<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Fedevela+paysett</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Fedevela+paysett"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Fedevela_paysett"/>
		<updated>2026-04-27T23:23:30Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Guia_Tabla_de_Contenido&amp;diff=9123</id>
		<title>Guia Tabla de Contenido</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Guia_Tabla_de_Contenido&amp;diff=9123"/>
				<updated>2006-08-17T12:43:51Z</updated>
		
		<summary type="html">&lt;p&gt;Fedevela paysett: /* Acerca del Open Web Application Security Project */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=[[Gu&amp;amp;iacute;a Portada|Portada]]=&lt;br /&gt;
#Dedicaci&amp;amp;oacute;n&lt;br /&gt;
#Derechos de autor y licencia&lt;br /&gt;
#Editores &lt;br /&gt;
#Autores y cr&amp;amp;iacute;ticos&lt;br /&gt;
#Historia de revisiones&lt;br /&gt;
=[[Acerca del Open Web Application Security Project]]=&lt;br /&gt;
#Estructura y licenciamiento&lt;br /&gt;
#Participaci&amp;amp;oacute;n y afiliaci&amp;amp;oacute;n&lt;br /&gt;
#Proyectos&lt;br /&gt;
&lt;br /&gt;
=[[Gu&amp;amp;iacute;a Introducci&amp;amp;oacute;n| Introducci&amp;amp;oacute;n]]=&lt;br /&gt;
#Desarrollando aplicaciones seguras&lt;br /&gt;
#Mejoras en esta edici&amp;amp;oacute;n&lt;br /&gt;
#Como usar la gu&amp;amp;iacute;a&lt;br /&gt;
#Actualizaciones y errata&lt;br /&gt;
#Agradecimientos&lt;br /&gt;
=[[What are web applications?]]=&lt;br /&gt;
#Technologies&lt;br /&gt;
#First generation – CGI&lt;br /&gt;
#Filters&lt;br /&gt;
#Scripting&lt;br /&gt;
#Web application frameworks – J&lt;br /&gt;
#Small to medium scale applications&lt;br /&gt;
#Large scale applications&lt;br /&gt;
#View&lt;br /&gt;
#Controller&lt;br /&gt;
#Model&lt;br /&gt;
#Conclusion&lt;br /&gt;
=[[Policy Frameworks]]=&lt;br /&gt;
#Organizational commitment to security&lt;br /&gt;
#OWASP’s Place at the Framework table&lt;br /&gt;
#Development Methodology&lt;br /&gt;
#Coding Standards&lt;br /&gt;
#Source Code Control&lt;br /&gt;
#Summary&lt;br /&gt;
=[[Secure Coding Principles]]=&lt;br /&gt;
#Asset Classification&lt;br /&gt;
#About attackers&lt;br /&gt;
#Core pillars of information security&lt;br /&gt;
#Security Architecture&lt;br /&gt;
#Security Principles&lt;br /&gt;
=[[Threat Risk Modeling]]=&lt;br /&gt;
#Threat Risk Modeling&lt;br /&gt;
#Performing threat risk modeling using the Microsoft Threat Modeling Process&lt;br /&gt;
#Alternative Threat Modeling Systems&lt;br /&gt;
#Trike&lt;br /&gt;
#AS/NZS&lt;br /&gt;
#CVSS&lt;br /&gt;
#OCTAVE&lt;br /&gt;
#Conclusion&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Handling E-Commerce Payments]]=&lt;br /&gt;
#Objectives&lt;br /&gt;
#Compliance and Laws&lt;br /&gt;
#PCI Compliance&lt;br /&gt;
#Handling Credit Cards&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Phishing]]=&lt;br /&gt;
#What is phishing?&lt;br /&gt;
#User Education&lt;br /&gt;
#Make it easy for your users to report scams&lt;br /&gt;
#Communicating with customers via e-mail&lt;br /&gt;
#Never ask your customers for their secrets&lt;br /&gt;
#Fix all your XSS issues&lt;br /&gt;
#Do not use pop-ups&lt;br /&gt;
#Don’t be framed&lt;br /&gt;
#Move your application one link away from your front page&lt;br /&gt;
#Enforce local referrers for images and other resources&lt;br /&gt;
#Keep the address bar, use SSL, do not use IP addresses&lt;br /&gt;
#Don’t be the source of identity theft&lt;br /&gt;
#Implement safe-guards within your application&lt;br /&gt;
#Monitor unusual account activity&lt;br /&gt;
#Get the phishing target servers offline pronto&lt;br /&gt;
#Take control of the fraudulent domain name&lt;br /&gt;
#Work with law enforcement&lt;br /&gt;
#When an attack happens&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Web Services]]=&lt;br /&gt;
#Securing Web Services&lt;br /&gt;
#Communication security&lt;br /&gt;
#Passing credentials&lt;br /&gt;
#Ensuring message freshness&lt;br /&gt;
#Protecting message integrity&lt;br /&gt;
#Protecting message confidentiality&lt;br /&gt;
#Access control&lt;br /&gt;
#Audit&lt;br /&gt;
#Web Services Security Hierarchy&lt;br /&gt;
#SOAP&lt;br /&gt;
#WS-Security Standard&lt;br /&gt;
#WS-Security Building Blocks&lt;br /&gt;
#Communication Protection Mechanisms&lt;br /&gt;
#Access Control Mechanisms&lt;br /&gt;
#Forming Web Service Chains&lt;br /&gt;
#Available Implementations&lt;br /&gt;
#Problems&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Ajax and Other &amp;quot;Rich&amp;quot; Interface Technologies]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Architecture&lt;br /&gt;
#Access control: Authentication and Authorization&lt;br /&gt;
#Silent transactional authorization&lt;br /&gt;
#Untrusted or absent session data&lt;br /&gt;
#State management&lt;br /&gt;
#Tamper resistance&lt;br /&gt;
#Privacy&lt;br /&gt;
#Proxy Façade&lt;br /&gt;
#SOAP Injection Attacks&lt;br /&gt;
#XMLRPC Injection Attacks&lt;br /&gt;
#DOM Injection Attacks&lt;br /&gt;
#XML Injection Attacks&lt;br /&gt;
#JSON (Javascript Object Notation) Injection Attacks&lt;br /&gt;
#Encoding safety&lt;br /&gt;
#Auditing&lt;br /&gt;
#Error Handling&lt;br /&gt;
#Accessibility&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Authentication]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Environments Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Best Practices&lt;br /&gt;
#Common web authentication techniques&lt;br /&gt;
#Strong Authentication&lt;br /&gt;
#Federated Authentication&lt;br /&gt;
#Client side authentication controls&lt;br /&gt;
#Positive Authentication&lt;br /&gt;
#Multiple Key Lookups&lt;br /&gt;
#Referer Checks&lt;br /&gt;
#Browser remembers passwords&lt;br /&gt;
#Default accounts&lt;br /&gt;
#Choice of usernames&lt;br /&gt;
#Change passwords&lt;br /&gt;
#Short passwords&lt;br /&gt;
#Weak password controls&lt;br /&gt;
#Reversible password encryption&lt;br /&gt;
#Automated password resets&lt;br /&gt;
#Brute Force&lt;br /&gt;
#Remember Me&lt;br /&gt;
#Idle Timeouts&lt;br /&gt;
#Logout&lt;br /&gt;
#Account Expiry&lt;br /&gt;
#Self registration&lt;br /&gt;
#CAPTCHA&lt;br /&gt;
#Further Reading&lt;br /&gt;
#Authentication&lt;br /&gt;
=[[Authorization]]=&lt;br /&gt;
#Objectives&lt;br /&gt;
#Environments Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Best Practices&lt;br /&gt;
#Best Practices in Action&lt;br /&gt;
#Principle of least privilege&lt;br /&gt;
#Centralized authorization routines&lt;br /&gt;
#Authorization matrix&lt;br /&gt;
#Controlling access to protected resources&lt;br /&gt;
#Protecting access to static resources&lt;br /&gt;
#Reauthorization for high value activities or after idle out&lt;br /&gt;
#Time based authorization&lt;br /&gt;
#Be cautious of custom authorization controls&lt;br /&gt;
#Never implement client-side authorization tokens&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Session Management]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Environments Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Description&lt;br /&gt;
#Best practices&lt;br /&gt;
#Exposed Session Variables&lt;br /&gt;
#Page and Form Tokens&lt;br /&gt;
#Weak Session Cryptographic Algorithms&lt;br /&gt;
#Session Token Entropy&lt;br /&gt;
#Session Time-out&lt;br /&gt;
#Regeneration of Session Tokens&lt;br /&gt;
#Session Forging/Brute-Forcing Detection and/or Lockout&lt;br /&gt;
#Session Token Capture and Session Hijacking&lt;br /&gt;
#Session Tokens on Logout&lt;br /&gt;
#Session Validation Attacks&lt;br /&gt;
#PHP&lt;br /&gt;
#Sessions&lt;br /&gt;
#Further Reading&lt;br /&gt;
#Session Management&lt;br /&gt;
=[[Data Validation]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Description&lt;br /&gt;
#Definitions&lt;br /&gt;
#Where to include integrity checks&lt;br /&gt;
#Where to include validation&lt;br /&gt;
#Where to include business rule validation&lt;br /&gt;
#Data Validation Strategies&lt;br /&gt;
#Prevent parameter tampering&lt;br /&gt;
#Hidden fields&lt;br /&gt;
#ASP.NET Viewstate&lt;br /&gt;
#URL encoding&lt;br /&gt;
#HTML encoding&lt;br /&gt;
#Encoded strings&lt;br /&gt;
#Data Validation and Interpreter Injection&lt;br /&gt;
#Delimiter and special characters&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Interpreter Injection]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#User Agent Injection&lt;br /&gt;
#HTTP Response Splitting&lt;br /&gt;
#SQL Injection&lt;br /&gt;
#ORM Injection&lt;br /&gt;
#LDAP Injection&lt;br /&gt;
#XML Injection&lt;br /&gt;
#Code Injection&lt;br /&gt;
#Further Reading&lt;br /&gt;
#SQL-injection&lt;br /&gt;
#Code Injection&lt;br /&gt;
#Command injection&lt;br /&gt;
=[[Canoncalization, locale and Unicode]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Description&lt;br /&gt;
#Unicode&lt;br /&gt;
#http://www.ietf.org/rfc/rfc#&lt;br /&gt;
#Input Formats&lt;br /&gt;
#Locale assertion&lt;br /&gt;
#Double (or n-) encoding&lt;br /&gt;
#	HTTP Request Smuggling&lt;br /&gt;
#	Further Reading&lt;br /&gt;
=[[Error Handling, Auditing and Logging]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Environments Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Description&lt;br /&gt;
#Best practices&lt;br /&gt;
#Error Handling&lt;br /&gt;
#Detailed error messages&lt;br /&gt;
#Logging&lt;br /&gt;
#Noise&lt;br /&gt;
#Cover Tracks&lt;br /&gt;
#False Alarms&lt;br /&gt;
#Destruction&lt;br /&gt;
#Audit Trails&lt;br /&gt;
#Further Reading&lt;br /&gt;
#Error Handling and Logging&lt;br /&gt;
=[[File System]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Environments Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Description&lt;br /&gt;
#Best Practices&lt;br /&gt;
#Defacement&lt;br /&gt;
#Path traversal&lt;br /&gt;
#Insecure permissions&lt;br /&gt;
#Insecure Indexing&lt;br /&gt;
#Unmapped files&lt;br /&gt;
#Temporary files&lt;br /&gt;
#PHP&lt;br /&gt;
#Includes and Remote files&lt;br /&gt;
#File upload&lt;br /&gt;
#Old, unreferenced files&lt;br /&gt;
#Second Order Injection&lt;br /&gt;
#Further Reading&lt;br /&gt;
#File System&lt;br /&gt;
=[[Distributed Computing]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Environments Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Best Practices&lt;br /&gt;
#Race conditions&lt;br /&gt;
#Distributed synchronization&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Buffer Overflows]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Description&lt;br /&gt;
#General Prevention Techniques&lt;br /&gt;
#Stack Overflow&lt;br /&gt;
#Heap Overflow&lt;br /&gt;
#Format String&lt;br /&gt;
#Unicode Overflow&lt;br /&gt;
#Integer Overflow&lt;br /&gt;
#Further reading&lt;br /&gt;
=[[Administrative Interface]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Environments Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Best practices&lt;br /&gt;
#Administrators are not users&lt;br /&gt;
#Authentication for high value systems&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Cryptography]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Description&lt;br /&gt;
#Cryptographic Functions&lt;br /&gt;
#Cryptographic Algorithms&lt;br /&gt;
#Algorithm Selection&lt;br /&gt;
#Key Storage&lt;br /&gt;
#Insecure transmission of secrets&lt;br /&gt;
#Reversible Authentication Tokens&lt;br /&gt;
#Safe UUID generation&lt;br /&gt;
#Summary&lt;br /&gt;
#Further Reading&lt;br /&gt;
#Cryptography&lt;br /&gt;
=[[Configuration]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Best Practices&lt;br /&gt;
#Default passwords&lt;br /&gt;
#Secure connection strings&lt;br /&gt;
#Secure network transmission&lt;br /&gt;
#Encrypted data&lt;br /&gt;
#PHP Configuration&lt;br /&gt;
#Global variables&lt;br /&gt;
#register_globals&lt;br /&gt;
#Database security&lt;br /&gt;
#Further Reading&lt;br /&gt;
#ColdFusion Components (CFCs)&lt;br /&gt;
#Configuration&lt;br /&gt;
=[[Software Quality Assurance]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Best practices&lt;br /&gt;
#Process&lt;br /&gt;
#Metrics&lt;br /&gt;
#Testing Activities&lt;br /&gt;
=[[Deployment]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Best Practices&lt;br /&gt;
#Release Management&lt;br /&gt;
#Secure delivery of code&lt;br /&gt;
#Code signing&lt;br /&gt;
#Permissions are set to least privilege&lt;br /&gt;
#Automated packaging&lt;br /&gt;
#Automated deployment&lt;br /&gt;
#Automated removal&lt;br /&gt;
#No backup or old files&lt;br /&gt;
#Unnecessary features are off by default&lt;br /&gt;
#Setup log files are clean&lt;br /&gt;
#No default accounts&lt;br /&gt;
#Easter eggs&lt;br /&gt;
#Malicious software&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Maintenance]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Best Practices&lt;br /&gt;
#Security Incident Response&lt;br /&gt;
#Fix Security Issues Correctly&lt;br /&gt;
#Update Notifications&lt;br /&gt;
#Regularly check permissions&lt;br /&gt;
#Further Reading&lt;br /&gt;
#Maintenance&lt;br /&gt;
=[[GNU Free Documentation License]]=&lt;br /&gt;
#PREAMBLE&lt;br /&gt;
#APPLICABILITY AND DEFINITIONS&lt;br /&gt;
#VERBATIM COPYING&lt;br /&gt;
#COPYING IN QUANTITY&lt;br /&gt;
#MODIFICATIONS&lt;br /&gt;
#COMBINING DOCUMENTS&lt;br /&gt;
#COLLECTIONS OF DOCUMENTS&lt;br /&gt;
#AGGREGATION WITH INDEPENDENT WORKS&lt;br /&gt;
#TRANSLATION&lt;br /&gt;
#TERMINATION&lt;br /&gt;
#FUTURE REVISIONS OF THIS LICENSE&lt;br /&gt;
=Reference=&lt;br /&gt;
[[Category:OWASP_Guide_Project]]&lt;/div&gt;</summary>
		<author><name>Fedevela paysett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Guia_Tabla_de_Contenido&amp;diff=9122</id>
		<title>Guia Tabla de Contenido</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Guia_Tabla_de_Contenido&amp;diff=9122"/>
				<updated>2006-08-17T12:34:20Z</updated>
		
		<summary type="html">&lt;p&gt;Fedevela paysett: Begin translation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=[[Gu&amp;amp;iacute;a Portada|Portada]]=&lt;br /&gt;
#Dedicaci&amp;amp;oacute;n&lt;br /&gt;
#Derechos de autor y licencia&lt;br /&gt;
#Editores &lt;br /&gt;
#Autores y cr&amp;amp;iacute;ticos&lt;br /&gt;
#Historia de revisiones&lt;br /&gt;
=[[Acerca del Open Web Application Security Project]]=&lt;br /&gt;
#Estructura y licenciamiento&lt;br /&gt;
#Participaci&amp;amp;oacute;n y pertenencia&lt;br /&gt;
#Proyectos&lt;br /&gt;
=[[Gu&amp;amp;iacute;a Introducci&amp;amp;oacute;n| Introducci&amp;amp;oacute;n]]=&lt;br /&gt;
#Desarrollando aplicaciones seguras&lt;br /&gt;
#Mejoras en esta edici&amp;amp;oacute;n&lt;br /&gt;
#Como usar la gu&amp;amp;iacute;a&lt;br /&gt;
#Actualizaciones y errata&lt;br /&gt;
#Agradecimientos&lt;br /&gt;
=[[What are web applications?]]=&lt;br /&gt;
#Technologies&lt;br /&gt;
#First generation – CGI&lt;br /&gt;
#Filters&lt;br /&gt;
#Scripting&lt;br /&gt;
#Web application frameworks – J&lt;br /&gt;
#Small to medium scale applications&lt;br /&gt;
#Large scale applications&lt;br /&gt;
#View&lt;br /&gt;
#Controller&lt;br /&gt;
#Model&lt;br /&gt;
#Conclusion&lt;br /&gt;
=[[Policy Frameworks]]=&lt;br /&gt;
#Organizational commitment to security&lt;br /&gt;
#OWASP’s Place at the Framework table&lt;br /&gt;
#Development Methodology&lt;br /&gt;
#Coding Standards&lt;br /&gt;
#Source Code Control&lt;br /&gt;
#Summary&lt;br /&gt;
=[[Secure Coding Principles]]=&lt;br /&gt;
#Asset Classification&lt;br /&gt;
#About attackers&lt;br /&gt;
#Core pillars of information security&lt;br /&gt;
#Security Architecture&lt;br /&gt;
#Security Principles&lt;br /&gt;
=[[Threat Risk Modeling]]=&lt;br /&gt;
#Threat Risk Modeling&lt;br /&gt;
#Performing threat risk modeling using the Microsoft Threat Modeling Process&lt;br /&gt;
#Alternative Threat Modeling Systems&lt;br /&gt;
#Trike&lt;br /&gt;
#AS/NZS&lt;br /&gt;
#CVSS&lt;br /&gt;
#OCTAVE&lt;br /&gt;
#Conclusion&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Handling E-Commerce Payments]]=&lt;br /&gt;
#Objectives&lt;br /&gt;
#Compliance and Laws&lt;br /&gt;
#PCI Compliance&lt;br /&gt;
#Handling Credit Cards&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Phishing]]=&lt;br /&gt;
#What is phishing?&lt;br /&gt;
#User Education&lt;br /&gt;
#Make it easy for your users to report scams&lt;br /&gt;
#Communicating with customers via e-mail&lt;br /&gt;
#Never ask your customers for their secrets&lt;br /&gt;
#Fix all your XSS issues&lt;br /&gt;
#Do not use pop-ups&lt;br /&gt;
#Don’t be framed&lt;br /&gt;
#Move your application one link away from your front page&lt;br /&gt;
#Enforce local referrers for images and other resources&lt;br /&gt;
#Keep the address bar, use SSL, do not use IP addresses&lt;br /&gt;
#Don’t be the source of identity theft&lt;br /&gt;
#Implement safe-guards within your application&lt;br /&gt;
#Monitor unusual account activity&lt;br /&gt;
#Get the phishing target servers offline pronto&lt;br /&gt;
#Take control of the fraudulent domain name&lt;br /&gt;
#Work with law enforcement&lt;br /&gt;
#When an attack happens&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Web Services]]=&lt;br /&gt;
#Securing Web Services&lt;br /&gt;
#Communication security&lt;br /&gt;
#Passing credentials&lt;br /&gt;
#Ensuring message freshness&lt;br /&gt;
#Protecting message integrity&lt;br /&gt;
#Protecting message confidentiality&lt;br /&gt;
#Access control&lt;br /&gt;
#Audit&lt;br /&gt;
#Web Services Security Hierarchy&lt;br /&gt;
#SOAP&lt;br /&gt;
#WS-Security Standard&lt;br /&gt;
#WS-Security Building Blocks&lt;br /&gt;
#Communication Protection Mechanisms&lt;br /&gt;
#Access Control Mechanisms&lt;br /&gt;
#Forming Web Service Chains&lt;br /&gt;
#Available Implementations&lt;br /&gt;
#Problems&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Ajax and Other &amp;quot;Rich&amp;quot; Interface Technologies]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Architecture&lt;br /&gt;
#Access control: Authentication and Authorization&lt;br /&gt;
#Silent transactional authorization&lt;br /&gt;
#Untrusted or absent session data&lt;br /&gt;
#State management&lt;br /&gt;
#Tamper resistance&lt;br /&gt;
#Privacy&lt;br /&gt;
#Proxy Façade&lt;br /&gt;
#SOAP Injection Attacks&lt;br /&gt;
#XMLRPC Injection Attacks&lt;br /&gt;
#DOM Injection Attacks&lt;br /&gt;
#XML Injection Attacks&lt;br /&gt;
#JSON (Javascript Object Notation) Injection Attacks&lt;br /&gt;
#Encoding safety&lt;br /&gt;
#Auditing&lt;br /&gt;
#Error Handling&lt;br /&gt;
#Accessibility&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Authentication]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Environments Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Best Practices&lt;br /&gt;
#Common web authentication techniques&lt;br /&gt;
#Strong Authentication&lt;br /&gt;
#Federated Authentication&lt;br /&gt;
#Client side authentication controls&lt;br /&gt;
#Positive Authentication&lt;br /&gt;
#Multiple Key Lookups&lt;br /&gt;
#Referer Checks&lt;br /&gt;
#Browser remembers passwords&lt;br /&gt;
#Default accounts&lt;br /&gt;
#Choice of usernames&lt;br /&gt;
#Change passwords&lt;br /&gt;
#Short passwords&lt;br /&gt;
#Weak password controls&lt;br /&gt;
#Reversible password encryption&lt;br /&gt;
#Automated password resets&lt;br /&gt;
#Brute Force&lt;br /&gt;
#Remember Me&lt;br /&gt;
#Idle Timeouts&lt;br /&gt;
#Logout&lt;br /&gt;
#Account Expiry&lt;br /&gt;
#Self registration&lt;br /&gt;
#CAPTCHA&lt;br /&gt;
#Further Reading&lt;br /&gt;
#Authentication&lt;br /&gt;
=[[Authorization]]=&lt;br /&gt;
#Objectives&lt;br /&gt;
#Environments Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Best Practices&lt;br /&gt;
#Best Practices in Action&lt;br /&gt;
#Principle of least privilege&lt;br /&gt;
#Centralized authorization routines&lt;br /&gt;
#Authorization matrix&lt;br /&gt;
#Controlling access to protected resources&lt;br /&gt;
#Protecting access to static resources&lt;br /&gt;
#Reauthorization for high value activities or after idle out&lt;br /&gt;
#Time based authorization&lt;br /&gt;
#Be cautious of custom authorization controls&lt;br /&gt;
#Never implement client-side authorization tokens&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Session Management]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Environments Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Description&lt;br /&gt;
#Best practices&lt;br /&gt;
#Exposed Session Variables&lt;br /&gt;
#Page and Form Tokens&lt;br /&gt;
#Weak Session Cryptographic Algorithms&lt;br /&gt;
#Session Token Entropy&lt;br /&gt;
#Session Time-out&lt;br /&gt;
#Regeneration of Session Tokens&lt;br /&gt;
#Session Forging/Brute-Forcing Detection and/or Lockout&lt;br /&gt;
#Session Token Capture and Session Hijacking&lt;br /&gt;
#Session Tokens on Logout&lt;br /&gt;
#Session Validation Attacks&lt;br /&gt;
#PHP&lt;br /&gt;
#Sessions&lt;br /&gt;
#Further Reading&lt;br /&gt;
#Session Management&lt;br /&gt;
=[[Data Validation]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Description&lt;br /&gt;
#Definitions&lt;br /&gt;
#Where to include integrity checks&lt;br /&gt;
#Where to include validation&lt;br /&gt;
#Where to include business rule validation&lt;br /&gt;
#Data Validation Strategies&lt;br /&gt;
#Prevent parameter tampering&lt;br /&gt;
#Hidden fields&lt;br /&gt;
#ASP.NET Viewstate&lt;br /&gt;
#URL encoding&lt;br /&gt;
#HTML encoding&lt;br /&gt;
#Encoded strings&lt;br /&gt;
#Data Validation and Interpreter Injection&lt;br /&gt;
#Delimiter and special characters&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Interpreter Injection]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#User Agent Injection&lt;br /&gt;
#HTTP Response Splitting&lt;br /&gt;
#SQL Injection&lt;br /&gt;
#ORM Injection&lt;br /&gt;
#LDAP Injection&lt;br /&gt;
#XML Injection&lt;br /&gt;
#Code Injection&lt;br /&gt;
#Further Reading&lt;br /&gt;
#SQL-injection&lt;br /&gt;
#Code Injection&lt;br /&gt;
#Command injection&lt;br /&gt;
=[[Canoncalization, locale and Unicode]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Description&lt;br /&gt;
#Unicode&lt;br /&gt;
#http://www.ietf.org/rfc/rfc#&lt;br /&gt;
#Input Formats&lt;br /&gt;
#Locale assertion&lt;br /&gt;
#Double (or n-) encoding&lt;br /&gt;
#	HTTP Request Smuggling&lt;br /&gt;
#	Further Reading&lt;br /&gt;
=[[Error Handling, Auditing and Logging]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Environments Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Description&lt;br /&gt;
#Best practices&lt;br /&gt;
#Error Handling&lt;br /&gt;
#Detailed error messages&lt;br /&gt;
#Logging&lt;br /&gt;
#Noise&lt;br /&gt;
#Cover Tracks&lt;br /&gt;
#False Alarms&lt;br /&gt;
#Destruction&lt;br /&gt;
#Audit Trails&lt;br /&gt;
#Further Reading&lt;br /&gt;
#Error Handling and Logging&lt;br /&gt;
=[[File System]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Environments Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Description&lt;br /&gt;
#Best Practices&lt;br /&gt;
#Defacement&lt;br /&gt;
#Path traversal&lt;br /&gt;
#Insecure permissions&lt;br /&gt;
#Insecure Indexing&lt;br /&gt;
#Unmapped files&lt;br /&gt;
#Temporary files&lt;br /&gt;
#PHP&lt;br /&gt;
#Includes and Remote files&lt;br /&gt;
#File upload&lt;br /&gt;
#Old, unreferenced files&lt;br /&gt;
#Second Order Injection&lt;br /&gt;
#Further Reading&lt;br /&gt;
#File System&lt;br /&gt;
=[[Distributed Computing]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Environments Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Best Practices&lt;br /&gt;
#Race conditions&lt;br /&gt;
#Distributed synchronization&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Buffer Overflows]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Description&lt;br /&gt;
#General Prevention Techniques&lt;br /&gt;
#Stack Overflow&lt;br /&gt;
#Heap Overflow&lt;br /&gt;
#Format String&lt;br /&gt;
#Unicode Overflow&lt;br /&gt;
#Integer Overflow&lt;br /&gt;
#Further reading&lt;br /&gt;
=[[Administrative Interface]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Environments Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Best practices&lt;br /&gt;
#Administrators are not users&lt;br /&gt;
#Authentication for high value systems&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Cryptography]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Description&lt;br /&gt;
#Cryptographic Functions&lt;br /&gt;
#Cryptographic Algorithms&lt;br /&gt;
#Algorithm Selection&lt;br /&gt;
#Key Storage&lt;br /&gt;
#Insecure transmission of secrets&lt;br /&gt;
#Reversible Authentication Tokens&lt;br /&gt;
#Safe UUID generation&lt;br /&gt;
#Summary&lt;br /&gt;
#Further Reading&lt;br /&gt;
#Cryptography&lt;br /&gt;
=[[Configuration]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Best Practices&lt;br /&gt;
#Default passwords&lt;br /&gt;
#Secure connection strings&lt;br /&gt;
#Secure network transmission&lt;br /&gt;
#Encrypted data&lt;br /&gt;
#PHP Configuration&lt;br /&gt;
#Global variables&lt;br /&gt;
#register_globals&lt;br /&gt;
#Database security&lt;br /&gt;
#Further Reading&lt;br /&gt;
#ColdFusion Components (CFCs)&lt;br /&gt;
#Configuration&lt;br /&gt;
=[[Software Quality Assurance]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Best practices&lt;br /&gt;
#Process&lt;br /&gt;
#Metrics&lt;br /&gt;
#Testing Activities&lt;br /&gt;
=[[Deployment]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Best Practices&lt;br /&gt;
#Release Management&lt;br /&gt;
#Secure delivery of code&lt;br /&gt;
#Code signing&lt;br /&gt;
#Permissions are set to least privilege&lt;br /&gt;
#Automated packaging&lt;br /&gt;
#Automated deployment&lt;br /&gt;
#Automated removal&lt;br /&gt;
#No backup or old files&lt;br /&gt;
#Unnecessary features are off by default&lt;br /&gt;
#Setup log files are clean&lt;br /&gt;
#No default accounts&lt;br /&gt;
#Easter eggs&lt;br /&gt;
#Malicious software&lt;br /&gt;
#Further Reading&lt;br /&gt;
=[[Maintenance]]=&lt;br /&gt;
#Objective&lt;br /&gt;
#Platforms Affected&lt;br /&gt;
#Relevant COBIT Topics&lt;br /&gt;
#Best Practices&lt;br /&gt;
#Security Incident Response&lt;br /&gt;
#Fix Security Issues Correctly&lt;br /&gt;
#Update Notifications&lt;br /&gt;
#Regularly check permissions&lt;br /&gt;
#Further Reading&lt;br /&gt;
#Maintenance&lt;br /&gt;
=[[GNU Free Documentation License]]=&lt;br /&gt;
#PREAMBLE&lt;br /&gt;
#APPLICABILITY AND DEFINITIONS&lt;br /&gt;
#VERBATIM COPYING&lt;br /&gt;
#COPYING IN QUANTITY&lt;br /&gt;
#MODIFICATIONS&lt;br /&gt;
#COMBINING DOCUMENTS&lt;br /&gt;
#COLLECTIONS OF DOCUMENTS&lt;br /&gt;
#AGGREGATION WITH INDEPENDENT WORKS&lt;br /&gt;
#TRANSLATION&lt;br /&gt;
#TERMINATION&lt;br /&gt;
#FUTURE REVISIONS OF THIS LICENSE&lt;br /&gt;
=Reference=&lt;br /&gt;
[[Category:OWASP_Guide_Project]]&lt;/div&gt;</summary>
		<author><name>Fedevela paysett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Guide_Project&amp;diff=9121</id>
		<title>Category:OWASP Guide Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Guide_Project&amp;diff=9121"/>
				<updated>2006-08-17T12:09:07Z</updated>
		
		<summary type="html">&lt;p&gt;Fedevela paysett: /* OWASP Guide 3.0 (Current) */  begin spanish translation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Guide Table of Contents]]__TOC__&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
The OWASP Guide to Building Secure Web Applications v2 is now released. Its release was announced at Black Hat in Las Vegas in late July 2005. This new version of the OWASP Guide is a major overhaul of the original document, containing nearly three times as much material. The project is currently steered by Andrew van der Stock.&lt;br /&gt;
&lt;br /&gt;
The original OWASP Guide had become a staple diet for many web security professionals. Since 2002, the initial version was downloaded over 2 million times. Today, the Guide is referenced by many leading government, financial, and corporate standards and is the Gold standard for web application security.&lt;br /&gt;
&lt;br /&gt;
The Guide is aimed at architects, developers, consultants and auditors and is a comprehensive manual for designing, developing and deploying secure web applications. &lt;br /&gt;
&lt;br /&gt;
==Announcements==&lt;br /&gt;
&lt;br /&gt;
==Volunteers Needed==&lt;br /&gt;
Much work remains to be done in these sections:&lt;br /&gt;
*[[Distributed Computing]]&lt;br /&gt;
*[[Deployment]]&lt;br /&gt;
&lt;br /&gt;
==OWASP Guide 2.0 Downloads==&lt;br /&gt;
&lt;br /&gt;
If you need a stable edition of the Guide, you should use one of these editions:&lt;br /&gt;
&lt;br /&gt;
OWASP Guide 2.0.1 (English)&lt;br /&gt;
* [http://prdownloads.sourceforge.net/owasp/OWASPGuide2.0.1.pdf?download PDF (3 MB)]&lt;br /&gt;
* [http://prdownloads.sourceforge.net/owasp/OWASPGuide2.0.1.zip?download Word (zip file, 1.4 MB)]&lt;br /&gt;
&lt;br /&gt;
OWASP Guide 1.1.1 (Japanese, にほんご)&lt;br /&gt;
* [http://prdownloads.sourceforge.net/owasp/OWASPGuideV1.1.1-jp.pdf?download PDF (1.4 MB)]&lt;br /&gt;
&lt;br /&gt;
Earlier versions of the Guide (1.0 and 1.1.1) can be found at our [http://sourceforge.net/project/showfiles.php?group_id=64424&amp;amp;package_id=62287 file download center], and in [http://sourceforge.net/cvs/?group_id=64424 CVS]. &lt;br /&gt;
&lt;br /&gt;
==OWASP Guide 3.0 (Current)==&lt;br /&gt;
&lt;br /&gt;
If you'd like a point in time version of the Guide 3.0 in PDF format:&lt;br /&gt;
* [http://owasp.cvs.sourceforge.net/*checkout*/owasp/guide/current%20draft.pdf Guide 3.0 draft as of March 2006] &lt;br /&gt;
&lt;br /&gt;
This file is regenerated from time to time.&lt;br /&gt;
&lt;br /&gt;
===OWASP Guide 3.0===&lt;br /&gt;
&lt;br /&gt;
This is the working (current) draft of the OWASP Guide 3.0. Please login to make changes as you see fit. Changes will be vetted by the OWASP Guide Project team.&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Guide_Table_of_Contents OWASP Guide 3.0 Table of Contents]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===OWASP Guide 3.0 (Spanish)===&lt;br /&gt;
&lt;br /&gt;
This will hold the working (current) draft of the translation of the OWASP Guide 3.0 to Spanish. Please help us in this translation effort!!! Login and make changes as you see fit. Changes will be vetted by the OWASP Guide Project team.&lt;br /&gt;
''NEED LINKS''&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
[[OWASP Guide Project Roadmap]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Document]]&lt;/div&gt;</summary>
		<author><name>Fedevela paysett</name></author>	</entry>

	</feed>