<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dhruv+Jain</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dhruv+Jain"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Dhruv_Jain"/>
		<updated>2026-05-01T21:08:30Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_HA_Vulnerability_Scanner_Project&amp;diff=158056</id>
		<title>OWASP HA Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_HA_Vulnerability_Scanner_Project&amp;diff=158056"/>
				<updated>2013-09-08T08:59:45Z</updated>
		
		<summary type="html">&lt;p&gt;Dhruv Jain: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
'''If you wish to be a part of this Project Team , contact Project Leader'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Spider Module Completed.Added Random time interval between requests and proxy.&lt;br /&gt;
--[[User:Dhruv Jain|Dhruv Jain]] ([[User talk:Dhruv Jain|talk]]) 03:59, 8 September 2013 (CDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''EXPECTED FEATURES:'''&lt;br /&gt;
&lt;br /&gt;
''Note: Some of these features maybe scraped off depending on the feasibility of application''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Spider Module'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Custom Design Errors'''&lt;br /&gt;
&lt;br /&gt;
Cross-site Script Injection Module&lt;br /&gt;
&lt;br /&gt;
Database Tampering – SQL Injection Module, including:&lt;br /&gt;
&lt;br /&gt;
- Direct mode&lt;br /&gt;
&lt;br /&gt;
- Blind mode&lt;br /&gt;
&lt;br /&gt;
Buffer &amp;amp; Integer Overflow attack Module&lt;br /&gt;
&lt;br /&gt;
Format String attack Module&lt;br /&gt;
&lt;br /&gt;
File &amp;amp; Directories Tampering Module, including:&lt;br /&gt;
&lt;br /&gt;
- Backup Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Configuration Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Password Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Information Leakage Discovery&lt;br /&gt;
&lt;br /&gt;
Parameter Tampering Module, including:&lt;br /&gt;
&lt;br /&gt;
- Special Parameter Addition attacks&lt;br /&gt;
&lt;br /&gt;
- Boolean Parameter Tampering attacks&lt;br /&gt;
&lt;br /&gt;
- Hidden Parameter Discovery&lt;br /&gt;
&lt;br /&gt;
- Parameter Deletion attacks&lt;br /&gt;
&lt;br /&gt;
- Remote Execution attacks&lt;br /&gt;
&lt;br /&gt;
- File &amp;amp; Directory traversal attacks&lt;br /&gt;
&lt;br /&gt;
- Header Splitting &amp;amp; CRLF Injection attacks&lt;br /&gt;
&lt;br /&gt;
- Remote File Include PHP-based attacks&lt;br /&gt;
&lt;br /&gt;
Check for Suspicious Values in Web Form Hidden Fields&lt;br /&gt;
&lt;br /&gt;
Custom Signature Check (via Signature Editor)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Server Exposure'''&lt;br /&gt;
&lt;br /&gt;
Web Server structure Analysis Module, including:&lt;br /&gt;
&lt;br /&gt;
- Web Server &amp;amp; Platform version vulnerabilities&lt;br /&gt;
&lt;br /&gt;
- SSL encryption and X.509 certificate vulnerabilities&lt;br /&gt;
&lt;br /&gt;
- HTTP Method Discovery Module&lt;br /&gt;
&lt;br /&gt;
- HTTP Fingerprint Module, including:&lt;br /&gt;
&lt;br /&gt;
- Web Server Fingerprint Module&lt;br /&gt;
&lt;br /&gt;
- Web Server technology Discovery Module&lt;br /&gt;
&lt;br /&gt;
- Directory Brute-Force&lt;br /&gt;
&lt;br /&gt;
- HTTP Protocol vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Signature Attacks'''&lt;br /&gt;
&lt;br /&gt;
Web Attack Signatures Module, including:&lt;br /&gt;
&lt;br /&gt;
- IIS CGI Decode Test&lt;br /&gt;
&lt;br /&gt;
- IIS Extended Unicode Test&lt;br /&gt;
&lt;br /&gt;
- IIS File Parsing Test&lt;br /&gt;
&lt;br /&gt;
- FrontPage Security Test&lt;br /&gt;
&lt;br /&gt;
- Lotus Domino Security Test&lt;br /&gt;
&lt;br /&gt;
- General CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- HTTP Devices Security Test (routers, switches)&lt;br /&gt;
&lt;br /&gt;
- Windows-based CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- Windows-based CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- PHP Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- ASP Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- J2EE Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- Coldfusion Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
Attack templates such as:&lt;br /&gt;
&lt;br /&gt;
- Complete, SANS/FBI Top10, Top20&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Confidentiality Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Look for Web forms vulnerabilities, including:&lt;br /&gt;
&lt;br /&gt;
- Password cache feature&lt;br /&gt;
&lt;br /&gt;
- Insecure method for sending data&lt;br /&gt;
&lt;br /&gt;
- Lack of Encryption for sensitive data&lt;br /&gt;
&lt;br /&gt;
- Insecure location to send data (leakage)&lt;br /&gt;
&lt;br /&gt;
- Find directory listing&lt;br /&gt;
&lt;br /&gt;
- Find available objects to download&lt;br /&gt;
&lt;br /&gt;
- Find meta-tag leakage&lt;br /&gt;
&lt;br /&gt;
- Find sensitive keywords in comments and scripts&lt;br /&gt;
&lt;br /&gt;
Compliance analysis, including:&lt;br /&gt;
&lt;br /&gt;
- Find Copyright statements&lt;br /&gt;
&lt;br /&gt;
- Find content rating statements&lt;br /&gt;
&lt;br /&gt;
- Find custom content on web pages and forms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Cookie Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Cookie Security Analysis Module, including:&lt;br /&gt;
&lt;br /&gt;
- Find weakness in cookie information&lt;br /&gt;
&lt;br /&gt;
- Find cookies sent without encryption&lt;br /&gt;
&lt;br /&gt;
- Find information leakage in cookie information&lt;br /&gt;
&lt;br /&gt;
- Find cookies vulnerable to malicious client-side script&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»File &amp;amp; Directory Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Search for backup files&lt;br /&gt;
&lt;br /&gt;
Search for information leakage files&lt;br /&gt;
&lt;br /&gt;
Search for configuration files&lt;br /&gt;
&lt;br /&gt;
Search for password files &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Dhruv Jain|Dhruv Jain]] ([[User talk:Dhruv Jain|talk]]) 19:45, 17 August 2013 (CDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_HA_Vulnerability_Scanner_Project}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Dhruv Jain</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_HA_Vulnerability_Scanner_Project&amp;diff=156959</id>
		<title>OWASP HA Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_HA_Vulnerability_Scanner_Project&amp;diff=156959"/>
				<updated>2013-08-18T04:25:45Z</updated>
		
		<summary type="html">&lt;p&gt;Dhruv Jain: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
'''If you wish to be a part of this Project Team , contact Project Leader'''&lt;br /&gt;
&lt;br /&gt;
1.8.2013 --&amp;gt; Spider nearly completed&lt;br /&gt;
&lt;br /&gt;
18.8.2013 --&amp;gt; Initial Design Ready.Check it out here - &lt;br /&gt;
&lt;br /&gt;
http://i.imgur.com/y4HUNLi.png&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''EXPECTED FEATURES:'''&lt;br /&gt;
&lt;br /&gt;
''Note: Some of these features maybe scraped off depending on the feasibility of application''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Spider Module'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Custom Design Errors'''&lt;br /&gt;
&lt;br /&gt;
Cross-site Script Injection Module&lt;br /&gt;
&lt;br /&gt;
Database Tampering – SQL Injection Module, including:&lt;br /&gt;
&lt;br /&gt;
- Direct mode&lt;br /&gt;
&lt;br /&gt;
- Blind mode&lt;br /&gt;
&lt;br /&gt;
Buffer &amp;amp; Integer Overflow attack Module&lt;br /&gt;
&lt;br /&gt;
Format String attack Module&lt;br /&gt;
&lt;br /&gt;
File &amp;amp; Directories Tampering Module, including:&lt;br /&gt;
&lt;br /&gt;
- Backup Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Configuration Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Password Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Information Leakage Discovery&lt;br /&gt;
&lt;br /&gt;
Parameter Tampering Module, including:&lt;br /&gt;
&lt;br /&gt;
- Special Parameter Addition attacks&lt;br /&gt;
&lt;br /&gt;
- Boolean Parameter Tampering attacks&lt;br /&gt;
&lt;br /&gt;
- Hidden Parameter Discovery&lt;br /&gt;
&lt;br /&gt;
- Parameter Deletion attacks&lt;br /&gt;
&lt;br /&gt;
- Remote Execution attacks&lt;br /&gt;
&lt;br /&gt;
- File &amp;amp; Directory traversal attacks&lt;br /&gt;
&lt;br /&gt;
- Header Splitting &amp;amp; CRLF Injection attacks&lt;br /&gt;
&lt;br /&gt;
- Remote File Include PHP-based attacks&lt;br /&gt;
&lt;br /&gt;
Check for Suspicious Values in Web Form Hidden Fields&lt;br /&gt;
&lt;br /&gt;
Custom Signature Check (via Signature Editor)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Server Exposure'''&lt;br /&gt;
&lt;br /&gt;
Web Server structure Analysis Module, including:&lt;br /&gt;
&lt;br /&gt;
- Web Server &amp;amp; Platform version vulnerabilities&lt;br /&gt;
&lt;br /&gt;
- SSL encryption and X.509 certificate vulnerabilities&lt;br /&gt;
&lt;br /&gt;
- HTTP Method Discovery Module&lt;br /&gt;
&lt;br /&gt;
- HTTP Fingerprint Module, including:&lt;br /&gt;
&lt;br /&gt;
- Web Server Fingerprint Module&lt;br /&gt;
&lt;br /&gt;
- Web Server technology Discovery Module&lt;br /&gt;
&lt;br /&gt;
- Directory Brute-Force&lt;br /&gt;
&lt;br /&gt;
- HTTP Protocol vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Signature Attacks'''&lt;br /&gt;
&lt;br /&gt;
Web Attack Signatures Module, including:&lt;br /&gt;
&lt;br /&gt;
- IIS CGI Decode Test&lt;br /&gt;
&lt;br /&gt;
- IIS Extended Unicode Test&lt;br /&gt;
&lt;br /&gt;
- IIS File Parsing Test&lt;br /&gt;
&lt;br /&gt;
- FrontPage Security Test&lt;br /&gt;
&lt;br /&gt;
- Lotus Domino Security Test&lt;br /&gt;
&lt;br /&gt;
- General CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- HTTP Devices Security Test (routers, switches)&lt;br /&gt;
&lt;br /&gt;
- Windows-based CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- Windows-based CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- PHP Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- ASP Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- J2EE Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- Coldfusion Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
Attack templates such as:&lt;br /&gt;
&lt;br /&gt;
- Complete, SANS/FBI Top10, Top20&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Confidentiality Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Look for Web forms vulnerabilities, including:&lt;br /&gt;
&lt;br /&gt;
- Password cache feature&lt;br /&gt;
&lt;br /&gt;
- Insecure method for sending data&lt;br /&gt;
&lt;br /&gt;
- Lack of Encryption for sensitive data&lt;br /&gt;
&lt;br /&gt;
- Insecure location to send data (leakage)&lt;br /&gt;
&lt;br /&gt;
- Find directory listing&lt;br /&gt;
&lt;br /&gt;
- Find available objects to download&lt;br /&gt;
&lt;br /&gt;
- Find meta-tag leakage&lt;br /&gt;
&lt;br /&gt;
- Find sensitive keywords in comments and scripts&lt;br /&gt;
&lt;br /&gt;
Compliance analysis, including:&lt;br /&gt;
&lt;br /&gt;
- Find Copyright statements&lt;br /&gt;
&lt;br /&gt;
- Find content rating statements&lt;br /&gt;
&lt;br /&gt;
- Find custom content on web pages and forms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Cookie Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Cookie Security Analysis Module, including:&lt;br /&gt;
&lt;br /&gt;
- Find weakness in cookie information&lt;br /&gt;
&lt;br /&gt;
- Find cookies sent without encryption&lt;br /&gt;
&lt;br /&gt;
- Find information leakage in cookie information&lt;br /&gt;
&lt;br /&gt;
- Find cookies vulnerable to malicious client-side script&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»File &amp;amp; Directory Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Search for backup files&lt;br /&gt;
&lt;br /&gt;
Search for information leakage files&lt;br /&gt;
&lt;br /&gt;
Search for configuration files&lt;br /&gt;
&lt;br /&gt;
Search for password files &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Dhruv Jain|Dhruv Jain]] ([[User talk:Dhruv Jain|talk]]) 19:45, 17 August 2013 (CDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_HA_Vulnerability_Scanner_Project}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Dhruv Jain</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_HA_Vulnerability_Scanner_Project&amp;diff=156955</id>
		<title>OWASP HA Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_HA_Vulnerability_Scanner_Project&amp;diff=156955"/>
				<updated>2013-08-18T00:45:58Z</updated>
		
		<summary type="html">&lt;p&gt;Dhruv Jain: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
Project has been started.Developed scan initiator.&lt;br /&gt;
&lt;br /&gt;
1.8.2013 --&amp;gt; Spider nearly completed&lt;br /&gt;
&lt;br /&gt;
18.8.2013 --&amp;gt; Initial Design Ready.Check it out here - &lt;br /&gt;
&lt;br /&gt;
http://i.imgur.com/y4HUNLi.png&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''EXPECTED FEATURES:'''&lt;br /&gt;
&lt;br /&gt;
''Note: Some of these features maybe scraped off depending on the feasibility of application''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Spider Module'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Custom Design Errors'''&lt;br /&gt;
&lt;br /&gt;
Cross-site Script Injection Module&lt;br /&gt;
&lt;br /&gt;
Database Tampering – SQL Injection Module, including:&lt;br /&gt;
&lt;br /&gt;
- Direct mode&lt;br /&gt;
&lt;br /&gt;
- Blind mode&lt;br /&gt;
&lt;br /&gt;
Buffer &amp;amp; Integer Overflow attack Module&lt;br /&gt;
&lt;br /&gt;
Format String attack Module&lt;br /&gt;
&lt;br /&gt;
File &amp;amp; Directories Tampering Module, including:&lt;br /&gt;
&lt;br /&gt;
- Backup Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Configuration Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Password Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Information Leakage Discovery&lt;br /&gt;
&lt;br /&gt;
Parameter Tampering Module, including:&lt;br /&gt;
&lt;br /&gt;
- Special Parameter Addition attacks&lt;br /&gt;
&lt;br /&gt;
- Boolean Parameter Tampering attacks&lt;br /&gt;
&lt;br /&gt;
- Hidden Parameter Discovery&lt;br /&gt;
&lt;br /&gt;
- Parameter Deletion attacks&lt;br /&gt;
&lt;br /&gt;
- Remote Execution attacks&lt;br /&gt;
&lt;br /&gt;
- File &amp;amp; Directory traversal attacks&lt;br /&gt;
&lt;br /&gt;
- Header Splitting &amp;amp; CRLF Injection attacks&lt;br /&gt;
&lt;br /&gt;
- Remote File Include PHP-based attacks&lt;br /&gt;
&lt;br /&gt;
Check for Suspicious Values in Web Form Hidden Fields&lt;br /&gt;
&lt;br /&gt;
Custom Signature Check (via Signature Editor)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Server Exposure'''&lt;br /&gt;
&lt;br /&gt;
Web Server structure Analysis Module, including:&lt;br /&gt;
&lt;br /&gt;
- Web Server &amp;amp; Platform version vulnerabilities&lt;br /&gt;
&lt;br /&gt;
- SSL encryption and X.509 certificate vulnerabilities&lt;br /&gt;
&lt;br /&gt;
- HTTP Method Discovery Module&lt;br /&gt;
&lt;br /&gt;
- HTTP Fingerprint Module, including:&lt;br /&gt;
&lt;br /&gt;
- Web Server Fingerprint Module&lt;br /&gt;
&lt;br /&gt;
- Web Server technology Discovery Module&lt;br /&gt;
&lt;br /&gt;
- Directory Brute-Force&lt;br /&gt;
&lt;br /&gt;
- HTTP Protocol vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Signature Attacks'''&lt;br /&gt;
&lt;br /&gt;
Web Attack Signatures Module, including:&lt;br /&gt;
&lt;br /&gt;
- IIS CGI Decode Test&lt;br /&gt;
&lt;br /&gt;
- IIS Extended Unicode Test&lt;br /&gt;
&lt;br /&gt;
- IIS File Parsing Test&lt;br /&gt;
&lt;br /&gt;
- FrontPage Security Test&lt;br /&gt;
&lt;br /&gt;
- Lotus Domino Security Test&lt;br /&gt;
&lt;br /&gt;
- General CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- HTTP Devices Security Test (routers, switches)&lt;br /&gt;
&lt;br /&gt;
- Windows-based CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- Windows-based CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- PHP Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- ASP Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- J2EE Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- Coldfusion Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
Attack templates such as:&lt;br /&gt;
&lt;br /&gt;
- Complete, SANS/FBI Top10, Top20&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Confidentiality Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Look for Web forms vulnerabilities, including:&lt;br /&gt;
&lt;br /&gt;
- Password cache feature&lt;br /&gt;
&lt;br /&gt;
- Insecure method for sending data&lt;br /&gt;
&lt;br /&gt;
- Lack of Encryption for sensitive data&lt;br /&gt;
&lt;br /&gt;
- Insecure location to send data (leakage)&lt;br /&gt;
&lt;br /&gt;
- Find directory listing&lt;br /&gt;
&lt;br /&gt;
- Find available objects to download&lt;br /&gt;
&lt;br /&gt;
- Find meta-tag leakage&lt;br /&gt;
&lt;br /&gt;
- Find sensitive keywords in comments and scripts&lt;br /&gt;
&lt;br /&gt;
Compliance analysis, including:&lt;br /&gt;
&lt;br /&gt;
- Find Copyright statements&lt;br /&gt;
&lt;br /&gt;
- Find content rating statements&lt;br /&gt;
&lt;br /&gt;
- Find custom content on web pages and forms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Cookie Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Cookie Security Analysis Module, including:&lt;br /&gt;
&lt;br /&gt;
- Find weakness in cookie information&lt;br /&gt;
&lt;br /&gt;
- Find cookies sent without encryption&lt;br /&gt;
&lt;br /&gt;
- Find information leakage in cookie information&lt;br /&gt;
&lt;br /&gt;
- Find cookies vulnerable to malicious client-side script&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»File &amp;amp; Directory Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Search for backup files&lt;br /&gt;
&lt;br /&gt;
Search for information leakage files&lt;br /&gt;
&lt;br /&gt;
Search for configuration files&lt;br /&gt;
&lt;br /&gt;
Search for password files &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Dhruv Jain|Dhruv Jain]] ([[User talk:Dhruv Jain|talk]]) 19:45, 17 August 2013 (CDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_HA_Vulnerability_Scanner_Project}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Dhruv Jain</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_HA_Vulnerability_Scanner_Project&amp;diff=156954</id>
		<title>OWASP HA Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_HA_Vulnerability_Scanner_Project&amp;diff=156954"/>
				<updated>2013-08-18T00:45:20Z</updated>
		
		<summary type="html">&lt;p&gt;Dhruv Jain: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
Project has been started.Developed scan initiator.&lt;br /&gt;
&lt;br /&gt;
1.8.2013 --&amp;gt; Spider nearly completed&lt;br /&gt;
18.8.2013 --&amp;gt; Initial Design Ready.Check it out here - http://i.imgur.com/y4HUNLi.png&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''EXPECTED FEATURES:'''&lt;br /&gt;
&lt;br /&gt;
''Note: Some of these features maybe scraped off depending on the feasibility of application''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Spider Module'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Custom Design Errors'''&lt;br /&gt;
&lt;br /&gt;
Cross-site Script Injection Module&lt;br /&gt;
&lt;br /&gt;
Database Tampering – SQL Injection Module, including:&lt;br /&gt;
&lt;br /&gt;
- Direct mode&lt;br /&gt;
&lt;br /&gt;
- Blind mode&lt;br /&gt;
&lt;br /&gt;
Buffer &amp;amp; Integer Overflow attack Module&lt;br /&gt;
&lt;br /&gt;
Format String attack Module&lt;br /&gt;
&lt;br /&gt;
File &amp;amp; Directories Tampering Module, including:&lt;br /&gt;
&lt;br /&gt;
- Backup Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Configuration Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Password Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Information Leakage Discovery&lt;br /&gt;
&lt;br /&gt;
Parameter Tampering Module, including:&lt;br /&gt;
&lt;br /&gt;
- Special Parameter Addition attacks&lt;br /&gt;
&lt;br /&gt;
- Boolean Parameter Tampering attacks&lt;br /&gt;
&lt;br /&gt;
- Hidden Parameter Discovery&lt;br /&gt;
&lt;br /&gt;
- Parameter Deletion attacks&lt;br /&gt;
&lt;br /&gt;
- Remote Execution attacks&lt;br /&gt;
&lt;br /&gt;
- File &amp;amp; Directory traversal attacks&lt;br /&gt;
&lt;br /&gt;
- Header Splitting &amp;amp; CRLF Injection attacks&lt;br /&gt;
&lt;br /&gt;
- Remote File Include PHP-based attacks&lt;br /&gt;
&lt;br /&gt;
Check for Suspicious Values in Web Form Hidden Fields&lt;br /&gt;
&lt;br /&gt;
Custom Signature Check (via Signature Editor)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Server Exposure'''&lt;br /&gt;
&lt;br /&gt;
Web Server structure Analysis Module, including:&lt;br /&gt;
&lt;br /&gt;
- Web Server &amp;amp; Platform version vulnerabilities&lt;br /&gt;
&lt;br /&gt;
- SSL encryption and X.509 certificate vulnerabilities&lt;br /&gt;
&lt;br /&gt;
- HTTP Method Discovery Module&lt;br /&gt;
&lt;br /&gt;
- HTTP Fingerprint Module, including:&lt;br /&gt;
&lt;br /&gt;
- Web Server Fingerprint Module&lt;br /&gt;
&lt;br /&gt;
- Web Server technology Discovery Module&lt;br /&gt;
&lt;br /&gt;
- Directory Brute-Force&lt;br /&gt;
&lt;br /&gt;
- HTTP Protocol vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Signature Attacks'''&lt;br /&gt;
&lt;br /&gt;
Web Attack Signatures Module, including:&lt;br /&gt;
&lt;br /&gt;
- IIS CGI Decode Test&lt;br /&gt;
&lt;br /&gt;
- IIS Extended Unicode Test&lt;br /&gt;
&lt;br /&gt;
- IIS File Parsing Test&lt;br /&gt;
&lt;br /&gt;
- FrontPage Security Test&lt;br /&gt;
&lt;br /&gt;
- Lotus Domino Security Test&lt;br /&gt;
&lt;br /&gt;
- General CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- HTTP Devices Security Test (routers, switches)&lt;br /&gt;
&lt;br /&gt;
- Windows-based CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- Windows-based CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- PHP Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- ASP Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- J2EE Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- Coldfusion Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
Attack templates such as:&lt;br /&gt;
&lt;br /&gt;
- Complete, SANS/FBI Top10, Top20&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Confidentiality Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Look for Web forms vulnerabilities, including:&lt;br /&gt;
&lt;br /&gt;
- Password cache feature&lt;br /&gt;
&lt;br /&gt;
- Insecure method for sending data&lt;br /&gt;
&lt;br /&gt;
- Lack of Encryption for sensitive data&lt;br /&gt;
&lt;br /&gt;
- Insecure location to send data (leakage)&lt;br /&gt;
&lt;br /&gt;
- Find directory listing&lt;br /&gt;
&lt;br /&gt;
- Find available objects to download&lt;br /&gt;
&lt;br /&gt;
- Find meta-tag leakage&lt;br /&gt;
&lt;br /&gt;
- Find sensitive keywords in comments and scripts&lt;br /&gt;
&lt;br /&gt;
Compliance analysis, including:&lt;br /&gt;
&lt;br /&gt;
- Find Copyright statements&lt;br /&gt;
&lt;br /&gt;
- Find content rating statements&lt;br /&gt;
&lt;br /&gt;
- Find custom content on web pages and forms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Cookie Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Cookie Security Analysis Module, including:&lt;br /&gt;
&lt;br /&gt;
- Find weakness in cookie information&lt;br /&gt;
&lt;br /&gt;
- Find cookies sent without encryption&lt;br /&gt;
&lt;br /&gt;
- Find information leakage in cookie information&lt;br /&gt;
&lt;br /&gt;
- Find cookies vulnerable to malicious client-side script&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»File &amp;amp; Directory Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Search for backup files&lt;br /&gt;
&lt;br /&gt;
Search for information leakage files&lt;br /&gt;
&lt;br /&gt;
Search for configuration files&lt;br /&gt;
&lt;br /&gt;
Search for password files &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Dhruv Jain|Dhruv Jain]] ([[User talk:Dhruv Jain|talk]]) 19:45, 17 August 2013 (CDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_HA_Vulnerability_Scanner_Project}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Dhruv Jain</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_HA_Vulnerability_Scanner_Project&amp;diff=156322</id>
		<title>OWASP HA Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_HA_Vulnerability_Scanner_Project&amp;diff=156322"/>
				<updated>2013-08-01T12:42:01Z</updated>
		
		<summary type="html">&lt;p&gt;Dhruv Jain: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
Project has been started.Developed scan initiator.&lt;br /&gt;
&lt;br /&gt;
1.8.2013 --&amp;gt; Spider nearly completed&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''EXPECTED FEATURES:'''&lt;br /&gt;
&lt;br /&gt;
''Note: Some of these features maybe scraped off depending on the feasibility of application''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Spider Module'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Custom Design Errors'''&lt;br /&gt;
&lt;br /&gt;
Cross-site Script Injection Module&lt;br /&gt;
&lt;br /&gt;
Database Tampering – SQL Injection Module, including:&lt;br /&gt;
&lt;br /&gt;
- Direct mode&lt;br /&gt;
&lt;br /&gt;
- Blind mode&lt;br /&gt;
&lt;br /&gt;
Buffer &amp;amp; Integer Overflow attack Module&lt;br /&gt;
&lt;br /&gt;
Format String attack Module&lt;br /&gt;
&lt;br /&gt;
File &amp;amp; Directories Tampering Module, including:&lt;br /&gt;
&lt;br /&gt;
- Backup Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Configuration Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Password Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Information Leakage Discovery&lt;br /&gt;
&lt;br /&gt;
Parameter Tampering Module, including:&lt;br /&gt;
&lt;br /&gt;
- Special Parameter Addition attacks&lt;br /&gt;
&lt;br /&gt;
- Boolean Parameter Tampering attacks&lt;br /&gt;
&lt;br /&gt;
- Hidden Parameter Discovery&lt;br /&gt;
&lt;br /&gt;
- Parameter Deletion attacks&lt;br /&gt;
&lt;br /&gt;
- Remote Execution attacks&lt;br /&gt;
&lt;br /&gt;
- File &amp;amp; Directory traversal attacks&lt;br /&gt;
&lt;br /&gt;
- Header Splitting &amp;amp; CRLF Injection attacks&lt;br /&gt;
&lt;br /&gt;
- Remote File Include PHP-based attacks&lt;br /&gt;
&lt;br /&gt;
Check for Suspicious Values in Web Form Hidden Fields&lt;br /&gt;
&lt;br /&gt;
Custom Signature Check (via Signature Editor)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Server Exposure'''&lt;br /&gt;
&lt;br /&gt;
Web Server structure Analysis Module, including:&lt;br /&gt;
&lt;br /&gt;
- Web Server &amp;amp; Platform version vulnerabilities&lt;br /&gt;
&lt;br /&gt;
- SSL encryption and X.509 certificate vulnerabilities&lt;br /&gt;
&lt;br /&gt;
- HTTP Method Discovery Module&lt;br /&gt;
&lt;br /&gt;
- HTTP Fingerprint Module, including:&lt;br /&gt;
&lt;br /&gt;
- Web Server Fingerprint Module&lt;br /&gt;
&lt;br /&gt;
- Web Server technology Discovery Module&lt;br /&gt;
&lt;br /&gt;
- Directory Brute-Force&lt;br /&gt;
&lt;br /&gt;
- HTTP Protocol vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Signature Attacks'''&lt;br /&gt;
&lt;br /&gt;
Web Attack Signatures Module, including:&lt;br /&gt;
&lt;br /&gt;
- IIS CGI Decode Test&lt;br /&gt;
&lt;br /&gt;
- IIS Extended Unicode Test&lt;br /&gt;
&lt;br /&gt;
- IIS File Parsing Test&lt;br /&gt;
&lt;br /&gt;
- FrontPage Security Test&lt;br /&gt;
&lt;br /&gt;
- Lotus Domino Security Test&lt;br /&gt;
&lt;br /&gt;
- General CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- HTTP Devices Security Test (routers, switches)&lt;br /&gt;
&lt;br /&gt;
- Windows-based CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- Windows-based CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- PHP Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- ASP Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- J2EE Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- Coldfusion Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
Attack templates such as:&lt;br /&gt;
&lt;br /&gt;
- Complete, SANS/FBI Top10, Top20&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Confidentiality Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Look for Web forms vulnerabilities, including:&lt;br /&gt;
&lt;br /&gt;
- Password cache feature&lt;br /&gt;
&lt;br /&gt;
- Insecure method for sending data&lt;br /&gt;
&lt;br /&gt;
- Lack of Encryption for sensitive data&lt;br /&gt;
&lt;br /&gt;
- Insecure location to send data (leakage)&lt;br /&gt;
&lt;br /&gt;
- Find directory listing&lt;br /&gt;
&lt;br /&gt;
- Find available objects to download&lt;br /&gt;
&lt;br /&gt;
- Find meta-tag leakage&lt;br /&gt;
&lt;br /&gt;
- Find sensitive keywords in comments and scripts&lt;br /&gt;
&lt;br /&gt;
Compliance analysis, including:&lt;br /&gt;
&lt;br /&gt;
- Find Copyright statements&lt;br /&gt;
&lt;br /&gt;
- Find content rating statements&lt;br /&gt;
&lt;br /&gt;
- Find custom content on web pages and forms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Cookie Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Cookie Security Analysis Module, including:&lt;br /&gt;
&lt;br /&gt;
- Find weakness in cookie information&lt;br /&gt;
&lt;br /&gt;
- Find cookies sent without encryption&lt;br /&gt;
&lt;br /&gt;
- Find information leakage in cookie information&lt;br /&gt;
&lt;br /&gt;
- Find cookies vulnerable to malicious client-side script&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»File &amp;amp; Directory Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Search for backup files&lt;br /&gt;
&lt;br /&gt;
Search for information leakage files&lt;br /&gt;
&lt;br /&gt;
Search for configuration files&lt;br /&gt;
&lt;br /&gt;
Search for password files &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Dhruv Jain|Dhruv Jain]] ([[User talk:Dhruv Jain|talk]]) 07:39, 1 August 2013 (CDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_HA_Vulnerability_Scanner_Project}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Dhruv Jain</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_HA_Vulnerability_Scanner_Project&amp;diff=156321</id>
		<title>OWASP HA Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_HA_Vulnerability_Scanner_Project&amp;diff=156321"/>
				<updated>2013-08-01T12:40:04Z</updated>
		
		<summary type="html">&lt;p&gt;Dhruv Jain: Added Decided Features&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
Project has been started.Developed scan initiator.&lt;br /&gt;
&lt;br /&gt;
1.8.2013 --&amp;gt; Spider nearly completed&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''EXPECTED FEATURES:'''&lt;br /&gt;
&lt;br /&gt;
''Note: Some of these features maybe scraped off depending on the feasibility of application''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Spider Module'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Custom Design Errors'''&lt;br /&gt;
&lt;br /&gt;
Cross-site Script Injection Module&lt;br /&gt;
&lt;br /&gt;
Database Tampering – SQL Injection Module, including:&lt;br /&gt;
&lt;br /&gt;
- Direct mode&lt;br /&gt;
&lt;br /&gt;
- Blind mode&lt;br /&gt;
&lt;br /&gt;
Buffer &amp;amp; Integer Overflow attack Module&lt;br /&gt;
&lt;br /&gt;
Format String attack Module&lt;br /&gt;
&lt;br /&gt;
File &amp;amp; Directories Tampering Module, including:&lt;br /&gt;
&lt;br /&gt;
- Backup Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Configuration Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Password Files Discovery&lt;br /&gt;
&lt;br /&gt;
- Information Leakage Discovery&lt;br /&gt;
&lt;br /&gt;
Parameter Tampering Module, including:&lt;br /&gt;
&lt;br /&gt;
- Special Parameter Addition attacks&lt;br /&gt;
&lt;br /&gt;
- Boolean Parameter Tampering attacks&lt;br /&gt;
&lt;br /&gt;
- Hidden Parameter Discovery&lt;br /&gt;
&lt;br /&gt;
- Parameter Deletion attacks&lt;br /&gt;
&lt;br /&gt;
- Remote Execution attacks&lt;br /&gt;
&lt;br /&gt;
- File &amp;amp; Directory traversal attacks&lt;br /&gt;
&lt;br /&gt;
- Header Splitting &amp;amp; CRLF Injection attacks&lt;br /&gt;
&lt;br /&gt;
- Remote File Include PHP-based attacks&lt;br /&gt;
&lt;br /&gt;
Check for Suspicious Values in Web Form Hidden Fields&lt;br /&gt;
&lt;br /&gt;
Custom Signature Check (via Signature Editor)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Server Exposure'''&lt;br /&gt;
&lt;br /&gt;
Web Server structure Analysis Module, including:&lt;br /&gt;
&lt;br /&gt;
- Web Server &amp;amp; Platform version vulnerabilities&lt;br /&gt;
&lt;br /&gt;
- SSL encryption and X.509 certificate vulnerabilities&lt;br /&gt;
&lt;br /&gt;
- HTTP Method Discovery Module&lt;br /&gt;
&lt;br /&gt;
- HTTP Fingerprint Module, including:&lt;br /&gt;
&lt;br /&gt;
- Web Server Fingerprint Module&lt;br /&gt;
&lt;br /&gt;
- Web Server technology Discovery Module&lt;br /&gt;
&lt;br /&gt;
- Directory Brute-Force&lt;br /&gt;
&lt;br /&gt;
- HTTP Protocol vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Web Signature Attacks'''&lt;br /&gt;
&lt;br /&gt;
Web Attack Signatures Module, including:&lt;br /&gt;
&lt;br /&gt;
- IIS CGI Decode Test&lt;br /&gt;
&lt;br /&gt;
- IIS Extended Unicode Test&lt;br /&gt;
&lt;br /&gt;
- IIS File Parsing Test&lt;br /&gt;
&lt;br /&gt;
- FrontPage Security Test&lt;br /&gt;
&lt;br /&gt;
- Lotus Domino Security Test&lt;br /&gt;
&lt;br /&gt;
- General CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- HTTP Devices Security Test (routers, switches)&lt;br /&gt;
&lt;br /&gt;
- Windows-based CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- Windows-based CGI Security Test&lt;br /&gt;
&lt;br /&gt;
- PHP Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- ASP Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- J2EE Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
- Coldfusion Web Application Security Test&lt;br /&gt;
&lt;br /&gt;
Attack templates such as:&lt;br /&gt;
&lt;br /&gt;
- Complete, SANS/FBI Top10, Top20&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Confidentiality Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Look for Web forms vulnerabilities, including:&lt;br /&gt;
&lt;br /&gt;
- Password cache feature&lt;br /&gt;
&lt;br /&gt;
- Insecure method for sending data&lt;br /&gt;
&lt;br /&gt;
- Lack of Encryption for sensitive data&lt;br /&gt;
&lt;br /&gt;
- Insecure location to send data (leakage)&lt;br /&gt;
&lt;br /&gt;
- Find directory listing&lt;br /&gt;
&lt;br /&gt;
- Find available objects to download&lt;br /&gt;
&lt;br /&gt;
- Find meta-tag leakage&lt;br /&gt;
&lt;br /&gt;
- Find sensitive keywords in comments and scripts&lt;br /&gt;
&lt;br /&gt;
Compliance analysis, including:&lt;br /&gt;
&lt;br /&gt;
- Find Copyright statements&lt;br /&gt;
&lt;br /&gt;
- Find content rating statements&lt;br /&gt;
&lt;br /&gt;
- Find custom content on web pages and forms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»Cookie Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Cookie Security Analysis Module, including:&lt;br /&gt;
- Find weakness in cookie information&lt;br /&gt;
- Find cookies sent without encryption&lt;br /&gt;
- Find information leakage in cookie information&lt;br /&gt;
- Find cookies vulnerable to malicious client-side script&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''»File &amp;amp; Directory Exposure Checks'''&lt;br /&gt;
&lt;br /&gt;
Search for backup files&lt;br /&gt;
&lt;br /&gt;
Search for information leakage files&lt;br /&gt;
&lt;br /&gt;
Search for configuration files&lt;br /&gt;
&lt;br /&gt;
Search for password files &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Dhruv Jain|Dhruv Jain]] ([[User talk:Dhruv Jain|talk]]) 07:39, 1 August 2013 (CDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP_HA_Vulnerability_Scanner_Project}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Dhruv Jain</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_HA_Vulnerability_Scanner_Project&amp;diff=156275</id>
		<title>OWASP HA Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_HA_Vulnerability_Scanner_Project&amp;diff=156275"/>
				<updated>2013-07-31T02:44:15Z</updated>
		
		<summary type="html">&lt;p&gt;Dhruv Jain: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
Project has beeen started.Currently developing Spider to get links of all the pages&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_HA_Vulnerability_Scanner_Project}} &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Dhruv Jain</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_HA_Vulnerability_Scanner_Project&amp;diff=156274</id>
		<title>OWASP HA Vulnerability Scanner Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_HA_Vulnerability_Scanner_Project&amp;diff=156274"/>
				<updated>2013-07-31T02:43:12Z</updated>
		
		<summary type="html">&lt;p&gt;Dhruv Jain: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
Project has beeen sstarted.Currently developing Spider to get links of all the pages&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_HA_Vulnerability_Scanner_Project}} &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;/div&gt;</summary>
		<author><name>Dhruv Jain</name></author>	</entry>

	</feed>