gt;
*https://www.owasp.org/index.php/User:Johanna_Curiel&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
We have a list of potential modules we want to build&lt;br /&gt;
To get familiar with the project, please check our installation and developer guidelines:&lt;br /&gt;
https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details&lt;br /&gt;
&lt;br /&gt;
Contact us through Github, send us a question:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
* New obfuscation modules&lt;br /&gt;
* New shellcodes for OSX and Windows &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
OWASP ZSC is written in Python, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
Brian Beaudry &amp;amp; Patrik Patel&lt;br /&gt;
Please contact us through Github&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid mobile security project ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
DefectDojo is a security automation and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Multiple opportunities for students to get involved with DefectDojo ranging in difficulty from easy to advanced&lt;br /&gt;
*  Students will receive hands-on experience in a full-stack software development project&lt;br /&gt;
*  Students will have the opportunity to work on a project with multiple moving parts and third-party interactions&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* HTML, Bootstrap&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* We have a [http://defectdojo.readthedocs.io/en/latest/ Read the Docs Site]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:devgreg|Greg Anderson]] - OWASP DefectDojo Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] The OWASP AppSensor project is a project to help you build self-defending applications through real-time event detection and response. Previous GSoC students have implemented key AppSensor contributions, and we've had very successful engagements. We look forward to hearing your ideas and hopefully working with you to execute them.&lt;br /&gt;
&lt;br /&gt;
=== Machine Learning Driven Web Server Log Analysis ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:The goal of this project would be to build a web server log analysis tool suite based on ML (machine learning). This tool suite will accept as input web server logs (apache, nginx) and will provide as output a determination of requests that are considered &amp;quot;attacks&amp;quot; There are a number of key points for this project:&lt;br /&gt;
:* Almost everybody has web server logs. It's a common format that is well understood, and is a good starting place for many security teams&lt;br /&gt;
:* Because the format is well understood, the data points (features) are well understood. &lt;br /&gt;
:* This tool suite would have applicability far beyond just our project. The goal is to give away a tool that can process a set of log files, build a custom model for the traffic, and then be used to process future log files and find attacks (outliers / anomalies)&lt;br /&gt;
:&lt;br /&gt;
:Note that this project would extend work done in last year's GSOC to get an initial machine learning capability developed. &lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User provides tool suite a set of web server logs (User has option to annotate data set with known attacks)&lt;br /&gt;
:* System is pre-coded with knowledge of certain anomalous patterns (attacks)&lt;br /&gt;
:* System builds ML model for processing future log files&lt;br /&gt;
:* System provides mechanism for processing future logs using trained model.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. The toolset used previously for the ML effort was scala/spark, but this is not a hard requirement. The preference would be to use either the JVM (java/scala), or possibly python, as both of these stacks are well understood and have significant ML capabilities. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:AppSensor is a great tool and many organizations are starting to use it. If you have an idea that is not on this list, please submit it - we would love to give you the chance to work on an idea you came up with!&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes AppSensor even better&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - MiTM proxy interception and replay capabilities ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy). &lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
&lt;br /&gt;
* ability to intercept the transactions&lt;br /&gt;
* modify or replay transaction on the fly&lt;br /&gt;
* add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
&lt;br /&gt;
Bonus: &lt;br /&gt;
&lt;br /&gt;
* Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
* Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
* Create a browser instance and do the necessary login procedure&lt;br /&gt;
* Handle the browser for the URI&lt;br /&gt;
* When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Report enhancements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current OWTF report is very interactive but it cannot be exported in its current form. A reporter service can be written (which was in the very early releases of OWTF) which exports a nice report with template, findings, and additional pentester's notes into multiple formats.  A small set of export formats should be supported such as:&lt;br /&gt;
&lt;br /&gt;
* HTML (pure static html here)&lt;br /&gt;
* PDF&lt;br /&gt;
* XML (for processing)&lt;br /&gt;
* JSON (for processing)&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python, React.JS and general JavaScript proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Distributed architecture ===&lt;br /&gt;
&lt;br /&gt;
To be updated soon!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225968</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225968"/>
				<updated>2017-02-04T00:12:45Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* OWASP OWTF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us on Github:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
*https://www.owasp.org/index.php/User:Ali_Razmjoo&lt;br /&gt;
*https://www.owasp.org/index.php/User:Johanna_Curiel&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
We have a list of potential modules we want to build&lt;br /&gt;
To get familiar with the project, please check our installation and developer guidelines:&lt;br /&gt;
https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details&lt;br /&gt;
&lt;br /&gt;
Contact us through Github, send us a question:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
* New obfuscation modules&lt;br /&gt;
* New shellcodes for OSX and Windows &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
OWASP ZSC is written in Python, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
Brian Beaudry &amp;amp; Patrik Patel&lt;br /&gt;
Please contact us through Github&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid mobile security project ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
DefectDojo is a security automation and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Multiple opportunities for students to get involved with DefectDojo ranging in difficulty from easy to advanced&lt;br /&gt;
*  Students will receive hands-on experience in a full-stack software development project&lt;br /&gt;
*  Students will have the opportunity to work on a project with multiple moving parts and third-party interactions&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* HTML, Bootstrap&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* We have a [http://defectdojo.readthedocs.io/en/latest/ Read the Docs Site]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:devgreg|Greg Anderson]] - OWASP DefectDojo Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] The OWASP AppSensor project is a project to help you build self-defending applications through real-time event detection and response. Previous GSoC students have implemented key AppSensor contributions, and we've had very successful engagements. We look forward to hearing your ideas and hopefully working with you to execute them.&lt;br /&gt;
&lt;br /&gt;
=== Machine Learning Driven Web Server Log Analysis ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:The goal of this project would be to build a web server log analysis tool suite based on ML (machine learning). This tool suite will accept as input web server logs (apache, nginx) and will provide as output a determination of requests that are considered &amp;quot;attacks&amp;quot; There are a number of key points for this project:&lt;br /&gt;
:* Almost everybody has web server logs. It's a common format that is well understood, and is a good starting place for many security teams&lt;br /&gt;
:* Because the format is well understood, the data points (features) are well understood. &lt;br /&gt;
:* This tool suite would have applicability far beyond just our project. The goal is to give away a tool that can process a set of log files, build a custom model for the traffic, and then be used to process future log files and find attacks (outliers / anomalies)&lt;br /&gt;
:&lt;br /&gt;
:Note that this project would extend work done in last year's GSOC to get an initial machine learning capability developed. &lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User provides tool suite a set of web server logs (User has option to annotate data set with known attacks)&lt;br /&gt;
:* System is pre-coded with knowledge of certain anomalous patterns (attacks)&lt;br /&gt;
:* System builds ML model for processing future log files&lt;br /&gt;
:* System provides mechanism for processing future logs using trained model.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. The toolset used previously for the ML effort was scala/spark, but this is not a hard requirement. The preference would be to use either the JVM (java/scala), or possibly python, as both of these stacks are well understood and have significant ML capabilities. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:AppSensor is a great tool and many organizations are starting to use it. If you have an idea that is not on this list, please submit it - we would love to give you the chance to work on an idea you came up with!&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes AppSensor even better&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas given below focus on rewrite of some major components of OWTF to make it more modular.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - MiTM proxy interception and replay capabilities ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy). &lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
&lt;br /&gt;
* can be to intercept the transactions&lt;br /&gt;
* modify on the fly or replay transactions&lt;br /&gt;
* add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
&lt;br /&gt;
Bonus: &lt;br /&gt;
&lt;br /&gt;
* Design and implement a proxy plugin (middleware?) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
* Replace the current requester object (based on urllib, urllib2) with one based on the new urllib3 with support for a real headless browser instance. The simple requester as of now which is good for sending HTTP requests. It will be great to also have a headless browser factory inside the requester. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e creds or script or whatever)&lt;br /&gt;
* Create a browser instance and do the necessary login stuff&lt;br /&gt;
* Handle the browser to whosoever asked for it&lt;br /&gt;
* When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Report enhancements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current OWTF report is very interactive but it cannot be exported in its current form. A reporter service can be written (which was in the very early releases of OWTF) which exports a nice report with template, findings, and additional pentester's notes into multiple formats.  A small set of export formats should be supported such as:&lt;br /&gt;
&lt;br /&gt;
* HTML (pure static html here)&lt;br /&gt;
* PDF&lt;br /&gt;
* XML (for processing)&lt;br /&gt;
* JSON (for processing)&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python, React.JS and general JavaScript proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Distributed plugin architecture ===&lt;br /&gt;
&lt;br /&gt;
To be updated soon!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225967</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225967"/>
				<updated>2017-02-04T00:12:21Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* OWASP OWTF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us on Github:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
*https://www.owasp.org/index.php/User:Ali_Razmjoo&lt;br /&gt;
*https://www.owasp.org/index.php/User:Johanna_Curiel&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
We have a list of potential modules we want to build&lt;br /&gt;
To get familiar with the project, please check our installation and developer guidelines:&lt;br /&gt;
https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details&lt;br /&gt;
&lt;br /&gt;
Contact us through Github, send us a question:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
* New obfuscation modules&lt;br /&gt;
* New shellcodes for OSX and Windows &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
OWASP ZSC is written in Python, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
Brian Beaudry &amp;amp; Patrik Patel&lt;br /&gt;
Please contact us through Github&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid mobile security project ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
DefectDojo is a security automation and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Multiple opportunities for students to get involved with DefectDojo ranging in difficulty from easy to advanced&lt;br /&gt;
*  Students will receive hands-on experience in a full-stack software development project&lt;br /&gt;
*  Students will have the opportunity to work on a project with multiple moving parts and third-party interactions&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* HTML, Bootstrap&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* We have a [http://defectdojo.readthedocs.io/en/latest/ Read the Docs Site]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:devgreg|Greg Anderson]] - OWASP DefectDojo Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] The OWASP AppSensor project is a project to help you build self-defending applications through real-time event detection and response. Previous GSoC students have implemented key AppSensor contributions, and we've had very successful engagements. We look forward to hearing your ideas and hopefully working with you to execute them.&lt;br /&gt;
&lt;br /&gt;
=== Machine Learning Driven Web Server Log Analysis ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:The goal of this project would be to build a web server log analysis tool suite based on ML (machine learning). This tool suite will accept as input web server logs (apache, nginx) and will provide as output a determination of requests that are considered &amp;quot;attacks&amp;quot; There are a number of key points for this project:&lt;br /&gt;
:* Almost everybody has web server logs. It's a common format that is well understood, and is a good starting place for many security teams&lt;br /&gt;
:* Because the format is well understood, the data points (features) are well understood. &lt;br /&gt;
:* This tool suite would have applicability far beyond just our project. The goal is to give away a tool that can process a set of log files, build a custom model for the traffic, and then be used to process future log files and find attacks (outliers / anomalies)&lt;br /&gt;
:&lt;br /&gt;
:Note that this project would extend work done in last year's GSOC to get an initial machine learning capability developed. &lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User provides tool suite a set of web server logs (User has option to annotate data set with known attacks)&lt;br /&gt;
:* System is pre-coded with knowledge of certain anomalous patterns (attacks)&lt;br /&gt;
:* System builds ML model for processing future log files&lt;br /&gt;
:* System provides mechanism for processing future logs using trained model.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. The toolset used previously for the ML effort was scala/spark, but this is not a hard requirement. The preference would be to use either the JVM (java/scala), or possibly python, as both of these stacks are well understood and have significant ML capabilities. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:AppSensor is a great tool and many organizations are starting to use it. If you have an idea that is not on this list, please submit it - we would love to give you the chance to work on an idea you came up with!&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes AppSensor even better&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
'''https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas given below focus on rewrite of some major components of OWTF to make it more modular.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - MiTM proxy interception and replay capabilities ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy). &lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
&lt;br /&gt;
* can be to intercept the transactions&lt;br /&gt;
* modify on the fly or replay transactions&lt;br /&gt;
* add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
&lt;br /&gt;
Bonus: &lt;br /&gt;
&lt;br /&gt;
* Design and implement a proxy plugin (middleware?) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
* Replace the current requester object (based on urllib, urllib2) with one based on the new urllib3 with support for a real headless browser instance. The simple requester as of now which is good for sending HTTP requests. It will be great to also have a headless browser factory inside the requester. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e creds or script or whatever)&lt;br /&gt;
* Create a browser instance and do the necessary login stuff&lt;br /&gt;
* Handle the browser to whosoever asked for it&lt;br /&gt;
* When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Report enhancements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current OWTF report is very interactive but it cannot be exported in its current form. A reporter service can be written (which was in the very early releases of OWTF) which exports a nice report with template, findings, and additional pentester's notes into multiple formats.  A small set of export formats should be supported such as:&lt;br /&gt;
&lt;br /&gt;
* HTML (pure static html here)&lt;br /&gt;
* PDF&lt;br /&gt;
* XML (for processing)&lt;br /&gt;
* JSON (for processing)&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python, React.JS and general JavaScript proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Distributed plugin architecture ===&lt;br /&gt;
&lt;br /&gt;
To be updated soon!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225966</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225966"/>
				<updated>2017-02-04T00:11:16Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* OWASP OWTF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us on Github:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
*https://www.owasp.org/index.php/User:Ali_Razmjoo&lt;br /&gt;
*https://www.owasp.org/index.php/User:Johanna_Curiel&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
We have a list of potential modules we want to build&lt;br /&gt;
To get familiar with the project, please check our installation and developer guidelines:&lt;br /&gt;
https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details&lt;br /&gt;
&lt;br /&gt;
Contact us through Github, send us a question:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
* New obfuscation modules&lt;br /&gt;
* New shellcodes for OSX and Windows &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
OWASP ZSC is written in Python, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
Brian Beaudry &amp;amp; Patrik Patel&lt;br /&gt;
Please contact us through Github&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid mobile security project ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
DefectDojo is a security automation and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Multiple opportunities for students to get involved with DefectDojo ranging in difficulty from easy to advanced&lt;br /&gt;
*  Students will receive hands-on experience in a full-stack software development project&lt;br /&gt;
*  Students will have the opportunity to work on a project with multiple moving parts and third-party interactions&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* HTML, Bootstrap&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* We have a [http://defectdojo.readthedocs.io/en/latest/ Read the Docs Site]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:devgreg|Greg Anderson]] - OWASP DefectDojo Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] The OWASP AppSensor project is a project to help you build self-defending applications through real-time event detection and response. Previous GSoC students have implemented key AppSensor contributions, and we've had very successful engagements. We look forward to hearing your ideas and hopefully working with you to execute them.&lt;br /&gt;
&lt;br /&gt;
=== Machine Learning Driven Web Server Log Analysis ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:The goal of this project would be to build a web server log analysis tool suite based on ML (machine learning). This tool suite will accept as input web server logs (apache, nginx) and will provide as output a determination of requests that are considered &amp;quot;attacks&amp;quot; There are a number of key points for this project:&lt;br /&gt;
:* Almost everybody has web server logs. It's a common format that is well understood, and is a good starting place for many security teams&lt;br /&gt;
:* Because the format is well understood, the data points (features) are well understood. &lt;br /&gt;
:* This tool suite would have applicability far beyond just our project. The goal is to give away a tool that can process a set of log files, build a custom model for the traffic, and then be used to process future log files and find attacks (outliers / anomalies)&lt;br /&gt;
:&lt;br /&gt;
:Note that this project would extend work done in last year's GSOC to get an initial machine learning capability developed. &lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User provides tool suite a set of web server logs (User has option to annotate data set with known attacks)&lt;br /&gt;
:* System is pre-coded with knowledge of certain anomalous patterns (attacks)&lt;br /&gt;
:* System builds ML model for processing future log files&lt;br /&gt;
:* System provides mechanism for processing future logs using trained model.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. The toolset used previously for the ML effort was scala/spark, but this is not a hard requirement. The preference would be to use either the JVM (java/scala), or possibly python, as both of these stacks are well understood and have significant ML capabilities. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:AppSensor is a great tool and many organizations are starting to use it. If you have an idea that is not on this list, please submit it - we would love to give you the chance to work on an idea you came up with!&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes AppSensor even better&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
[ https://github.com/owtf/owtf ]Offensive Web Testing Framework (OWTF) is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas given below focus on rewrite of some major components of OWTF to make it more modular.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - MiTM proxy interception and replay capabilities ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy). &lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
&lt;br /&gt;
* can be to intercept the transactions&lt;br /&gt;
* modify on the fly or replay transactions&lt;br /&gt;
* add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
&lt;br /&gt;
Bonus: &lt;br /&gt;
&lt;br /&gt;
* Design and implement a proxy plugin (middleware?) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
* Replace the current requester object (based on urllib, urllib2) with one based on the new urllib3 with support for a real headless browser instance. The simple requester as of now which is good for sending HTTP requests. It will be great to also have a headless browser factory inside the requester. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e creds or script or whatever)&lt;br /&gt;
* Create a browser instance and do the necessary login stuff&lt;br /&gt;
* Handle the browser to whosoever asked for it&lt;br /&gt;
* When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Report enhancements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current OWTF report is very interactive but it cannot be exported in its current form. A reporter service can be written (which was in the very early releases of OWTF) which exports a nice report with template, findings, and additional pentester's notes into multiple formats.  A small set of export formats should be supported such as:&lt;br /&gt;
&lt;br /&gt;
* HTML (pure static html here)&lt;br /&gt;
* PDF&lt;br /&gt;
* XML (for processing)&lt;br /&gt;
* JSON (for processing)&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python, React.JS and general JavaScript proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Distributed plugin architecture ===&lt;br /&gt;
&lt;br /&gt;
To be updated soon!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225965</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225965"/>
				<updated>2017-02-04T00:10:36Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* OWASP OWTF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us on Github:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
*https://www.owasp.org/index.php/User:Ali_Razmjoo&lt;br /&gt;
*https://www.owasp.org/index.php/User:Johanna_Curiel&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
We have a list of potential modules we want to build&lt;br /&gt;
To get familiar with the project, please check our installation and developer guidelines:&lt;br /&gt;
https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details&lt;br /&gt;
&lt;br /&gt;
Contact us through Github, send us a question:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
* New obfuscation modules&lt;br /&gt;
* New shellcodes for OSX and Windows &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
OWASP ZSC is written in Python, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
Brian Beaudry &amp;amp; Patrik Patel&lt;br /&gt;
Please contact us through Github&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid mobile security project ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
DefectDojo is a security automation and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Multiple opportunities for students to get involved with DefectDojo ranging in difficulty from easy to advanced&lt;br /&gt;
*  Students will receive hands-on experience in a full-stack software development project&lt;br /&gt;
*  Students will have the opportunity to work on a project with multiple moving parts and third-party interactions&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* HTML, Bootstrap&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* We have a [http://defectdojo.readthedocs.io/en/latest/ Read the Docs Site]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:devgreg|Greg Anderson]] - OWASP DefectDojo Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] The OWASP AppSensor project is a project to help you build self-defending applications through real-time event detection and response. Previous GSoC students have implemented key AppSensor contributions, and we've had very successful engagements. We look forward to hearing your ideas and hopefully working with you to execute them.&lt;br /&gt;
&lt;br /&gt;
=== Machine Learning Driven Web Server Log Analysis ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:The goal of this project would be to build a web server log analysis tool suite based on ML (machine learning). This tool suite will accept as input web server logs (apache, nginx) and will provide as output a determination of requests that are considered &amp;quot;attacks&amp;quot; There are a number of key points for this project:&lt;br /&gt;
:* Almost everybody has web server logs. It's a common format that is well understood, and is a good starting place for many security teams&lt;br /&gt;
:* Because the format is well understood, the data points (features) are well understood. &lt;br /&gt;
:* This tool suite would have applicability far beyond just our project. The goal is to give away a tool that can process a set of log files, build a custom model for the traffic, and then be used to process future log files and find attacks (outliers / anomalies)&lt;br /&gt;
:&lt;br /&gt;
:Note that this project would extend work done in last year's GSOC to get an initial machine learning capability developed. &lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User provides tool suite a set of web server logs (User has option to annotate data set with known attacks)&lt;br /&gt;
:* System is pre-coded with knowledge of certain anomalous patterns (attacks)&lt;br /&gt;
:* System builds ML model for processing future log files&lt;br /&gt;
:* System provides mechanism for processing future logs using trained model.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. The toolset used previously for the ML effort was scala/spark, but this is not a hard requirement. The preference would be to use either the JVM (java/scala), or possibly python, as both of these stacks are well understood and have significant ML capabilities. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:AppSensor is a great tool and many organizations are starting to use it. If you have an idea that is not on this list, please submit it - we would love to give you the chance to work on an idea you came up with!&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes AppSensor even better&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
[Offensive Web Testing Framework (OWTF) https://github.com/owtf/owtf.git] is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas given below focus on rewrite of some major components of OWTF to make it more modular.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - MiTM proxy interception and replay capabilities ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy). &lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
&lt;br /&gt;
* can be to intercept the transactions&lt;br /&gt;
* modify on the fly or replay transactions&lt;br /&gt;
* add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
&lt;br /&gt;
Bonus: &lt;br /&gt;
&lt;br /&gt;
* Design and implement a proxy plugin (middleware?) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
* Replace the current requester object (based on urllib, urllib2) with one based on the new urllib3 with support for a real headless browser instance. The simple requester as of now which is good for sending HTTP requests. It will be great to also have a headless browser factory inside the requester. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e creds or script or whatever)&lt;br /&gt;
* Create a browser instance and do the necessary login stuff&lt;br /&gt;
* Handle the browser to whosoever asked for it&lt;br /&gt;
* When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Report enhancements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current OWTF report is very interactive but it cannot be exported in its current form. A reporter service can be written (which was in the very early releases of OWTF) which exports a nice report with template, findings, and additional pentester's notes into multiple formats.  A small set of export formats should be supported such as:&lt;br /&gt;
&lt;br /&gt;
* HTML (pure static html here)&lt;br /&gt;
* PDF&lt;br /&gt;
* XML (for processing)&lt;br /&gt;
* JSON (for processing)&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python, React.JS and general JavaScript proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Distributed plugin architecture ===&lt;br /&gt;
&lt;br /&gt;
To be updated soon!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225964</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225964"/>
				<updated>2017-02-04T00:10:11Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* OWASP OWTF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us on Github:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
*https://www.owasp.org/index.php/User:Ali_Razmjoo&lt;br /&gt;
*https://www.owasp.org/index.php/User:Johanna_Curiel&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
We have a list of potential modules we want to build&lt;br /&gt;
To get familiar with the project, please check our installation and developer guidelines:&lt;br /&gt;
https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details&lt;br /&gt;
&lt;br /&gt;
Contact us through Github, send us a question:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
* New obfuscation modules&lt;br /&gt;
* New shellcodes for OSX and Windows &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
OWASP ZSC is written in Python, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
Brian Beaudry &amp;amp; Patrik Patel&lt;br /&gt;
Please contact us through Github&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid mobile security project ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
DefectDojo is a security automation and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Multiple opportunities for students to get involved with DefectDojo ranging in difficulty from easy to advanced&lt;br /&gt;
*  Students will receive hands-on experience in a full-stack software development project&lt;br /&gt;
*  Students will have the opportunity to work on a project with multiple moving parts and third-party interactions&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* HTML, Bootstrap&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* We have a [http://defectdojo.readthedocs.io/en/latest/ Read the Docs Site]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:devgreg|Greg Anderson]] - OWASP DefectDojo Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] The OWASP AppSensor project is a project to help you build self-defending applications through real-time event detection and response. Previous GSoC students have implemented key AppSensor contributions, and we've had very successful engagements. We look forward to hearing your ideas and hopefully working with you to execute them.&lt;br /&gt;
&lt;br /&gt;
=== Machine Learning Driven Web Server Log Analysis ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:The goal of this project would be to build a web server log analysis tool suite based on ML (machine learning). This tool suite will accept as input web server logs (apache, nginx) and will provide as output a determination of requests that are considered &amp;quot;attacks&amp;quot; There are a number of key points for this project:&lt;br /&gt;
:* Almost everybody has web server logs. It's a common format that is well understood, and is a good starting place for many security teams&lt;br /&gt;
:* Because the format is well understood, the data points (features) are well understood. &lt;br /&gt;
:* This tool suite would have applicability far beyond just our project. The goal is to give away a tool that can process a set of log files, build a custom model for the traffic, and then be used to process future log files and find attacks (outliers / anomalies)&lt;br /&gt;
:&lt;br /&gt;
:Note that this project would extend work done in last year's GSOC to get an initial machine learning capability developed. &lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User provides tool suite a set of web server logs (User has option to annotate data set with known attacks)&lt;br /&gt;
:* System is pre-coded with knowledge of certain anomalous patterns (attacks)&lt;br /&gt;
:* System builds ML model for processing future log files&lt;br /&gt;
:* System provides mechanism for processing future logs using trained model.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. The toolset used previously for the ML effort was scala/spark, but this is not a hard requirement. The preference would be to use either the JVM (java/scala), or possibly python, as both of these stacks are well understood and have significant ML capabilities. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:AppSensor is a great tool and many organizations are starting to use it. If you have an idea that is not on this list, please submit it - we would love to give you the chance to work on an idea you came up with!&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes AppSensor even better&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
[Offensive Web Testing Framework (OWTF)][https://github.com/owtf/owtf.git] is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas given below focus on rewrite of some major components of OWTF to make it more modular.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - MiTM proxy interception and replay capabilities ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy). &lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
&lt;br /&gt;
* can be to intercept the transactions&lt;br /&gt;
* modify on the fly or replay transactions&lt;br /&gt;
* add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
&lt;br /&gt;
Bonus: &lt;br /&gt;
&lt;br /&gt;
* Design and implement a proxy plugin (middleware?) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
* Replace the current requester object (based on urllib, urllib2) with one based on the new urllib3 with support for a real headless browser instance. The simple requester as of now which is good for sending HTTP requests. It will be great to also have a headless browser factory inside the requester. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e creds or script or whatever)&lt;br /&gt;
* Create a browser instance and do the necessary login stuff&lt;br /&gt;
* Handle the browser to whosoever asked for it&lt;br /&gt;
* When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Report enhancements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current OWTF report is very interactive but it cannot be exported in its current form. A reporter service can be written (which was in the very early releases of OWTF) which exports a nice report with template, findings, and additional pentester's notes into multiple formats.  A small set of export formats should be supported such as:&lt;br /&gt;
&lt;br /&gt;
* HTML (pure static html here)&lt;br /&gt;
* PDF&lt;br /&gt;
* XML (for processing)&lt;br /&gt;
* JSON (for processing)&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python, React.JS and general JavaScript proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Distributed plugin architecture ===&lt;br /&gt;
&lt;br /&gt;
To be updated soon!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225959</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225959"/>
				<updated>2017-02-03T21:33:15Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* OWASP OWTF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us on Github:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
*https://www.owasp.org/index.php/User:Ali_Razmjoo&lt;br /&gt;
*https://www.owasp.org/index.php/User:Johanna_Curiel&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
We have a list of potential modules we want to build&lt;br /&gt;
To get familiar with the project, please check our installation and developer guidelines:&lt;br /&gt;
https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details&lt;br /&gt;
&lt;br /&gt;
Contact us through Github, send us a question:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
* New obfuscation modules&lt;br /&gt;
* New shellcodes for OSX and Windows &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
OWASP ZSC is written in Python, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
Brian Beaudry &amp;amp; Patrik Patel&lt;br /&gt;
Please contact us through Github&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid mobile security project ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
DefectDojo is a security automation and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Multiple opportunities for students to get involved with DefectDojo ranging in difficulty from easy to advanced&lt;br /&gt;
*  Students will receive hands-on experience in a full-stack software development project&lt;br /&gt;
*  Students will have the opportunity to work on a project with multiple moving parts and third-party interactions&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* HTML, Bootstrap&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* We have a [http://defectdojo.readthedocs.io/en/latest/ Read the Docs Site]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:devgreg|Greg Anderson]] - OWASP DefectDojo Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] The OWASP AppSensor project is a project to help you build self-defending applications through real-time event detection and response. Previous GSoC students have implemented key AppSensor contributions, and we've had very successful engagements. We look forward to hearing your ideas and hopefully working with you to execute them.&lt;br /&gt;
&lt;br /&gt;
=== Machine Learning Driven Web Server Log Analysis ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:The goal of this project would be to build a web server log analysis tool suite based on ML (machine learning). This tool suite will accept as input web server logs (apache, nginx) and will provide as output a determination of requests that are considered &amp;quot;attacks&amp;quot; There are a number of key points for this project:&lt;br /&gt;
:* Almost everybody has web server logs. It's a common format that is well understood, and is a good starting place for many security teams&lt;br /&gt;
:* Because the format is well understood, the data points (features) are well understood. &lt;br /&gt;
:* This tool suite would have applicability far beyond just our project. The goal is to give away a tool that can process a set of log files, build a custom model for the traffic, and then be used to process future log files and find attacks (outliers / anomalies)&lt;br /&gt;
:&lt;br /&gt;
:Note that this project would extend work done in last year's GSOC to get an initial machine learning capability developed. &lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User provides tool suite a set of web server logs (User has option to annotate data set with known attacks)&lt;br /&gt;
:* System is pre-coded with knowledge of certain anomalous patterns (attacks)&lt;br /&gt;
:* System builds ML model for processing future log files&lt;br /&gt;
:* System provides mechanism for processing future logs using trained model.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. The toolset used previously for the ML effort was scala/spark, but this is not a hard requirement. The preference would be to use either the JVM (java/scala), or possibly python, as both of these stacks are well understood and have significant ML capabilities. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:AppSensor is a great tool and many organizations are starting to use it. If you have an idea that is not on this list, please submit it - we would love to give you the chance to work on an idea you came up with!&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes AppSensor even better&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
[[Offensive Web Testing Framework (OWTF)]] is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas given below focus on rewrite of some major components of OWTF to make it more modular.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - MiTM proxy interception and replay capabilities ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy). &lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
&lt;br /&gt;
* can be to intercept the transactions&lt;br /&gt;
* modify on the fly or replay transactions&lt;br /&gt;
* add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
&lt;br /&gt;
Bonus: &lt;br /&gt;
&lt;br /&gt;
* Design and implement a proxy plugin (middleware?) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
* Replace the current requester object (based on urllib, urllib2) with one based on the new urllib3 with support for a real headless browser instance. The simple requester as of now which is good for sending HTTP requests. It will be great to also have a headless browser factory inside the requester. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e creds or script or whatever)&lt;br /&gt;
* Create a browser instance and do the necessary login stuff&lt;br /&gt;
* Handle the browser to whosoever asked for it&lt;br /&gt;
* When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Report enhancements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current OWTF report is very interactive but it cannot be exported in its current form. A reporter service can be written (which was in the very early releases of OWTF) which exports a nice report with template, findings, and additional pentester's notes into multiple formats.  A small set of export formats should be supported such as:&lt;br /&gt;
&lt;br /&gt;
* HTML (pure static html here)&lt;br /&gt;
* PDF&lt;br /&gt;
* XML (for processing)&lt;br /&gt;
* JSON (for processing)&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python, React.JS and general JavaScript proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Distributed plugin architecture ===&lt;br /&gt;
&lt;br /&gt;
To be updated soon!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225958</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225958"/>
				<updated>2017-02-03T21:09:16Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* OWASP OWTF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us on Github:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
*https://www.owasp.org/index.php/User:Ali_Razmjoo&lt;br /&gt;
*https://www.owasp.org/index.php/User:Johanna_Curiel&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
We have a list of potential modules we want to build&lt;br /&gt;
To get familiar with the project, please check our installation and developer guidelines:&lt;br /&gt;
https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details&lt;br /&gt;
&lt;br /&gt;
Contact us through Github, send us a question:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
* New obfuscation modules&lt;br /&gt;
* New shellcodes for OSX and Windows &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
OWASP ZSC is written in Python, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
Brian Beaudry &amp;amp; Patrik Patel&lt;br /&gt;
Please contact us through Github&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid mobile security project ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
DefectDojo is a security automation and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Multiple opportunities for students to get involved with DefectDojo ranging in difficulty from easy to advanced&lt;br /&gt;
*  Students will receive hands-on experience in a full-stack software development project&lt;br /&gt;
*  Students will have the opportunity to work on a project with multiple moving parts and third-party interactions&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* HTML, Bootstrap&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* We have a [http://defectdojo.readthedocs.io/en/latest/ Read the Docs Site]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:devgreg|Greg Anderson]] - OWASP DefectDojo Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] The OWASP AppSensor project is a project to help you build self-defending applications through real-time event detection and response. Previous GSoC students have implemented key AppSensor contributions, and we've had very successful engagements. We look forward to hearing your ideas and hopefully working with you to execute them.&lt;br /&gt;
&lt;br /&gt;
=== Machine Learning Driven Web Server Log Analysis ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:The goal of this project would be to build a web server log analysis tool suite based on ML (machine learning). This tool suite will accept as input web server logs (apache, nginx) and will provide as output a determination of requests that are considered &amp;quot;attacks&amp;quot; There are a number of key points for this project:&lt;br /&gt;
:* Almost everybody has web server logs. It's a common format that is well understood, and is a good starting place for many security teams&lt;br /&gt;
:* Because the format is well understood, the data points (features) are well understood. &lt;br /&gt;
:* This tool suite would have applicability far beyond just our project. The goal is to give away a tool that can process a set of log files, build a custom model for the traffic, and then be used to process future log files and find attacks (outliers / anomalies)&lt;br /&gt;
:&lt;br /&gt;
:Note that this project would extend work done in last year's GSOC to get an initial machine learning capability developed. &lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User provides tool suite a set of web server logs (User has option to annotate data set with known attacks)&lt;br /&gt;
:* System is pre-coded with knowledge of certain anomalous patterns (attacks)&lt;br /&gt;
:* System builds ML model for processing future log files&lt;br /&gt;
:* System provides mechanism for processing future logs using trained model.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. The toolset used previously for the ML effort was scala/spark, but this is not a hard requirement. The preference would be to use either the JVM (java/scala), or possibly python, as both of these stacks are well understood and have significant ML capabilities. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:AppSensor is a great tool and many organizations are starting to use it. If you have an idea that is not on this list, please submit it - we would love to give you the chance to work on an idea you came up with!&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes AppSensor even better&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
[[Offensive Web Testing Framework (OWTF)]] is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas given below focus on rewrite of some major components of OWTF to make it more modular.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - MiTM proxy interception and replay capabilities ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy). &lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
&lt;br /&gt;
* can be to intercept the transactions&lt;br /&gt;
* modify on the fly or replay transactions&lt;br /&gt;
* add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
&lt;br /&gt;
Bonus: &lt;br /&gt;
&lt;br /&gt;
* Design and implement a proxy plugin (middleware?) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
* Replace the current requester object (based on urllib, urllib2) with one based on the new urllib3 with support for a real headless browser instance. The simple requester as of now which is good for sending HTTP requests. It will be great to also have a headless browser factory inside the requester. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e creds or script or whatever)&lt;br /&gt;
* Create a browser instance and do the necessary login stuff&lt;br /&gt;
* Handle the browser to whosoever asked for it&lt;br /&gt;
* When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Report enhancements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current OWTF report is very interactive but it cannot be exported in its current form. A reporter service can be written (which was in the very early releases of OWTF) which exports a nice report with template, findings, and additional pentester's notes into multiple formats.  A small set of export formats should be supported such as:&lt;br /&gt;
&lt;br /&gt;
* HTML (pure static html here)&lt;br /&gt;
* PDF&lt;br /&gt;
* XML (for processing)&lt;br /&gt;
* JSON (for processing)&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python, React.JS and general JavaScript proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225957</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225957"/>
				<updated>2017-02-03T20:57:12Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* OWASP OWTF - Report enhancement */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us on Github:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
*https://www.owasp.org/index.php/User:Ali_Razmjoo&lt;br /&gt;
*https://www.owasp.org/index.php/User:Johanna_Curiel&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
We have a list of potential modules we want to build&lt;br /&gt;
To get familiar with the project, please check our installation and developer guidelines:&lt;br /&gt;
https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details&lt;br /&gt;
&lt;br /&gt;
Contact us through Github, send us a question:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
* New obfuscation modules&lt;br /&gt;
* New shellcodes for OSX and Windows &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
OWASP ZSC is written in Python, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
Brian Beaudry &amp;amp; Patrik Patel&lt;br /&gt;
Please contact us through Github&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid mobile security project ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
DefectDojo is a security automation and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Multiple opportunities for students to get involved with DefectDojo ranging in difficulty from easy to advanced&lt;br /&gt;
*  Students will receive hands-on experience in a full-stack software development project&lt;br /&gt;
*  Students will have the opportunity to work on a project with multiple moving parts and third-party interactions&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* HTML, Bootstrap&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* We have a [http://defectdojo.readthedocs.io/en/latest/ Read the Docs Site]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:devgreg|Greg Anderson]] - OWASP DefectDojo Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] The OWASP AppSensor project is a project to help you build self-defending applications through real-time event detection and response. Previous GSoC students have implemented key AppSensor contributions, and we've had very successful engagements. We look forward to hearing your ideas and hopefully working with you to execute them.&lt;br /&gt;
&lt;br /&gt;
=== Machine Learning Driven Web Server Log Analysis ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:The goal of this project would be to build a web server log analysis tool suite based on ML (machine learning). This tool suite will accept as input web server logs (apache, nginx) and will provide as output a determination of requests that are considered &amp;quot;attacks&amp;quot; There are a number of key points for this project:&lt;br /&gt;
:* Almost everybody has web server logs. It's a common format that is well understood, and is a good starting place for many security teams&lt;br /&gt;
:* Because the format is well understood, the data points (features) are well understood. &lt;br /&gt;
:* This tool suite would have applicability far beyond just our project. The goal is to give away a tool that can process a set of log files, build a custom model for the traffic, and then be used to process future log files and find attacks (outliers / anomalies)&lt;br /&gt;
:&lt;br /&gt;
:Note that this project would extend work done in last year's GSOC to get an initial machine learning capability developed. &lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User provides tool suite a set of web server logs (User has option to annotate data set with known attacks)&lt;br /&gt;
:* System is pre-coded with knowledge of certain anomalous patterns (attacks)&lt;br /&gt;
:* System builds ML model for processing future log files&lt;br /&gt;
:* System provides mechanism for processing future logs using trained model.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. The toolset used previously for the ML effort was scala/spark, but this is not a hard requirement. The preference would be to use either the JVM (java/scala), or possibly python, as both of these stacks are well understood and have significant ML capabilities. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:AppSensor is a great tool and many organizations are starting to use it. If you have an idea that is not on this list, please submit it - we would love to give you the chance to work on an idea you came up with!&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes AppSensor even better&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
[[Offensive Web Testing Framework (OWTF)]] is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas given below focus on major rewrite of major components of OWTF to make it more modular.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - MiTM proxy interception and replay capabilities ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy). &lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
&lt;br /&gt;
* can be to intercept the transactions&lt;br /&gt;
* modify on the fly or replay transactions&lt;br /&gt;
* add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
&lt;br /&gt;
Bonus: &lt;br /&gt;
&lt;br /&gt;
* Design and implement a proxy plugin (middleware?) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
* Replace the current requester object (based on urllib, urllib2) with one based on the new urllib3 with support for a real headless browser instance. The simple requester as of now which is good for sending HTTP requests. It will be great to also have a headless browser factory inside the requester. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e creds or script or whatever)&lt;br /&gt;
* Create a browser instance and do the necessary login stuff&lt;br /&gt;
* Handle the browser to whosoever asked for it&lt;br /&gt;
* When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Report enhancements ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current OWTF report is very interactive but it cannot be exported in its current form. A reporter service can be written (which was in the very early releases of OWTF) which exports a nice report with template, findings, and additional pentester's notes into multiple formats.  A small set of export formats should be supported such as:&lt;br /&gt;
&lt;br /&gt;
* HTML (pure static html here)&lt;br /&gt;
* PDF&lt;br /&gt;
* XML (for processing)&lt;br /&gt;
* JSON (for processing)&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python, React.JS and general JavaScript proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225956</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225956"/>
				<updated>2017-02-03T20:56:59Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* OWASP OWTF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us on Github:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
*https://www.owasp.org/index.php/User:Ali_Razmjoo&lt;br /&gt;
*https://www.owasp.org/index.php/User:Johanna_Curiel&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
We have a list of potential modules we want to build&lt;br /&gt;
To get familiar with the project, please check our installation and developer guidelines:&lt;br /&gt;
https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details&lt;br /&gt;
&lt;br /&gt;
Contact us through Github, send us a question:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
* New obfuscation modules&lt;br /&gt;
* New shellcodes for OSX and Windows &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
OWASP ZSC is written in Python, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
Brian Beaudry &amp;amp; Patrik Patel&lt;br /&gt;
Please contact us through Github&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid mobile security project ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
DefectDojo is a security automation and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Multiple opportunities for students to get involved with DefectDojo ranging in difficulty from easy to advanced&lt;br /&gt;
*  Students will receive hands-on experience in a full-stack software development project&lt;br /&gt;
*  Students will have the opportunity to work on a project with multiple moving parts and third-party interactions&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* HTML, Bootstrap&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* We have a [http://defectdojo.readthedocs.io/en/latest/ Read the Docs Site]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:devgreg|Greg Anderson]] - OWASP DefectDojo Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] The OWASP AppSensor project is a project to help you build self-defending applications through real-time event detection and response. Previous GSoC students have implemented key AppSensor contributions, and we've had very successful engagements. We look forward to hearing your ideas and hopefully working with you to execute them.&lt;br /&gt;
&lt;br /&gt;
=== Machine Learning Driven Web Server Log Analysis ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:The goal of this project would be to build a web server log analysis tool suite based on ML (machine learning). This tool suite will accept as input web server logs (apache, nginx) and will provide as output a determination of requests that are considered &amp;quot;attacks&amp;quot; There are a number of key points for this project:&lt;br /&gt;
:* Almost everybody has web server logs. It's a common format that is well understood, and is a good starting place for many security teams&lt;br /&gt;
:* Because the format is well understood, the data points (features) are well understood. &lt;br /&gt;
:* This tool suite would have applicability far beyond just our project. The goal is to give away a tool that can process a set of log files, build a custom model for the traffic, and then be used to process future log files and find attacks (outliers / anomalies)&lt;br /&gt;
:&lt;br /&gt;
:Note that this project would extend work done in last year's GSOC to get an initial machine learning capability developed. &lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User provides tool suite a set of web server logs (User has option to annotate data set with known attacks)&lt;br /&gt;
:* System is pre-coded with knowledge of certain anomalous patterns (attacks)&lt;br /&gt;
:* System builds ML model for processing future log files&lt;br /&gt;
:* System provides mechanism for processing future logs using trained model.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. The toolset used previously for the ML effort was scala/spark, but this is not a hard requirement. The preference would be to use either the JVM (java/scala), or possibly python, as both of these stacks are well understood and have significant ML capabilities. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:AppSensor is a great tool and many organizations are starting to use it. If you have an idea that is not on this list, please submit it - we would love to give you the chance to work on an idea you came up with!&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes AppSensor even better&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
[[Offensive Web Testing Framework (OWTF)]] is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas given below focus on major rewrite of major components of OWTF to make it more modular.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - MiTM proxy interception and replay capabilities ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy). &lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
&lt;br /&gt;
* can be to intercept the transactions&lt;br /&gt;
* modify on the fly or replay transactions&lt;br /&gt;
* add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
&lt;br /&gt;
Bonus: &lt;br /&gt;
&lt;br /&gt;
* Design and implement a proxy plugin (middleware?) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
* Replace the current requester object (based on urllib, urllib2) with one based on the new urllib3 with support for a real headless browser instance. The simple requester as of now which is good for sending HTTP requests. It will be great to also have a headless browser factory inside the requester. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
* The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e creds or script or whatever)&lt;br /&gt;
* Create a browser instance and do the necessary login stuff&lt;br /&gt;
* Handle the browser to whosoever asked for it&lt;br /&gt;
* When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Report enhancement ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current OWTF report is very interactive but it cannot be exported in its current form. A reporter service can be written (which was in the very early releases of OWTF) which exports a nice report with template, findings, and additional pentester's notes into multiple formats.  A small set of export formats should be supported such as:&lt;br /&gt;
&lt;br /&gt;
* HTML (pure static html here)&lt;br /&gt;
* PDF&lt;br /&gt;
* XML (for processing)&lt;br /&gt;
* JSON (for processing)&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python, React.JS and general JavaScript proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225952</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225952"/>
				<updated>2017-02-03T19:57:48Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* OWASP OWTF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us on Github:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
*https://www.owasp.org/index.php/User:Ali_Razmjoo&lt;br /&gt;
*https://www.owasp.org/index.php/User:Johanna_Curiel&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
We have a list of potential modules we want to build&lt;br /&gt;
To get familiar with the project, please check our installation and developer guidelines:&lt;br /&gt;
https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details&lt;br /&gt;
&lt;br /&gt;
Contact us through Github, send us a question:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
* New obfuscation modules&lt;br /&gt;
* New shellcodes for OSX and Windows &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
OWASP ZSC is written in Python, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
Brian Beaudry &amp;amp; Patrik Patel&lt;br /&gt;
Please contact us through Github&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid mobile security project ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
DefectDojo is a security automation and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Multiple opportunities for students to get involved with DefectDojo ranging in difficulty from easy to advanced&lt;br /&gt;
*  Students will receive hands-on experience in a full-stack software development project&lt;br /&gt;
*  Students will have the opportunity to work on a project with multiple moving parts and third-party interactions&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* HTML, Bootstrap&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* We have a [http://defectdojo.readthedocs.io/en/latest/ Read the Docs Site]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:devgreg|Greg Anderson]] - OWASP DefectDojo Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] The OWASP AppSensor project is a project to help you build self-defending applications through real-time event detection and response. Previous GSoC students have implemented key AppSensor contributions, and we've had very successful engagements. We look forward to hearing your ideas and hopefully working with you to execute them.&lt;br /&gt;
&lt;br /&gt;
=== Machine Learning Driven Web Server Log Analysis ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:The goal of this project would be to build a web server log analysis tool suite based on ML (machine learning). This tool suite will accept as input web server logs (apache, nginx) and will provide as output a determination of requests that are considered &amp;quot;attacks&amp;quot; There are a number of key points for this project:&lt;br /&gt;
:* Almost everybody has web server logs. It's a common format that is well understood, and is a good starting place for many security teams&lt;br /&gt;
:* Because the format is well understood, the data points (features) are well understood. &lt;br /&gt;
:* This tool suite would have applicability far beyond just our project. The goal is to give away a tool that can process a set of log files, build a custom model for the traffic, and then be used to process future log files and find attacks (outliers / anomalies)&lt;br /&gt;
:&lt;br /&gt;
:Note that this project would extend work done in last year's GSOC to get an initial machine learning capability developed. &lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User provides tool suite a set of web server logs (User has option to annotate data set with known attacks)&lt;br /&gt;
:* System is pre-coded with knowledge of certain anomalous patterns (attacks)&lt;br /&gt;
:* System builds ML model for processing future log files&lt;br /&gt;
:* System provides mechanism for processing future logs using trained model.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. The toolset used previously for the ML effort was scala/spark, but this is not a hard requirement. The preference would be to use either the JVM (java/scala), or possibly python, as both of these stacks are well understood and have significant ML capabilities. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:AppSensor is a great tool and many organizations are starting to use it. If you have an idea that is not on this list, please submit it - we would love to give you the chance to work on an idea you came up with!&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes AppSensor even better&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
[[Offensive Web Testing Framework (OWTF)]] is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas given below focus on major rewrite of major components of OWTF to make it more modular.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - MiTM proxy interception and replay capabilities ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy). &lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
&lt;br /&gt;
* can be to intercept the transactions&lt;br /&gt;
* modify on the fly or replay transactions&lt;br /&gt;
* add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
&lt;br /&gt;
Bonus: Design and implement a proxy plugin (middleware?) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225950</id>
		<title>GSOC2017 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSOC2017_Ideas&amp;diff=225950"/>
				<updated>2017-02-03T19:20:32Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:''' &lt;br /&gt;
 * Read the [[GSoC SAT]]&lt;br /&gt;
 * Check out the suggested projects below&lt;br /&gt;
 * Contact the mentors and teams of the projects that you are interested in&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and AngularJS. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2017 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
Coming up with additional ideas for challenges would be part of the project scope, as the list of pre-existing ideas might not be sufficient for a GSoC project.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges in, e.g. the [https://github.com/bkimminich/juice-shop/issues/244 Order Dashboard] and [https://github.com/bkimminich/juice-shop/issues/243 Pomace Recycling user stories])&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/3&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Tech Stack Update ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Development of OWASP Juice Shop started in 2014 and was based on - back then - quite recent Javascript frameworks and modules:&lt;br /&gt;
&lt;br /&gt;
* AngularJS 1.x with Bootstrap in the client&lt;br /&gt;
* Express on top of NodeJS on the server with&lt;br /&gt;
** SQLite as a database&lt;br /&gt;
** Sequelize as an OR-Mapper&lt;br /&gt;
*** sequelize-restful as an automatic API-generator on top of the DB entities&lt;br /&gt;
* Jasmine 1.x to specify behavioral tests&lt;br /&gt;
** Karma as a test runner for the client-side unit tests&lt;br /&gt;
** Frisby.js for API tests on a dynamically launched server&lt;br /&gt;
** Protractor for end-to-end testing of the challenge exploits&lt;br /&gt;
* NPM for running/testing the application&lt;br /&gt;
* Grunt for some of the custom build scripts&lt;br /&gt;
&lt;br /&gt;
Several of the above frameworks or modules have moved on to new (runtime incompatible) major releases, namely [https://github.com/bkimminich/juice-shop/issues/165 Angular 2], [https://github.com/bkimminich/juice-shop/issues/167 Sequelize], [https://github.com/bkimminich/juice-shop/issues/164 Frisby and Jasmine]. Other modules are out of maintenance entirely, e.g. [https://github.com/bkimminich/juice-shop/issues/167 sequelize-restful].&lt;br /&gt;
&lt;br /&gt;
Migrating the OWASP Juice Shop to the latest versions of the mentioned frameworks &amp;amp; modules is an important step to keep the application relevant as ''the most modern'' intentionally broken web application. Moving to entirely different frameworks might be taken into considerationas well.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* High-level target architecture overview including a migration plan with intermediary milestones&lt;br /&gt;
* Execution of migration without breaking functionality or losing tests along the way&lt;br /&gt;
* Code follows existing (or new) styleguides and passes all existing (or new) quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
* Check out the corresponding GitHub milestone for this project: https://github.com/bkimminich/juice-shop/milestone/2&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, experience with latest Javascript frameworks for frontend, backend, testing and building (e.g. AngularJS 2.x, Jasmine 2.x, ...)&lt;br /&gt;
&lt;br /&gt;
'''Mentors:'''&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) AngularJS (1.x) and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Hacking Playground ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Hacking Playground (https://github.com/OWASP/OMTG-Hacking-Playground) is part of the OWASP Mobile universe, which consists at the moment of the following projects: &lt;br /&gt;
&lt;br /&gt;
* Mobile Application Security Verification (MASVS). The MASVS is a list of security requirements for mobile applications that can be used by architects, developers, testers, security professionals, and consumers to define what a secure mobile application is. (https://github.com/OWASP/owasp-masvs)&lt;br /&gt;
* Mobile Security Testing Guide (MSTG). The OWASP MSTG is a comprehensive manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for dynamic and static security tests, and to help ensure completeness and consistency of the tests. (https://github.com/OWASP/owasp-mstg)&lt;br /&gt;
&lt;br /&gt;
In order to give also practical guidance to developers, security researches and penetration testers of mobile Apps, a hacking playground was created with the goal to create different mobile App’s that contain different vulnerabilities that map to the MSTG test cases. Every test case described in the MSTG will therefore be implemented in an Android and iOS App. This has two advantages:&lt;br /&gt;
&lt;br /&gt;
* A developer can identify vulnerable code in the provided App’s and can see the implications and risks if such patterns are used and can look for the best practices in the MSTG to mitigate the vulnerabilities.&lt;br /&gt;
* Penetration testers / security researchers can identify bad practices, dangerous methods and classes they should look for when assessing a Mobile App and can gain more knowledge through the information provided in the OMTG.&lt;br /&gt;
&lt;br /&gt;
It is also encouraged to use the App(s) for education purpose during trainings and workshops.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creation of Android Code Samples ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
An Android App that maps to the MSTG test cases is already created. This App contains mostly test cases that are related to data storage on an Android device. In order to close the gap to the MSTG more test cases need to be added that show &amp;quot;bad practices&amp;quot; that lead to vulnerabilites, but also the latest security best practices to demonstrate how vulnerabilites can be mitigated. &lt;br /&gt;
&lt;br /&gt;
For examples of implemented test cases, see the Wiki of the Mobile Hacking Playground: https://github.com/OWASP/OMTG-Hacking-Playground/wiki/Android-App&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
The following categories and their test cases are not fully added to the  Android App:&lt;br /&gt;
&lt;br /&gt;
* Cryptography (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x08-V3-Cryptography_Verification_Requirements.md)&lt;br /&gt;
* Authentication and Session Management (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x09-V4-Authentication_and_Session_Management%20Requirements.md)&lt;br /&gt;
* Network Communication (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x10-V5-Network_communication_requirements.md)&lt;br /&gt;
* Environmental Interaction (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x11-V6-Interaction_with_the_environment.md)&lt;br /&gt;
* Code Quality (https://github.com/OWASP/owasp-masvs/blob/master/Document/0x12-V7-Code_quality_and_build_setting_requirements.md)&lt;br /&gt;
&lt;br /&gt;
For some of the testcases this also includes creating an endpoint on server side in order to fully understand the test case and possible security concerns.&lt;br /&gt;
&lt;br /&gt;
As not all missing test cases can be implemented during the GSOC a subset of them will be defined with the student together. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
Here are a few suggestion on how to get started.&lt;br /&gt;
* Check the Mobile Hacking Playground Android App, browse through the code and Wiki to get an understanding of what a test case look likes. &lt;br /&gt;
* Browse through the MASVS and check the different areas and their defined requirements.&lt;br /&gt;
* Read about Security vulnerabilites and best practices for Android in areas you are interested in (e.g. Cryptography).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
General interest in Mobile and Security. Basic knowledge of Android and Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' [mailto:sven.schleier@owasp.org Sven Schleier] - OWASP Mobile Security Testing Guide and Mobile Hacking Playground Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP ZAP ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
We have just included a few of the ideas we have here, for a more complete list see the issues on the ZAP bug tracker with the [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3Aproject project] label.&lt;br /&gt;
&lt;br /&gt;
=== Field Enumeration ===&lt;br /&gt;
:&lt;br /&gt;
:This would allow a user to iterate though a set of (user defined) characters in order to identify the ones that are filtered out and/or escaped.&lt;br /&gt;
:&lt;br /&gt;
:The user should be able to define the character sets to test and will probably need to configure the success and failure conditions, as well as valid values for other fields in the form.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User able to specify a specific field to enumerate via the ZAP UI&lt;br /&gt;
:* A list of all valid characters to be returned from the sets of characters the user specifies&lt;br /&gt;
:* Ability to configure a wide range of success and failure conditions to cope with as many possible situations as possible&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Scripting Code Completion ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP provides a very powerful scripting interface. Unfortunately to use it effectively is only really possible with a good knowledge of the ZAP internals. Adding code completion (eg using a project like https://github.com/bobbylight/AutoComplete) would significantly help users.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Code completion for all of the parameters for all available functions in the standard scripts&lt;br /&gt;
:* Implementations for JavaScript, JRuby and Jython&lt;br /&gt;
:* Helper classes with code completion for commonly required functionality&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== SSRF Detector Integration ===&lt;br /&gt;
:&lt;br /&gt;
:Currently ZAP does not detect SSRF vulnerabilities, due to the lack of this sort of service. https://ssrfdetector.com/ is an online service for detecting Server Side Request Forgery vulnerabilities (SSRF). It is developed and maintained by Jake Reynolds and is open source https://github.com/jacobreynolds/ssrfdetector&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP to detect SSRF vulnerabilities and interact with other services such as outlined above.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Zest Text Representation and Parser ===&lt;br /&gt;
:&lt;br /&gt;
:Zest is a graphical scripting language from the Mozilla Security team, and is used as the ZAP macro language.&lt;br /&gt;
:&lt;br /&gt;
:A standardized text representation and parser would be very useful and help its adoption.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* A documented definition of a text representation for Zest&lt;br /&gt;
:* A parser that converts the text representation into a working Zest script&lt;br /&gt;
:* An option in the Zest java implementation to output Zest scripts text format&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Support Java as a Scripting Language ===&lt;br /&gt;
:&lt;br /&gt;
:It would be very useful to support Java in addition to the JSR223 scripting languages within the ZAP script console'.&lt;br /&gt;
:&lt;br /&gt;
:It should be possible to provide much better auto complete support than will be possible with dynamically typed scripting languages.&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* The ability to run Java code in the ZAP Script Console to the same leval as other supported scripting languages&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Bamboo Support ===&lt;br /&gt;
:&lt;br /&gt;
:ZAP already has an official plugin for Jenkins (https://wiki.jenkins-ci.org/display/JENKINS/zap+plugin). &lt;br /&gt;
:&lt;br /&gt;
:It would be great if we also had similar integration for Bamboo (https://www.atlassian.com/software/bamboo, https://en.wikipedia.org/wiki/Bamboo_(software))&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Facilitate the invocation and configuration of various ZAP functionalities from Bamboo CI. Including (but not limited to):&lt;br /&gt;
::*Manage Sessions (Loading/Persisting)&lt;br /&gt;
::*Define Context (Name, Include &amp;amp; Exclude URLs)&lt;br /&gt;
::* Attack Contexts (Spider, Ajax Spider, Active Scan)&lt;br /&gt;
::* Setup Autentication (Formed or Script Based)&lt;br /&gt;
::* Generate Reports&lt;br /&gt;
:* Templates for all of the current script types&lt;br /&gt;
:* Optionally auto complete supported&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:The Zest reference implementation is written in Java, so a good knowledge of this language is recommended. Some knowledge of CI/CD/Bamboo would be useful.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Backslash Powered Scanner ===&lt;br /&gt;
:&lt;br /&gt;
:This is a brand new technique developed by one of the Burp guys: http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html&lt;br /&gt;
:Their implementation is open source: https://github.com/PortSwigger/backslash-powered-scanner so hopefully shouldn't be too hard to port to ZAP :)&lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* Extend ZAP's active scanner to leverage Backslash type scanning.&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:ZAP is a great framework for building new and innovative security testing solutions. If you have an idea that is not on this list then don't worry, you can still submit it, we have accepted original projects in previous years and have even paid a student to work on their idea when we did not get enough GSoC slots to accept all of the projects we wanted.&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes ZAP even better&lt;br /&gt;
:* Code that conforms to our [https://github.com/zaproxy/zaproxy/wiki/DevGuidelines Development Rules and Guidelines]&lt;br /&gt;
:&lt;br /&gt;
:'''Knowledge Prerequisites:'''&lt;br /&gt;
:ZAP is written in Java, so a good knowledge of this language is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
:&lt;br /&gt;
:'''Mentors:''' &lt;br /&gt;
:[https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== BLT / Bugheist ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Bugheist lets anyone report issues they find on the internet. Found something out of place on Amazon.com ?  Let them know.  Companies are held accountable and shows their response time and history.  Get points for reporting bugs and help keep the internet bug free.&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us :)&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes Bugheist even better&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
BLT is written in Python / Django, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
[https://www.owasp.org/index.php/User:Sauriti Sean Auriti] [mailto:sean.auriti@owasp.org @] and the rest of the BLT Core Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Security Knowledge framework ==&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The OWASP Security Knowledge Framework is intended to be a tool that is used as a guide for building and verifying secure software. It can also be used to train developers about application security. Education is the first step in the Secure Software Development Lifecycle. This software can be run on Windows/Linux/OSX using python-flask.&lt;br /&gt;
&lt;br /&gt;
'''In a nutshell''' &lt;br /&gt;
&lt;br /&gt;
- Training developers in writing secure code&lt;br /&gt;
&lt;br /&gt;
- Security support pre-development ( Security by design, early feedback of possible security issues )&lt;br /&gt;
&lt;br /&gt;
- Security support post-development ( Double check your code by means of the OWASP ASVS checklists )&lt;br /&gt;
&lt;br /&gt;
- Code examples for secure coding&lt;br /&gt;
&lt;br /&gt;
===Your idea / Getting started===&lt;br /&gt;
* Please send an email to riccardo.ten.cate@owasp.org [riccardo.ten.cate@owasp.org] or glenn.ten.cate@owasp.org [glenn.ten.cate@owasp.org] and we would love to tell you all about it! :-)&lt;br /&gt;
&lt;br /&gt;
===Expected Results===&lt;br /&gt;
* Adding features to SKF project&lt;br /&gt;
* Adding more function examples to pre-development phase&lt;br /&gt;
* Adding/updating code examples ( PHP, Java, .NET, Go, Python, NodeJS and more )&lt;br /&gt;
* Adding/updating Knowledgebase items&lt;br /&gt;
* Adding CWE references to knowledgebase items&lt;br /&gt;
* Adding low/medium level verification testing guides for developers to teach how to manually verify the existence of injection/logic flaws. (pen-testing)&lt;br /&gt;
&lt;br /&gt;
===Knowledge Prerequisites===&lt;br /&gt;
&lt;br /&gt;
* For helping in the development of new features and functions Python flask would come in handy since the framework is written in python flask.&lt;br /&gt;
* For writing knowledgebase items only technical knowledge of application security is required&lt;br /&gt;
* For writing / updating code examples you need to know a programming language along with secure development.&lt;br /&gt;
* For writing the verification guide you need some penetration testing experience. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate [mailto:riccardo.ten.cate@owasp.org]&lt;br /&gt;
Glenn ten Cate [mailto:glenn.ten.cate@owasp.org]&lt;br /&gt;
&lt;br /&gt;
== OWASP ZSC ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP ZSC is an open source software in python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under python&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_ZSC_Tool_Project&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with us on Github:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
Project Leaders:&lt;br /&gt;
*https://www.owasp.org/index.php/User:Ali_Razmjoo&lt;br /&gt;
*https://www.owasp.org/index.php/User:Johanna_Curiel&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
We have a list of potential modules we want to build&lt;br /&gt;
To get familiar with the project, please check our installation and developer guidelines:&lt;br /&gt;
https://www.gitbook.com/book/ali-razmjoo/owasp-zsc/details&lt;br /&gt;
&lt;br /&gt;
Contact us through Github, send us a question:&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
* New obfuscation modules&lt;br /&gt;
* New shellcodes for OSX and Windows &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
OWASP ZSC is written in Python, so a good knowledge of this language and framework is recommended, as is knowledge of HTML. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
Brian Beaudry &amp;amp; Patrik Patel&lt;br /&gt;
Please contact us through Github&lt;br /&gt;
https://github.com/zscproject/OWASP-ZSC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid mobile security project ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Behavioral malware and intrusion analysis  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is an Android mobile app which already has a capability to statically analyze malware using machine learning (weka toolkit) relying on permissions. However, this is usually not enough and we intend to improve this with behavioral analysis. There are a number of paper in scientific literature describing how to detect malware and intrusions by dynamically analyzing its behavior (system calls, battery consumption, etc.). The idea of this project is to find the best approach that can be implemented on the device and implement it.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Reviewing scientific literature and find feasible approach we can take&lt;br /&gt;
*  Implement and possibly improve the approach in Seraphimdroid&lt;br /&gt;
*  Test the model and provide controls to switch algorithm on or off and possibly fine tune it&lt;br /&gt;
*  Documenting approach as a technical report&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
* Basic knowledge and interest in machine learning&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
=== Framework for plugin development  ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
[[OWASP_SeraphimDroid_Project|OWASP Seraphimdroid]] is well rounded security and privacy app, however, it lacks some components community can provide. We would like to provide community the way to develop plugins that can add features to OWASP Seraphimdroid app. However, the way of integrating external components into Android app may be challenge. The way of presenting GUI and integration between processes need to be examined and developed. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Examining the way of integrating third party apps through some provided API to OWASP Seraphimdroid&lt;br /&gt;
*  Providing GUI integration with third party components&lt;br /&gt;
*  Develop at least one test plugin&lt;br /&gt;
*  Document the development process and API&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Java&lt;br /&gt;
* Android&lt;br /&gt;
* CSV, XML&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Nikola_Milosevic|Nikola Milosevic]] - OWASP Seraphimdroid Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
DefectDojo is a security automation and vulnerability management tool. DefectDojo allows you to manage your application security program, maintain product and application information, schedule scans, triage vulnerabilities and push findings into defect trackers.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
*  Multiple opportunities for students to get involved with DefectDojo ranging in difficulty from easy to advanced&lt;br /&gt;
*  Students will receive hands-on experience in a full-stack software development project&lt;br /&gt;
*  Students will have the opportunity to work on a project with multiple moving parts and third-party interactions&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python&lt;br /&gt;
* HTML, Bootstrap&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* We have a [http://defectdojo.readthedocs.io/en/latest/ Read the Docs Site]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:devgreg|Greg Anderson]] - OWASP DefectDojo Project Leader&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSensor ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSensor Project]] The OWASP AppSensor project is a project to help you build self-defending applications through real-time event detection and response. Previous GSoC students have implemented key AppSensor contributions, and we've had very successful engagements. We look forward to hearing your ideas and hopefully working with you to execute them.&lt;br /&gt;
&lt;br /&gt;
=== Machine Learning Driven Web Server Log Analysis ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:The goal of this project would be to build a web server log analysis tool suite based on ML (machine learning). This tool suite will accept as input web server logs (apache, nginx) and will provide as output a determination of requests that are considered &amp;quot;attacks&amp;quot; There are a number of key points for this project:&lt;br /&gt;
:* Almost everybody has web server logs. It's a common format that is well understood, and is a good starting place for many security teams&lt;br /&gt;
:* Because the format is well understood, the data points (features) are well understood. &lt;br /&gt;
:* This tool suite would have applicability far beyond just our project. The goal is to give away a tool that can process a set of log files, build a custom model for the traffic, and then be used to process future log files and find attacks (outliers / anomalies)&lt;br /&gt;
:&lt;br /&gt;
:Note that this project would extend work done in last year's GSOC to get an initial machine learning capability developed. &lt;br /&gt;
:&lt;br /&gt;
:''' Expected Results '''&lt;br /&gt;
:&lt;br /&gt;
:* User provides tool suite a set of web server logs (User has option to annotate data set with known attacks)&lt;br /&gt;
:* System is pre-coded with knowledge of certain anomalous patterns (attacks)&lt;br /&gt;
:* System builds ML model for processing future log files&lt;br /&gt;
:* System provides mechanism for processing future logs using trained model.&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. The toolset used previously for the ML effort was scala/spark, but this is not a hard requirement. The preference would be to use either the JVM (java/scala), or possibly python, as both of these stacks are well understood and have significant ML capabilities. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
=== Your Idea ===&lt;br /&gt;
:&lt;br /&gt;
:'''Brief Explanation:'''&lt;br /&gt;
:&lt;br /&gt;
:AppSensor is a great tool and many organizations are starting to use it. If you have an idea that is not on this list, please submit it - we would love to give you the chance to work on an idea you came up with!&lt;br /&gt;
:&lt;br /&gt;
:''' Getting started '''&lt;br /&gt;
:* Get in touch with us :)&lt;br /&gt;
:&lt;br /&gt;
:'''Expected Results:'''&lt;br /&gt;
:* A new feature that makes AppSensor even better&lt;br /&gt;
:&lt;br /&gt;
:''' Knowledge Prerequisite: '''&lt;br /&gt;
:AppSensor is written in Java, so a good knowledge of this language is recommended. &lt;br /&gt;
:&lt;br /&gt;
:''' Mentors '''&lt;br /&gt;
:[https://www.owasp.org/index.php/User:John_Melton John Melton] [mailto:jtmelton@gmail.com @] and the rest of the AppSensor Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== OWASP OWTF ==&lt;br /&gt;
[[Offensive Web Testing Framework (OWTF)]] is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas given below focus on major rewrite of major components of OWTF to make it more modular.&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Off-line HTTP traffic uploader ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Although it is awesome that OWTF runs a lot of tools on behalf of the user, there are situations where uploading the HTTP traffic of another tool off-line can be very interesting for OWTF, for example:&lt;br /&gt;
&lt;br /&gt;
* Tools that OWTF has trouble proxying right now: skipfish, hoppy&lt;br /&gt;
* Tools that the user may have run manually OR even from a tool aggregator -very common! :)-&lt;br /&gt;
* Tools that we just don't run from OWTF: ZAP, Burp, Fiddler&lt;br /&gt;
&lt;br /&gt;
This project is about implementing an off-line utility able to parse HTTP traffic:&lt;br /&gt;
&lt;br /&gt;
1) Figure out how to read output files from various tools like:&lt;br /&gt;
skipfish, hoppy, w3af, arachni, etc.&lt;br /&gt;
Nice to have: ZAP database, Burp database&lt;br /&gt;
&lt;br /&gt;
2) Translate that into the following clearly defined fields:&lt;br /&gt;
&lt;br /&gt;
* HTTP request&lt;br /&gt;
* HTTP response status code&lt;br /&gt;
* HTTP response headers&lt;br /&gt;
* HTTP response body&lt;br /&gt;
&lt;br /&gt;
3) IMPORTANT: Implement a plugin-based uploader system&lt;br /&gt;
&lt;br /&gt;
4) IMPORTANT: Implement ONE plugin, that uploads that into the OWTF database&lt;br /&gt;
&lt;br /&gt;
5) IMPORTANT: OWTF should ideally be able to invoke the uploader right after running a tool&lt;br /&gt;
	Example: OWTF runs skipfish, skipfish finishes, OWTF runs the HTTP traffic uploader, all skipfish data is pushed to the OWTF DB.&lt;br /&gt;
&lt;br /&gt;
6) CRITICAL: The off-line HTTP traffic uploader should be smart enough to read + push 1-by-1 instead of *stupidly* trying to load everything into memory first, you have been warned! :)&lt;br /&gt;
&lt;br /&gt;
	Why? Because in a huge assessment, the output of &amp;quot;tool X&amp;quot; can be &amp;quot;10 GB&amp;quot;, which is *stupid* to load into memory, this is OWTF, we *really* try to foresee the crash before it happens! ;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CRITICAL: It is important to implement a plugin-based uploader system, so that other projects can benefit from this work (i.e. to be able to import third-party tool data to ZAP, Burp, and other tools in a similar fashion), and hence hopefully join us in maintaining this project moving forward.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* '''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
* '''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
* '''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
* CRITICAL: Excellent reliability&lt;br /&gt;
* Good performance&lt;br /&gt;
* Unit tests / Functional tests&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:'''&lt;br /&gt;
Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=216554</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=216554"/>
				<updated>2016-05-07T17:18:19Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2016! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2016%3A-Getting-started GSoC 2016 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.0a OWTF 2.0a &amp;quot;Tikka Masala&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* May 7th, 2016 - [http://blog.7-a.org/2016/05/owtf-20a-tikka-masala-released-plz-rt.html OWTF 2.0a &amp;quot;Tikka Masala&amp;quot; is here!]&lt;br /&gt;
&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=216553</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=216553"/>
				<updated>2016-05-07T13:06:37Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* What is OWTF? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2016! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2016%3A-Getting-started GSoC 2016 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v2.0a OWTF 2.0a &amp;quot;Tikka Masala&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211769</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211769"/>
				<updated>2016-03-25T03:51:18Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* OWASP OWTF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2016! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2016%3A-Getting-started GSoC 2016 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
* 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
* 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211768</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211768"/>
				<updated>2016-03-25T03:50:01Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* OWASP OWTF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2016! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2016%3A-Getting-started GSoC 2016 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
Popularity:&lt;br /&gt;
ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
** 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
** 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211698</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211698"/>
				<updated>2016-03-24T07:53:35Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2016! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2016%3A-Getting-started GSoC 2016 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
Popularity:&lt;br /&gt;
* ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
** 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
** 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* February 29th, 2016 - [https://summerofcode.withgoogle.com/organizations/ OWASP is selected for GSoC 2016 - OWTF is participating!] &lt;br /&gt;
&lt;br /&gt;
* July 10th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015_Progress_Reports#tab=Main OWTF got 3 slots in the OWASP Summer Code Sprint 2015!]&lt;br /&gt;
&lt;br /&gt;
* June 19th, 2015 - [https://www.owasp.org/index.php/Summer_Code_Sprint2015 OWTF is taking part in the OWASP Summer Code Sprint 2015]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [http://blog.7-a.org/search?updated-max=2014-10-10T11:30:00%2B01:00&amp;amp;max-results=8 OWTF is taking part in the OWASP Winter Code Sprint!]&lt;br /&gt;
&lt;br /&gt;
* October 15, 2014 - [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot; released! - Fixed a major installation bug caused due to wrong handling of requirements by pip]&lt;br /&gt;
&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211696</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211696"/>
				<updated>2016-03-24T07:10:33Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* OWASP OWTF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2016! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2016%3A-Getting-started GSoC 2016 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
Popularity:&lt;br /&gt;
* ToolsWatch Annual Best Free/Open Source Security Tool Survey:&lt;br /&gt;
** 2015 [http://www.toolswatch.org/2016/02/2015-top-security-tools-as-voted-by-toolswatch-org-readers/ 10th]&lt;br /&gt;
** 2014 [http://www.toolswatch.org/2015/01/2014-top-security-tools-as-voted-by-toolswatch-org-readers/ 7th]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211695</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211695"/>
				<updated>2016-03-24T07:07:43Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* OWASP OWTF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2016! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2016%3A-Getting-started GSoC 2016 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211694</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211694"/>
				<updated>2016-03-24T07:06:40Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: /* OWASP OWTF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
====OWTF is taking part in the Google Summer of Code 2016! If you'd like to participate then see the [https://github.com/owtf/owtf/wiki/Google-Summer-of-Code-2016%3A-Getting-started GSoC 2016 wiki page]!====&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211693</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211693"/>
				<updated>2016-03-24T07:04:33Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP Offensive Web Testing Framework is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211692</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211692"/>
				<updated>2016-03-24T07:02:48Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|right]]&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211691</id>
		<title>OWASP OWTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_OWTF&amp;diff=211691"/>
				<updated>2016-03-24T06:59:36Z</updated>
		
		<summary type="html">&lt;p&gt;Delta24: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
[[Image:OWTFLogo.png|center]]&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
OWTF aims to make pen testing:&lt;br /&gt;
&lt;br /&gt;
* Aligned with OWASP Testing Guide + PTES + NIST&lt;br /&gt;
* More efficient&lt;br /&gt;
* More comprehensive&lt;br /&gt;
* More creative and fun (minimise un-creative work)&lt;br /&gt;
&lt;br /&gt;
so that pentesters will have more time to&lt;br /&gt;
&lt;br /&gt;
* See the big picture and think out of the box&lt;br /&gt;
* More efficiently find, verify and combine vulnerabilities&lt;br /&gt;
* Have time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessions&lt;br /&gt;
* Perform more tactical/targeted fuzzing on seemingly risky areas&lt;br /&gt;
* Demonstrate true impact despite the short timeframes we are typically given to test.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
You can see what OWASP OWTF is all about in the following video:{{#ev:youtube|H6Ut8U9a5KE}}&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF 1.0 &amp;quot;Lionheart&amp;quot; - Brucon 2014 5x5: {{#ev:youtube|j2UoAsOLMB4}}&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec EU 2013: Introducing OWASP OWTF 5x5: {{#ev:youtube|Vpca4-OlZqs}}&lt;br /&gt;
&lt;br /&gt;
For more videos please see the [http://www.youtube.com/user/owtfproject YouTube channel]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWTF? ==&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF is a project focused on penetration testing efficiency and alignment of security tests to security standards like: The OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST.&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io#download OWASP OWTF Installation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/owtf/owtf/releases OWASP OWTF Releases]&lt;br /&gt;
&lt;br /&gt;
The current version of OWASP OWTF is [https://github.com/owtf/owtf/releases/tag/v1.0.1 OWTF 1.0.1 &amp;quot;Lionheart&amp;quot;].&lt;br /&gt;
&lt;br /&gt;
[http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://owtf.github.io/online-passive-scanner/ Try some of the OWTF features from your browser!]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Release OWASP OWTF Release blog posts]&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWASP OWTF Talk blog posts]&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf OWASP OWTF Mailing List]&lt;br /&gt;
&lt;br /&gt;
[http://webchat.freenode.net/?channels=owtf OWASP OWTF IRC Channel: #owtf on Freenode]&lt;br /&gt;
&lt;br /&gt;
==Presentation==&lt;br /&gt;
&lt;br /&gt;
The following links provide access to materials for OWTF talks (video, slides, etc.):&lt;br /&gt;
&lt;br /&gt;
[http://blog.7-a.org/search/label/OWTF%20Talks OWTF Talks at 7-a.org]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren]&lt;br /&gt;
* [mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Openhub ==&lt;br /&gt;
&lt;br /&gt;
https://www.openhub.net/p/owasp-owtf&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [https://owtf.github.io/#download Download now]&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_owtf Sign Up]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* October 5th 2014 - [http://blog.7-a.org/2014/10/owtf-10-lionheart-released.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
* September 26th 2014 - [http://blog.7-a.org/2014/09/owtf-10-lionheart-to-be-presented-brucon.html OWTF 1.0 &amp;quot;Lionheart&amp;quot; presented at Brucon!]&lt;br /&gt;
&lt;br /&gt;
* September 4th 2014 - [http://blog.7-a.org/2014/09/get-credits-help-owasp-meet-owasp.html - OWTF participating in OWASP Winter Code Sprint]&lt;br /&gt;
&lt;br /&gt;
* January 13th 2014 - [http://blog.7-a.org/2014/01/owtf-0450-winter-blizzard-released-plz.html OWTF 0.45.0 &amp;quot;Winter Blizzard&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*December 11th 2013 - [http://blog.7-a.org/2013/12/owasp-owtf-cfp-funds-contest-winners.html OWASP OWTF CFP funds contest WINNERS announced]&lt;br /&gt;
&lt;br /&gt;
*September 8th 2013 - [http://blog.7-a.org/2013/09/owasp-owtf-cfp-funds-contest.html OWASP OWTF CFP funds contest open!]&lt;br /&gt;
&lt;br /&gt;
*August 22nd-23rd 2013 - [https://appsec.eu/program/talk-teaser/ Introducing OWASP OWTF 5x5 @ OWASP AppSec EU]&lt;br /&gt;
&lt;br /&gt;
*August 9th 2013 - [http://blog.7-a.org/2013/08/owtf-030-summer-storm-ii-released-plz-rt.html OWTF 0.30 &amp;quot;Summer Storm II&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*July 1st 2013 - [http://blog.7-a.org/2013/07/owtf-020-summer-storm-i-released-plz-rt.html OWTF 0.20 &amp;quot;Summer Storm I&amp;quot; released!]&lt;br /&gt;
&lt;br /&gt;
*June 12th 2013 - [http://blog.7-a.org/2013/06/owasp-owtf-gsoc-selection-stats-and-poll.html OWASP OWTF GSoC Selection, Stats and Poll]&lt;br /&gt;
&lt;br /&gt;
*May 24th 2013 - [http://blog.7-a.org/2013/05/owasp-owtf-016-shady-citizen-released.html OWASP OWTF 0.16 &amp;quot;shady citizen&amp;quot; released, now working smoothly in Kali!]&lt;br /&gt;
&lt;br /&gt;
*April 22nd - May 3rd 2013 - [https://www.owasp.org/index.php/GSoC2013_Ideas Call for Student Proposals: OWASP OWTF will be part of the Google Summer of Code 2013]&lt;br /&gt;
&lt;br /&gt;
*April 24th 2013 - [http://www.securitybsides.org.uk/track_one.html Pentesting like a Grandmaster with OWASP OWTF to be presented at BSides London 2013]&lt;br /&gt;
&lt;br /&gt;
*February 26th 2013 - [http://blog.brucon.org/2013/02/the-5by5-race-is-on.html OWASP OWTF selected to be supported by Brucon 5x5]&lt;br /&gt;
&lt;br /&gt;
*September 26th 2012 - [http://2012.brucon.org/index.php/Schedule OWASP OWTF Workshop at Brucon]&lt;br /&gt;
&lt;br /&gt;
*September 24th 2012 - [http://blog.7-a.org/2012/09/owasp-owtf-015-brucon-released.html OWASP OWTF 0.15 BruCon released!]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Flagship projects.jpg|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
OWTF documentation is hosted in the following resources:&lt;br /&gt;
* [https://owtf.github.io/ Getting started]&lt;br /&gt;
* [https://owtf.github.io/#download Downloading &amp;amp; Installation]&lt;br /&gt;
* [http://docs.owtf.org OWASP OWTF Documentation]&lt;br /&gt;
* [https://www.youtube.com/user/owtfproject/playlists OWTF Playlists with Demos/Talks on Youtube]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Join us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [http://www.slideshare.net/abrahamaranguren/presentations Some OWTF presentation slides]&lt;br /&gt;
* [http://blog.7-a.org/search/label/OWTF%20Talks More OWTF Talk links]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
OWTF is developed by a worldwide [https://github.com/7a/owtf/blob/master/AUTHORS team] of volunteers.&lt;br /&gt;
&lt;br /&gt;
But we have also been helped by many organizations, either financially or through other means:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org OWASP]&lt;br /&gt;
* [http://www.elearnsecurity.com/ eLearnSecurity]&lt;br /&gt;
* [http://www.google-melange.com/ Google]&lt;br /&gt;
* [http://brucon.org BruCon]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
OWTF attempts to solve the &amp;quot;penetration testers are never given enough time to test properly&amp;quot; problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:&lt;br /&gt;
* To improve security testing efficiency (i.e. test more in less time)&lt;br /&gt;
* To improve security testing coverage (i.e. test more)&lt;br /&gt;
* Gradually integrate the best tools&lt;br /&gt;
* Unite the best tools and make them work together with the security tester&lt;br /&gt;
* Remove or Reduce the need to babysit security tools during security assessments&lt;br /&gt;
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.&lt;br /&gt;
* Help penetration testers save time on report writing&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of OWTF is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* [https://github.com/owtf/owtf/pulls Send us a pull request]&lt;br /&gt;
* [https://github.com/owtf/owtf/issues Give us feedback / suggestions / report bugs]&lt;br /&gt;
* [http://webchat.freenode.net/?randomnick=1&amp;amp;channels=%23owtf&amp;amp;prompt=1&amp;amp;uio=MTE9MjM20f Talk to us on IRC (#owtf on Freenode)]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf_developers Join our OWTF developers mailing list]&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/owasp_owtf Join the general OWTF mailing list]&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_OWTF}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Delta24</name></author>	</entry>

	</feed>