<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Fran+Brown</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Fran+Brown"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Fran_Brown"/>
		<updated>2026-05-09T02:35:21Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Flash_Security_Project&amp;diff=190621</id>
		<title>Category:OWASP Flash Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Flash_Security_Project&amp;diff=190621"/>
				<updated>2015-03-02T23:15:06Z</updated>
		
		<summary type="html">&lt;p&gt;Fran Brown: FlashDiggity - Stach &amp;amp; Liu re-branded as Bishop Fox.  Updated website link accordingly and minor update to tool description.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Overview  ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Flash Security Project is an open project for sharing knowledge in order to raise awareness of Flash application security.&lt;br /&gt;
&lt;br /&gt;
== Goals  ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Flash Security Project aims to share guidelines, tools and resources for securing Flash applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; style=&amp;quot;width: 651px; height: 66px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''Research'''&lt;br /&gt;
| '''References'''&lt;br /&gt;
| '''Tools'''&lt;br /&gt;
| '''Libraries'''&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_Flash_Security_Project#Videos Videos]&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_Flash_Security_Project#References References]&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_Flash_Security_Project#OWASP_Tools OWASP Tools]&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_Flash_Security_Project#Third-party_Security_Libraries 3rd Party Libs]&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_Flash_Security_Project#White_Papers_.2F_Presentations White Papers/Presentations]&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_Flash_Security_Project#Useful_Specifications Specifications]&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_Flash_Security_Project#Static_Analysis Static Analysis]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_Flash_Security_Project#Articles Articles]&lt;br /&gt;
| &lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_Flash_Security_Project#Disassemblers Disassemblers]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_Flash_Security_Project#Example_Vulnerabilities Example Vulnerabilities]&lt;br /&gt;
|&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_Flash_Security_Project#Decompilers Decompilers]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_Flash_Security_Project#Obfuscators_.2F_De-obfuscators Obfuscators/De-obfuscators]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_Flash_Security_Project#Local_Shared_Object_Editors LSO Editors]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_Flash_Security_Project#AMF_Tools AMF Tools]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_Flash_Security_Project#Analysis Analysis/Defense]&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos  ==&lt;br /&gt;
&lt;br /&gt;
* [http://tv.adobe.com/show/how-to-develop-secure-flash-platform-apps/ How to Develop Secure Flash Platform Apps] An Adobe TV series discussing how to author and test secure Flash applications. The presentations cover common vulnerabilities in SWF content and how to avoid them. Each video is about 5-10 minutes long and is by Peleus Uhley.&lt;br /&gt;
&lt;br /&gt;
* [http://tv.adobe.com/watch/max-2010-develop/creating-secure-actionscript-applications/ Creating Secure ActionScript Applications] An hour long video targeted at developers and QEs on creating secure Flash applications from Adobe MAX 2010. Adobe MAX is Adobe's developer conference. The talk is by Peleus Uhley.&lt;br /&gt;
&lt;br /&gt;
* [http://vimeo.com/15506137 Assessing, Testing &amp;amp; Validating Flash Content] A 45 minute talk from OWASP AppSec USA 2010 on how to assess and test Flash applications. The talk is by Peleus Uhley.&lt;br /&gt;
&lt;br /&gt;
* [http://tv.adobe.com/#vi+f15384v1102 Understanding the Flash Player Security Model] Deneb Meketa of Adobe gives a one hour presentation at the Adobe MAX 2008 conference in San Francisco entitled, &amp;quot;Flash Security: Why and how.&amp;quot; This presentation provides a good overview of several aspects of Flash Player's security model. Approximately 1 hour long. &lt;br /&gt;
&lt;br /&gt;
* [http://h30431.www3.hp.com/index.jsp?fr_story=3a98c704f7ef61299c19ef1f648f1acb1a5aeab8&amp;amp;rf=bm Billy Wins A Cheeseburger] A video by HP that explains a basic Flash vulnerability that can be found by decompilers. Approximately 3 minutes long. &lt;br /&gt;
&lt;br /&gt;
* [http://securitytube.net/Hacking-Flash-Applications-for-Fun-and-Profit-(Blackhat)-video.aspx Blinded by Flash: Widespread Security Risks Flash Developers Don't See] Prajakta Jagdale describes the attack surface flash applications have based on various things developers overlook. In this presentation she talks about the basic cross domain security model between flash applets, Cross Site Scripting attacks on Flash applications, Data injection attacks, Flash malware, decompilation of Flash swf files, code and binary obfuscation and many other attack vectors which a malicious attacker could use to hack Flash applications. Approximately 1 hour long. &lt;br /&gt;
&lt;br /&gt;
* [https://media.defcon.org/dc-17/video/DEFCON%2017%20Hacking%20Conference%20Presentation%20By%20Jon%20Rose%20-%20Deblaze%20A%20Remote%20Method%20Enumeration%20Tool%20for%20Flex%20Servers%20-%20Video%20and%20Slides.m4v Deblaze - A Remote Method Enumeration Tool for Flex Servers] This is an excellent 20 minute presentation from DefCon 17 by Jon Rose on how to test AMF services using the deBlaze tool that he authored. &lt;br /&gt;
&lt;br /&gt;
* [http://technet.microsoft.com/en-us/security/ee460903.aspx#ria RIA Security: Real-World Lessons from Flash and Silverlight] Jesse Collins from Microsoft's Silverlight team and Peleus Uhley from Adobe's Flash team discuss common threats to RIA applications. Approximately 1 hour long.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== White Papers / Presentations  ==&lt;br /&gt;
&lt;br /&gt;
'''Flash''' &lt;br /&gt;
&lt;br /&gt;
* '''Flash Parameter Injection''' [http://blog.watchfire.com/FPI.pdf pdf], IBM Rational Application Security Team, [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference OWASP AppSec 2008], 24th September 2008, NYC, NY (USA) &lt;br /&gt;
&lt;br /&gt;
* '''Testing Flash Applications using WebScarab''' [https://www.owasp.org/images/5/58/Testing_Flash_Applications.pdf pdf], Martin Clausen - Deloitte [http://www.owasp.org/index.php/Denmark Denmark Chapter Meeting], 12th March 2008, Denmark &lt;br /&gt;
&lt;br /&gt;
* '''Testing Flash Applications''' [http://www.owasp.org/images/8/8c/OWASPAppSec2007Milan_TestingFlashApplications.ppt ppt], Stefano Di Paola, [http://www.owasp.org/index.php/6th_OWASP_AppSec_Conference_-_Italy_2007/Agenda Owasp Appsec 2007], 17th May 2007, Milan (Italy). &lt;br /&gt;
&lt;br /&gt;
* '''Testing and Exploiting Flash Applications''' [http://events.ccc.de/camp/2007/Fahrplan/attachments/1320-FlashSec.pdf pdf], Fukami, Chaos Computer Camp, 2007 &lt;br /&gt;
&lt;br /&gt;
* '''Finding Vulnerabilities in Flash Applications''' [http://www.owasp.org/images/d/d8/OWASP-WASCAppSec2007SanJose_FindingVulnsinFlashApps.ppt ppt], Stefano Di Paola, [http://www.owasp.org/index.php/7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda Owasp Appsec 2007], 15th November 2007, San Jose, CA (USA) &lt;br /&gt;
&lt;br /&gt;
* '''Neat, New, and Ridiculous Flash Hacks''' - whitepaper: [http://www.blackhat.com/presentations/bh-dc-10/Bailey_Mike/BlackHat-DC-2010-Bailey-Neat-New-Ridiculous-flash-hacks-wp.pdf pdf], presentation:[http://www.blackhat.com/presentations/bh-dc-10/Bailey_Mike/BlackHat-DC-2010-Bailey-Neat-New-Ridiculous-flash-hacks-slides.pdf pdf], Mike Bailey, Black Hat DC 2010, Washington, DC (USA)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''AMF''' &lt;br /&gt;
&lt;br /&gt;
* '''AMF Testing Made Easy''' - whitepaper: [https://media.blackhat.com/bh-us-12/Briefings/Carettoni/BH_US_12_Carettoni_AMF_Testing_WP.pdf pdf], presentation: [https://media.blackhat.com/bh-us-12/Briefings/Carettoni/BH_US_12_Carettoni_AMF_Testing_Slides.pdf pdf], Luca Carettoni, Black Hat USA 2012, Las Vegas, NV (USA). This presentation discusses how to use the [http://code.google.com/p/blazer/ Blazer] tool with Burp to conduct AMF testing.&lt;br /&gt;
&lt;br /&gt;
* '''Pentesting Adobe Flex Applications''' - [http://www.gdssecurity.com/l/OWASP_NYNJMetro_Pentesting_Flex.pdf pdf], Marcin Wielgoszewski, April 2010 OWASP NYC Chapter Meeting, NYC, NY (USA)&lt;br /&gt;
&lt;br /&gt;
* '''DeBlaze: A remote enumeration tool for Flex servers''' [http://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-jon_rose-deblaze.pdf pdf], Jon Rose, [http://www.defcon.org/html/links/dc-archives/dc-17-archive.html#Rose DefCon 17], 31st July 2009, Las Vegas, NV (USA) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''University Research''' &lt;br /&gt;
&lt;br /&gt;
* '''ActionScript bytecode verification with co-logic programming''' [http://portal.acm.org/citation.cfm?id=1554339.1554342 pdf], Brian W. DeVries, Gopal Gupta, Kevin W. Hamlen, Scott Moore, and Meera Sridhar of The University of Texas at Dallas, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security 2009. &lt;br /&gt;
&lt;br /&gt;
* '''Creating a more sophisticated security platform for Flash, AIR and others''' [http://www.utdallas.edu/~mxs072100/Adobe.ppt ppt] Presented at Adobe Systems, Inc. by Meera Sridhar, November, 2009 &lt;br /&gt;
&lt;br /&gt;
* '''ActionScript In-Lined Reference Monitoring in Prolog''' [http://www.utdallas.edu/~mxs072100/padl.pdf pdf], Meera Sridhar and Kevin W. Hamlen of The University of Texas at Dallas, Proceedings of the Twelfth Symposium on Practical Aspects of Declarative Languages (PADL), Jan 2010. &lt;br /&gt;
&lt;br /&gt;
* '''ActionScript In-lined Reference Monitoring in Prolog''' [http://www.utdallas.edu/~mxs072100/padl10.pptx pptx] Presented at PADL 2010, Madrid, Spain by Meera Sridhar.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Articles  ==&lt;br /&gt;
&lt;br /&gt;
'''Development'''&lt;br /&gt;
* [http://www.adobe.com/devnet/flashplayer/articles/secure_swf_apps.html Creating more secure SWF web applications] This Adobe Developer Center article discusses secure ActionScript programming practices. &lt;br /&gt;
&lt;br /&gt;
* [http://www.adobe.com/devnet/flashplayer/articles/cross_domain_policy.html Cross-domain policy file usage recommendations for Flash Player] This Adobe Developer Center article discusses some of the common security issues that you should consider when deciding how to use a cross-domain policy file on your server.&lt;br /&gt;
&lt;br /&gt;
* [http://www.insideria.com/2010/03/flash-player-10-security-model.html Flash Player 10 Security Model: Stakeholders and Sandboxes] This is an article that condenses the official Flash Player Security Model down to a one page article discussing the stakeholders and sandboxes.&lt;br /&gt;
&lt;br /&gt;
* [http://theflashblog.com/?p=419 AMFPHP Security Basics] This a blog covering how to secure AMFPHP version 1.9 and higher.  AMFPHP is server-side code that receives AMF requests from Flash clients.&lt;br /&gt;
&lt;br /&gt;
* [http://blogs.adobe.com/asset/2009/11/securely_deploying_cross-domai.html Securely Deploying Cross-Domain Policy files] This Adobe ASSET blog provides 5 tips for securely deploying cross-domain policy files.&lt;br /&gt;
&lt;br /&gt;
* [http://askmeflash.com/article/16/securing-your-flash-application Securing your Flash Application] A quick ten item checklist of high level things to look for in your SWF before shipping.&lt;br /&gt;
&lt;br /&gt;
* [http://www.senocular.com/flash/tutorials/contentdomains/ Security Domains, Application Domains, and More in ActionScript 3.0] A fairly in depth article by Senocular.com explaining security domains, application domains, cross-domain policy files, allowDomain() and more.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing'''&lt;br /&gt;
* [http://www.ivizsecurity.com/blog/web-application-security/testing-flash-applications-pen-tester-guide/ A Lazy Pen Tester’s Guide to Testing Flash Applications] A short blog describing some of the basic steps of testing Flash applications by iViZ. &lt;br /&gt;
&lt;br /&gt;
* [http://www.gdssecurity.com/l/b/2010/03/17/penetrating-intranets-through-adobe-flex-applications/ Penetrating Intranets through Adobe Flex Applications] A short blog (03/17/2010) by Marcin Wielgoszewski of Gothan Digital Science introducing the [http://www.gdssecurity.com/l/t/d.php?k=Blazentoo Blazentoo] tool and how to take advantage of open BlazeDS proxies. &lt;br /&gt;
&lt;br /&gt;
* [http://www.gdssecurity.com/l/b/2009/11/11/pentesting-adobe-flex-applications-with-a-custom-amf-client/ Pentesting Adobe Flex Applications with a Custom AMF Client] A short blog (11/11/2009) by Marcin Wielgoszewski of Gothan Digital Science on how to write custom pyAMF-based clients for testing Flex services.&lt;br /&gt;
&lt;br /&gt;
* [http://erlend.oftedal.no/blog/?blogid=103 Client-side Remote File Inclusion in Flash] This blog discusses how to perform cross-site scripting attacks against applications that read in XML configuration files.&lt;br /&gt;
&lt;br /&gt;
* [http://code.google.com/p/doctype/wiki/ArticleFlashSecurity Flash Security] A Google code article on different types of cross-site scripting and crossdomain.xml attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Updates to the Flash Player Security Model'''&lt;br /&gt;
* [http://www.adobe.com/devnet/security/articles/flash-player-sandbox-bridge.html The Flash Player sandbox bridge] - This Adobe Developer Center article describes how the new LoaderInfo sandbox bridge APIs can be used as a safer alternative to Security.allowDomain(*).&lt;br /&gt;
&lt;br /&gt;
* [http://www.adobe.com/devnet/flashplayer/articles/fplayer10.1_air2_security_changes.html Understanding the security changes in Flash Player 10.1 and AIR 2] - This Adobe Developer Center article describes the new changes that affect security in Flash Player 10.1 and AIR.  This article discusses a new feature, LoaderContext.allowCodeImport, which can help in safely loading remote content via loadBytes(). It also discusses minor changes in behavior that may require action by the developer.&lt;br /&gt;
&lt;br /&gt;
* [http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html Understanding the security changes in Flash Player 10] - This Adobe Developer Center article describes the new changes that affect security in the Flash Player 10. This includes information on changes to socket timing, policy file strictness, upload and download, RTMFP and full screen mode. &lt;br /&gt;
&lt;br /&gt;
* [http://www.adobe.com/devnet/flashplayer/articles/fplayer10_uia_requirements.html User-initiated action requirements in Flash Player 10] - This Adobe Developer Center article describes the new user-initiated action requires in Flash Player 10. These requirements include chances to FileReference, Clipboard, full-screen mode and pop-up windows. &lt;br /&gt;
&lt;br /&gt;
* [http://www.adobe.com/devnet/flashplayer/articles/flash_player9_security_update.html Preparing for the Flash Player 9 April 2008 Security Update] - This Adobe Developer Center article describes the new mitigations for DNS Rebinding (socket policy files), cross-site flashing and the introduction of cross-domain header meta-policies to help address attacks such as the UPnP attack. &lt;br /&gt;
&lt;br /&gt;
* [http://www.adobe.com/devnet/flashplayer/articles/fplayer9_security.html Security Changes in Flash Player 9] This Adobe Developer Center article describes the important changes that need to be made to existing crossdomain.xml and socket policy files. All websites that use cross-domain or socket policy files will need to implement these changes in order to be compatible with Adobe's new format. After the implementation of Phase II, Adobe will no longer support the old format. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Example Vulnerabilities ==&lt;br /&gt;
&lt;br /&gt;
''The intent of this section is to provide real-world examples of exploitation.  This can be useful for consultants to help demonstrate to clients that these techniques have been used in the wild.  In some instances, these examples include individual SWFs that were copied to hundreds of web sites.  Therefore, a consultant should look for these specific SWFs on a website when performing an assessment to ensure that they have a current version.''&lt;br /&gt;
&lt;br /&gt;
* [http://web.appsec.ws/FlashExploitDatabase.php Flash Exploit Database] This contains a list of popular, shared SWFs that have cross-site scripting vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
* [http://blog.watchfire.com/wfblog/2010/03/cross-site-scripting-through-flash-in-gmail-based-services.html Cross-site Scripting through Flash in Gmail Based Services] - This is an example of a cross-site scripting vulnerability that was the result of passing tainted data to ExternalInterface.call.&lt;br /&gt;
&lt;br /&gt;
* [http://docs.google.com/Doc?docid=ajfxntc4dmsq_14dt57ssdw XSS Vulnerabilities in Common Flash Files] - This paper by Rich Cannings shows sample attack URLs for individual SWFs that are hosted across hundreds of websites. The techniques demonstrated in this paper for achieving cross-site scripting including using javascript: URLs, asfunction: URLs, and loading malicious child SWFs (aka cross-site Flashing).&lt;br /&gt;
&lt;br /&gt;
* [http://lists.grok.org.uk/pipermail/full-disclosure/2003-April/004514.html clickTAG Cross-site scripting] - It is very common for Flash-based advertisements to accept a FlashVar called, clickTAG. If the clickTAG FlashVar is passed directly to a browser navigation API, such as getURL, then the attacker can achieve cross-site scripting by changing the clickTAG URL to a javascript: URL. Cross-site scripting as the result of a manipulated clickTAG FlashVar is the most common manifestation of cross-site scripting in Flash content. &lt;br /&gt;
&lt;br /&gt;
* [http://jeremiahgrossman.blogspot.com/2008/09/i-used-to-know-what-you-watched-on.html I used to know what you watched on YouTube] - Jeremiah Grossman's blog post regarding his attack on youTube.com's &amp;quot;*.google.com&amp;quot; cross-domain permission.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Testing_for_Cross_site_flashing_(OWASP-DV-004) OWASP Testing Guide: Testing for cross-site flashing] - Covers finding both cross-site scripting and cross-site flashing. &lt;br /&gt;
&lt;br /&gt;
* [http://www.adobe.com/devnet/flashplayer/security.html Adobe Flash Player Developer Center Security section] - Where Adobe posts articles and information related to Flash Player security. &lt;br /&gt;
&lt;br /&gt;
* [http://www.adobe.com/devnet/flashplayer/articles/flash_player10_security_wp.html Adobe Flash Player 10 Security Model] &lt;br /&gt;
&lt;br /&gt;
* [http://www.adobe.com/devnet/flashplayer/articles/flash_player_9_security.pdf Adobe Flash Player 9 Security Model] &lt;br /&gt;
&lt;br /&gt;
* [http://www.adobe.com/support/security/ Adobe Security Bulletins and Advisories] This is where Adobe posts all of their security advisories and bulletins. &lt;br /&gt;
&lt;br /&gt;
* [http://help.adobe.com/en_US/Flex/4.0/UsingSDK/WS2db454920e96a9e51e63e3d11c0bf69084-7f9b.html Applying Flex Security] The security chapter from the Adobe Flex 4 manual. &lt;br /&gt;
&lt;br /&gt;
* [http://help.adobe.com/en_US/ActionScript/3.0_ProgrammingAS3/WS5b3ccc516d4fbf351e63e3d118a9b90204-7d23.html Flash Player Security] The security chapter from the Programming ActionScript 3.0 section the Flash CS4 Documentation. &lt;br /&gt;
&lt;br /&gt;
* [http://help.adobe.com/en_US/Flex/4.0/UsingSDK/WS2db454920e96a9e51e63e3d11c0bf69084-7d14.html Developing and Loading Sub-applications] This Flex SDK framework allows two or more untrusted SWFs to pass limited information between each other through the use of Shared Events.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Useful Specifications  ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.adobe.com/devnet/swf/ SWF File Format Specification] This documents the file format and structure of SWF files. &lt;br /&gt;
&lt;br /&gt;
* [http://www.adobe.com/devnet/actionscript/articles/avm2overview.pdf AVM2 Specification] Describes the Flash ActionScript Virtual Machine used for ActionScript 3.0 code. &lt;br /&gt;
&lt;br /&gt;
* [http://opensource.adobe.com/wiki/download/attachments/1114283/amf3_spec_05_05_08.pdf AMF3 Specification] The specification for version 3 of AMF used by Flash Player. &lt;br /&gt;
&lt;br /&gt;
* [http://opensource.adobe.com/wiki/download/attachments/1114283/amf0_spec_121207.pdf?version=1 AMF0 Specification] The specification for the first generation of AMF (AMF 0) used by Flash Player. &lt;br /&gt;
&lt;br /&gt;
* [http://www.adobe.com/devnet/rtmp/ RTMP Specification] This is the specification for the Real Time Messaging Protocol used by SWF content &lt;br /&gt;
&lt;br /&gt;
* [http://www.adobe.com/devnet/flv/ Video File Format Specification] The FLV/F4V open specification documents the file formats for storing media content used to deliver streaming audio and video for playback in Adobe® Flash® Player and Adobe AIR™ software. &lt;br /&gt;
&lt;br /&gt;
* [http://www.adobe.com/devnet/articles/crossdomain_policy_file_spec.html Cross-domain Policy File Specification] This document serves as a reference for the structure and use of cross-domain policy files.&lt;br /&gt;
&lt;br /&gt;
* [http://www.mozilla.org/projects/tamarin/ Tamarin Open Source Project] The Tamarin virtual machine is used within the Adobe Flash Player and is also being adopted for use by projects outside Adobe. The Tamarin just-in-time compiler (the &amp;quot;NanoJIT&amp;quot;) is a collaboratively developed component used by both Tamarin and Mozilla TraceMonkey. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Third-party Security Libraries  ==&lt;br /&gt;
&lt;br /&gt;
* [http://crypto.hurlant.com/ AS3Crypto] - An ActionScript 3.0 cryptography library. &lt;br /&gt;
&lt;br /&gt;
* [http://code.google.com/p/as3corelib/ as3corelib] - An Adobe sponsored Google Code project that contains ActionScript 3.0 implementations of WS-Security, SHA, MD5 and other utilities. &lt;br /&gt;
&lt;br /&gt;
* [http://labs.adobe.com/wiki/index.php/Alchemy:Libraries Alchemy ActionScript 3 Crypto Wrapper] - An Adobe labs project to port OpenSSL to ActionScript using Alchemy (previously known as Flacc). Includes the SHA1, SHA2, MD5, PKCS12 and AES from OpenSSL. &lt;br /&gt;
&lt;br /&gt;
* [http://code.google.com/p/flash-validators/ flash-validators] - An Adobe sponsored Google Code project that contains ActionScript 2.0 and ActionScript 3.0 data validation libraries. &lt;br /&gt;
&lt;br /&gt;
* [http://bugs.adobe.com/jira/browse/BLZ-415 Protected Messaging Adaptor] - This addition to the latest version of BlazeDS protects against an attack that allows an untrusted individual to subscribe to wildcard sub-topics. This threat is described within this [http://www.jamesward.com/blog/2009/07/22/protected-messaging-in-flex-with-blazeds-and-lcds/ blog] by James Ward.&lt;br /&gt;
&lt;br /&gt;
* [http://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/mx/validators/package-detail.html Flex validators] - Validation routines contained within the Adobe Flex SDK.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Tools  ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:SWFIntruder SWFIntruder] OWASP Flash security testing tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Static Analysis ==&lt;br /&gt;
&lt;br /&gt;
* [http://opensource.adobe.com/wiki/display/flexpmd/FlexPMD FlexPMD] Performs general code analysis with a few security checks.&lt;br /&gt;
&lt;br /&gt;
* [https://www.fortify.com/products/hpfssc/source-code-analyzer.html Fortify Static Code Analyzer] '''($)''' Fortify's SCA supports searching for vulnerabilities within ActionScript 3.0, Flex 3 and Flex 4 applications.&lt;br /&gt;
&lt;br /&gt;
* [http://www.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/#searchdiggity-v-3 FlashDiggity] FlashDiggity is part of the SearchDiggity tool created by the Bishop Fox consulting firm. It will decompile the SWF and use regular expressions to search for strings that are security related.  FlashDiggity automates Google/Bing searching/downloading/decompiling/analysis of SWF files to identify Flash vulnerabilities and information disclosures.&lt;br /&gt;
&lt;br /&gt;
* [http://h30499.www3.hp.com/t5/Following-the-White-Rabbit-A/SWFScan-FREE-Flash-decompiler/ba-p/5440167 SWFScan] This Windows tool decompiles a SWF and performs static analysis to identify common vulnerabilities for both ActionScript 2.0 and ActionScript 3.0 content.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Disassemblers  ==&lt;br /&gt;
&lt;br /&gt;
* [http://labs.adobe.com/technologies/swfinvestigator/ Adobe SWF Investigator] An Adobe Labs project that performs disassembly of ActionScript 2 and ActionScript 3. Also shows SWF Tag information.&lt;br /&gt;
&lt;br /&gt;
* [http://flasm.sourceforge.net/ Flasm] Flasm provides both disassembly and assembly functionality. &lt;br /&gt;
&lt;br /&gt;
* [http://www.docsultant.com/nemo440/ Nemo440] Nemo440 is an AIR based ActionScript 3.0 disassembler. &lt;br /&gt;
&lt;br /&gt;
* [http://opensource.adobe.com/svn/opensource/flex/sdk/trunk/bin/ swfdump] The Adobe Flex SDK, when built with ant, creates the swfdump utility ([http://blogs.adobe.com/gosmith/2008/02/disassembling_a_swf_with_swfdu_1.html overview]). &lt;br /&gt;
&lt;br /&gt;
* [http://code.google.com/p/erlswf/ ErlSWF] A SWF disassembly tool based authored in Erlang &lt;br /&gt;
&lt;br /&gt;
* [http://www.masonchang.com/2008/06/building-abcdump.html abcdump] The abcdump tool can be built from the tamarin source tree to disassemble AS3 byte code. &lt;br /&gt;
&lt;br /&gt;
* [http://www.sweetscape.com/010editor/ 010Editor] This commercial tool has a [http://www.sweetscape.com/010editor/templates/files/SWFTemplate.bt template] for analyzing AS2 byte code.&lt;br /&gt;
&lt;br /&gt;
* [http://segfaultlabs.com/swfutils swfutils] An ActionScript 3 library for disassembling SWF files.&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/CyberShadow/RABCDAsm#readme RABCDAsm]  RABCDAsm is a collection of utilities including an ActionScript 3 assembler/disassembler, and a few tools to manipulate SWF files.&lt;br /&gt;
&lt;br /&gt;
* [http://yogda.2ka.org/ Yogda AVM2 Workbench] Yogda® is a development tool for intermediate/advanced actionscript programmers. It includes an AVM2 disassembler.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Decompilers  ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.flash-decompiler.com/ Flash Decompiler Trillix] '''($):''' Windows and Mac versions. Supports ActionScript 2.0 and ActionScript 3.0, Flash 5, 6, 7, 8, 9, 10, Flash CS5 and Flex. Able to extract resources,edit SWF elements and provide a source FLA file. Costs @ $80 plus tax/shipping. &lt;br /&gt;
&lt;br /&gt;
* [http://www.swfwire.com/inspector SWFWire Inspector] An open source AIR application for viewing images, shapes, and even syntax-highlighted ActionScript 3 within SWF files.&lt;br /&gt;
&lt;br /&gt;
* [https://h30406.www3.hp.com/campaigns/2009/wwcampaign/1-5TUVE/index.php?key=swf SWFScan] This Windows tool decompiles a SWF and performs static analysis to identify common vulnerabilities for both ActionScript 2.0 and ActionScript 3.0 content.&lt;br /&gt;
&lt;br /&gt;
* [http://www.nowrap.de/flare.html Flare] Flare ActionScript 2.0 decompiler for Windows, Linux and Mac OS X. &lt;br /&gt;
&lt;br /&gt;
* [http://www.buraks.com/asv/ Buraks ActionScript Viewer] '''($):''' An ActionScript 2.0 and ActionScript 3.0 decompiler that is able to extract resources and provide a rough FLA file. Costs @ $80 plus tax/shipping. &lt;br /&gt;
&lt;br /&gt;
* [http://www.sothink.com/product/flashdecompiler/ SoThink Flash Decompiler] '''($):''' An ActionScript 2.0 and ActionScript 3.0 decompiler that is able to extract resources and provide a rough FLA file. Costs @ $80 plus tax/shipping. &lt;br /&gt;
&lt;br /&gt;
* [http://www.dcomsoft.com/download/dfdinstall.exe Dump Flash Decompiler] Freeware program that treats compressed and decompressed SWF-files and shows the detailed structure in the tree form. Windows. &lt;br /&gt;
&lt;br /&gt;
* [http://www.free-decompiler.com/flash/ JPEXS Free Flash Decompiler (FFDec)] JPEXS Free Flash Decompiler (FFDec) is free opensource Flash SWF Decompiler. Program can view source code of ActionScript 1/2 or 3 parts, export it or edit (p-code editor for AS3). Texts or images can be edited or replaced. The SWF decompiler can also export shapes, images, sounds or movies. SWF to FLA format conversion is also available. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Obfuscators / De-obfuscators  ==&lt;br /&gt;
&lt;br /&gt;
It should be noted that no obfuscator can protect a SWF from being reverse engineered. An attacker will always be able to extract data from SWFs if they believe it is worth the effort. Obfuscators are only serve as a deterrent for preventing casual inspection of the SWF.&lt;br /&gt;
&lt;br /&gt;
It should also be noted that some obfuscators generate SWFs that do not conform to the Adobe SWF file format specification. Flash Player may still be able to play them but they do not conform to the spec. This could lead to some security tools such as Blitzablieter rejecting them as potentially malicious.&lt;br /&gt;
&lt;br /&gt;
*[https://github.com/F-Secure/Sulo Sulo] Sulo is an open-source project from F-Secure. It can log decrypted strings from SecureSWF-protected files and it can dynamically save swf objects loaded with Loader.loadBytes() to disk.&lt;br /&gt;
&lt;br /&gt;
*[http://sourceforge.net/p/swf-reader/wiki/Home/ SWF Reader] SWF Reader can edit and deobfuscate SWFs. It has implemented a few deobfuscators for AS2 and AS3 Flash but mostly concentrates on AS3 SWFs&lt;br /&gt;
&lt;br /&gt;
*[http://www.buraks.com/swfrul/ SWF Revealer] There are two versions of Buraks SWF Revealer. This link points to one version. There is another version is which is an add-on to Buraks ActionScript Viewer.&lt;br /&gt;
&lt;br /&gt;
*[http://swfid.zz.mu/ SWF ID] Detect common SWF protectors, SWF obfuscators, SWF cryptors and SWF compilers.&lt;br /&gt;
&lt;br /&gt;
*[http://www.dcomsoft.com/ DComSoft SWF Protector] '''($):''' ActionScript 2.0/3.0 obfuscator for protecting your SWF files from Flash Decompilers. Available for Windows, Mac OS, Linux. Costs approximately $40.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Local Shared Object Editors  ==&lt;br /&gt;
&lt;br /&gt;
* [http://labs.adobe.com/technologies/swfinvestigator/ Adobe SWF Investigator] Cross-platform tool for viewing and editing LSOs.&lt;br /&gt;
&lt;br /&gt;
* [http://blog.coursevector.com/flashbug Flashbug] An extension for the Firefox Firebug plugin.&lt;br /&gt;
&lt;br /&gt;
* [http://solve.sourceforge.net/ SolVE] Cross-platform Local Shared Object editor and viewer. &lt;br /&gt;
&lt;br /&gt;
* [http://sourceforge.net/projects/soleditor/ .sol Editor] Windows based Local Shared Object editor &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== AMF Tools  ==&lt;br /&gt;
&lt;br /&gt;
* [http://labs.adobe.com/technologies/swfinvestigator/ Adobe SWF Investigator] Allows sending of custom messages, simple fuzzing and service identification of AMF endpoints.&lt;br /&gt;
&lt;br /&gt;
* [http://blog.coursevector.com/flashbug Flashbug] An extension for the Firefox Firebug plugin that allows you to view AMF data sent to and from the page to the server.&lt;br /&gt;
&lt;br /&gt;
* [http://deblaze-tool.appspot.com/ DeBlaze] A free tool that attempts to identify AMF services through brute force, dictionary attacks. &lt;br /&gt;
&lt;br /&gt;
* [http://www.gdssecurity.com/l/t/d.php?k=Blazentoo Blazentoo] Blazentoo is an Adobe AIR application that can be used to exploit insecure Adobe BlazeDS and LiveCycle Data Services ES servers. Blazentoo provides the ability to seamlessly browse web content, abusing insecurely configured Proxy Services.&lt;br /&gt;
&lt;br /&gt;
* [http://code.google.com/p/blazer/ Blazer] Blazer is a custom AMF messages generator with fuzzing capabilities, developed as Burp Suite plugin. It is designed and implemented to make AMF testing easy, and yet allows researchers to control fully the entire security testing process.&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Full AMF support is currently checked into the main branch of the WebScarab project. It has not been rolled into the SourceForge or Java Web Start versions of the WebScarab project at the time of this writing. &lt;br /&gt;
&lt;br /&gt;
* [http://code.google.com/p/webscarab-amf-plugin/ WebScarab AMF Plugin] This is a google code project to add AMF support as a plugin to WebScarab.&lt;br /&gt;
&lt;br /&gt;
* [http://amfparser.codeplex.com/ AMF Parser] AMFParser plugin for Fiddler2 web debugger. It can be used for parsing and displaying AMF data inside HTTP's POST requests and responses.&lt;br /&gt;
&lt;br /&gt;
* [http://code.google.com/p/pinta/ pinta] Pinta is a utility that allows a developer to test services by making custom AMF service calls, and viewing detailed output. This Google Code project is based on Adobe AIR. &lt;br /&gt;
&lt;br /&gt;
* [http://www.charlesproxy.com/ Charles Proxy] '''($):''' This is a basic HTTP proxy but it provides support for interpreting AMF communications. Costs approximately $50. &lt;br /&gt;
&lt;br /&gt;
* [http://releases.portswigger.net/2009/08/v1214.html Burp Suite Professional] '''($):''' The 1.2.124 version of Burp Suite Pro adds AMF support to all tools except for Burp Intruder and Burp Scanner is updated to automatically place attack payloads within string-based AMF values. &lt;br /&gt;
&lt;br /&gt;
* [http://george.hedfors.com/content/action-message-format-amf-shell AMF Shell] AMF Shell is a command line utility based on Python that enumerates services and allows the user to send customized AMF messages to a server. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Cross-Domain Tools ==&lt;br /&gt;
&lt;br /&gt;
* [http://web.appsec.ws/Tools/Crossdomain.swf Cross-domain Policy Analyzer] A tool to test your cross-domain policy file by Jason Calvert of WhiteHat Security.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Analysis  ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.utdallas.edu/~mxs072100/ASIRM_project.html Certifying IRM for ActionScript Bytecode] This page contains the binaries for Meera Sridhar's research into using In-lined Reference Monitors to rewrite ActionScript bytecode for the purposes of policy enforcement.  This project is currently targeted at AVM2 code.&lt;br /&gt;
&lt;br /&gt;
* [http://blitzableiter.recurity.com/ Blitzablieter] Blitzablieter is a project currently run by Recurity Labs and the German government. The goal is to prevent malicious SWFs from entering a network through normalization and policy enforcement.  This project currently handles AVM1 code.&lt;br /&gt;
&lt;br /&gt;
* [http://wepawet.iseclab.org/ Wepawet] Wepawet is a service for detecting and analyzing web-based malware. It currently handles Flash, JavaScript, and PDF files. It is currently run by University of California, Santa Barbara.&lt;br /&gt;
&lt;br /&gt;
*  [https://github.com/sporst/SWFREtools/ SWFRETools] The SWFRETools are a collection of tools built for vulnerability analysis of the Adobe Flash player and for malware analysis of malicious SWF files. The tools are partly written in Java and partly in Python and are licensed under the GPL 2.0 license.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Contributors  ==&lt;br /&gt;
&lt;br /&gt;
The Flash Security project is run by [[:User:Puhley|Peleus Uhley]]. &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
The Flash Security project is sponsored by [http://www.mindedsecurity.com [[Image:|MindedLogo.PNG]]] &lt;br /&gt;
&lt;br /&gt;
==== Project Identification  ====&lt;br /&gt;
&lt;br /&gt;
{{Template:Project Details/OWASP_Flash_Security_Project | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|Flash Security Project]] [[Category:OWASP_Download]] [[Category:OWASP_Tool]] [[Category:OWASP_Document]] [[Category:OWASP_Alpha_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Fran Brown</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Research_for_SharePoint_(MOSS)&amp;diff=185807</id>
		<title>Research for SharePoint (MOSS)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Research_for_SharePoint_(MOSS)&amp;diff=185807"/>
				<updated>2014-11-24T12:28:28Z</updated>
		
		<summary type="html">&lt;p&gt;Fran Brown: Added tool:  McAfee Network Discovery for Microsoft SharePoint&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains research notes on Microsoft's SharePoint MOSS and WSS&lt;br /&gt;
&lt;br /&gt;
== Resources==&lt;br /&gt;
&lt;br /&gt;
==== Microsoft resources====&lt;br /&gt;
* [http://office.microsoft.com/download/afile.aspx?AssetID=AM102437421033 Security Architecture for SharePoint Products and Technologies] (Word Doc)&lt;br /&gt;
* [http://sharepoint.microsoft.com SharePoint Community Portal]&lt;br /&gt;
* [http://technet.microsoft.com/en-us/library/cc262619.aspx Downloadable book: Security for Office SharePoint Server 2007] - [http://go.microsoft.com/fwlink/?LinkID=94375 link to 277 page Doc file]&lt;br /&gt;
* [http://blogs.msdn.com/arpans/archive/2008/05/09/sharepoint-end-user-security.aspx SharePoint End User Security]&lt;br /&gt;
&lt;br /&gt;
==== Other Resources and Documentation====&lt;br /&gt;
* [http://www.finalcandidate.com/en/tandp/Pages/SharePointSecurityConcepts.aspx SharePoint Security Concepts] - contains a number of other links to more material&lt;br /&gt;
* [http://blogs.gartner.com/neil_macdonald/2009/02/25/sharepoint-security-best-practices/ SharePoint Security Best Practices] - $995 Gartner report &lt;br /&gt;
* [http://sharepointmagazine.net/technical/administration/microsoft-office-sharepoint-server-2007-security-model Microsoft Office SharePoint Server 2007 Security Model]&lt;br /&gt;
* [http://www.cmswire.com/cms/enterprise-cms/sharepoint-security-concerns-simply-a-lack-of-governance-003551.php SharePoint Security Concerns Simply a Lack of Governance?]&lt;br /&gt;
* [http://www.cmswire.com/cms/enterprise-cms/governance-key-for-sharepoint-implementations-003123.php Governance Key for SharePoint Implementations]&lt;br /&gt;
* [http://www.bishopfox.com/files/articles/2012/Information%20Security%20Magazine%20JulyAug2012-SharePoint.pdf SearchSecurity – Securing SharePoint: SharePoint security best practices] - Information Security Magazine July/Aug2012 - Volume 14 - Locking Down Sharepoint - Businesses love Microsoft’s collaboration software but can forget to secure it.&lt;br /&gt;
&lt;br /&gt;
==== Presentations ====&lt;br /&gt;
* Bishop Fox - HackCon 2011 - Oslo, Norway - February 16, 2011 : [http://www.bishopfox.com/files/slides/2011/HackCon%202011%20-%20SharePoint%20Security%20-%20Feb2011.pdf SharePoint Security: Advanced SharePoint Security Tips and Tools]&lt;br /&gt;
* OWASP Houston Chapter - August 12, 2009 :  [http://owasp.icrew.org/downloads/OWASP_ShohnTrojacek.pdf SharePoint Auditing and Penetration Testing] Presentation by:  Shohn Trojacek&lt;br /&gt;
* from Denim group:&lt;br /&gt;
** [http://www.denimgroup.com/media/pdfs/DenimGroup_SecuringSharePoint_TASSCCTEC2009_20090326.pdf Securing SharePoint (PDF Format)] - TASSCC Technology Education Conference in Austin, March 26, 2009&lt;br /&gt;
** [http://www.denimgroup.com/media/pdfs/DenimGroup_SecuringSharePoint_TRISC_20090324.pdf Securing Sharepoint (PDF Format)] - Texas Regional Infrastructure Security Conference (TRISC) in Austin, March 24, 2009&lt;br /&gt;
** [http://sp.meetdux.com/archive/2009/07/08/a-primer-to-sharepoint-security.aspx A Primer to SharePoint Security] - video&lt;br /&gt;
&lt;br /&gt;
==== Other interesting resources====&lt;br /&gt;
* [http://www.indeed.com.au/jobs?q=Moss+Security&amp;amp;l= MOSS Security jobs (in Australia)]&lt;br /&gt;
* [http://www.cmswire.com/news/topic/sharepoint Articles on CMSWire about SharePoint]&lt;br /&gt;
&lt;br /&gt;
==== Other Blogs and Articles ====&lt;br /&gt;
* [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=212903345 Microsoft SharePoint: A Weak Link In Enterprise Security?] - Dark Reading&lt;br /&gt;
&lt;br /&gt;
==== Security related technical articles ====&lt;br /&gt;
* [http://www.sharepointsecurity.com/sharepoint/sharepoint-security/how-to-programmatically-disable-code-access-security/ How to Programmatically Disable Code Access Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Published Security issues ==&lt;br /&gt;
&lt;br /&gt;
=== SharePoint related vulnerabilities and its status ===&lt;br /&gt;
* {Note: Add MSRC case}&lt;br /&gt;
* http://milw0rm.com/exploits/8704 &amp;amp; http://milw0rm.com/sploits/2009-IIS-Advisory.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== MOSS Security related WebParts, Tools  &amp;amp; services ==&lt;br /&gt;
&lt;br /&gt;
==== Open Source ====&lt;br /&gt;
* From CodePlex (see more on this search for [http://www.codeplex.com/site/search?ProjectSearchText=Sharepoint%20Security SharePoint Security]&lt;br /&gt;
** [http://securitytemplates.codeplex.com/ SharePoint Security Templates] (CodePlex)&lt;br /&gt;
** [http://spsecurity.codeplex.com/ SharePoint Security Configuration Feature]&lt;br /&gt;
** [http://accesschecker.codeplex.com Sharepoint Access Checker Web Part]&lt;br /&gt;
** [http://sitesecuritymgmt.codeplex.com/ Site Security Management Utility]&lt;br /&gt;
** [http://cryptocollaboration.codeplex.com/ CryptoCollaboration For SharePoint]&lt;br /&gt;
&lt;br /&gt;
==== Commercially Supported ====&lt;br /&gt;
* [http://www.sharepointsecurity.com ARB Security Solutions (www.sharepointsecurity.com)]&lt;br /&gt;
* [http://www.surety.com/Offerings/AbsoluteProof/For-MS-SharePoint.aspx AbsoluteProof for MS SharePoint] - related article [http://www.cmswire.com/cms/enterprise-cms/surety-releases-absoluteproof-for-sharepoint-002471.php Surety Releases AbsoluteProof for SharePoint]&lt;br /&gt;
* [http://www.avepoint.com/assets/pdf/Social_Security_Administration_Case_Study.pdf Sharepoint case study (marketing doc)]&lt;br /&gt;
&lt;br /&gt;
== Dangerous MOSS APIs ==&lt;br /&gt;
&lt;br /&gt;
Map the security implications of MOSS APIs, for example:&lt;br /&gt;
*  which APIs (if badly used)are vulnerable to: XSS, CSRF, SQL Injection&lt;br /&gt;
* configuration settings that have security implications&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SharePoint Hacking ==&lt;br /&gt;
==== SharePoint Hacking Tools ====&lt;br /&gt;
* [http://extensions.professionallyevil.com/beef.php SharePoint Enumerator | Professionally Evil] - This is a collection of 4 modules that help enumerate the SharePoint server the victim is connected to.&lt;br /&gt;
* [http://sparty.secniche.org/ Sparty] - MS Sharepoint and Frontpage Auditing Tool&lt;br /&gt;
* [https://github.com/toddsiegel/spscan SPScan] - SharePoint scanner and fingerprinter based on WPScan&lt;br /&gt;
* [http://www.mcafee.com/us/downloads/free-tools/sharepoint-discovery.aspx McAfee Network Discovery for Microsoft SharePoint]&lt;br /&gt;
* [http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ Bishop Fox - SharePoint Hacking Diggity Project] - SharePoint hacking tools project page.  Currently includes such hacking tools as:&lt;br /&gt;
** [http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/attack-tools/#google-and-bing-hacking-dictionary-files SharePoint – Google and Bing Diggity Dictionary Files] - New GoogleDiggity input dictionary file containing 121 queries that allow users to uncover SharePoint specific vulnerabilities exposed via the Google search engine. This dictionary helps assessors locate exposures of common SharePoint administrative pages, web services, and site galleries that an organization typically would not want to be made available to the public, let alone indexed by Google.  Recently, we’ve also created a Bing hacking dictionary (124 Bing queries) that can be imported into BingDiggity and used to identify SharePoint exposures as well.&lt;br /&gt;
** [http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/attack-tools/#sharepoint-hacking-alerts-for-google-and-bing SharePoint Hacking Alerts for Google and Bing] - SharePoint Hacking Alerts provide real-time vulnerability updates from both the Google and Bing search engines.  These convenient RSS feeds help locate exposures of common SharePoint administrative pages, web services, and site galleries that an organization typically would not want to be made available to the public, let alone indexed by Google and Bing.  [http://www.google.com/alerts Google Alerts] have been created for all SharePoint related search strings, which generate a new alert each time newly indexed pages by Google match one of those regular expressions.  Microsoft Bing’s &amp;amp;format=rss directive was used to turn Bing searches into RSS feeds.&lt;br /&gt;
** [http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/attack-tools/#sharepointurlbrute SharePointURLBrute] - SharePointURLBrute is a new SharePoint hacking utility developed to help assessors quickly test user access to 101 common SharePoint administrative pages (e.g. “Add Users” page -&amp;gt; /_layouts/aclinv.aspx) by automating forceful browsing attacks.&lt;br /&gt;
** [http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/attack-tools/#sharepoint-userdispenum SharePoint UserDispEnum] - UserDispEnum is a new SharePoint user enumeration tool that exploits insecure access controls to the /_layouts/UserDisp.aspx?ID=1 page. This utility cycles through the integer ID values from 1 onward to identify valid users, account names, and other related profile information that can be easily extracted from the SharePoint user profiles.  For real, live examples of SharePoint site deployments insecurely exposing this functionality to anonymous users on the Internet, see Google results of: “http://www.google.com/#q=inurl:”/_layouts/userdisp.aspx”. Users can leverage [http://www.bishopfox.com/resources/tools/google-hacking-diggity/ Bishop Fox’s GoogleDiggity hacking tools] to identify these exposures within their own organization, and then employ the UserDispEnum tool to exploit them during penetration tests.&lt;br /&gt;
** [http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/attack-tools/#sharepoint-dlp-tools SharePoint DLP Tools] - COMING SOON – Bishop Fox's data loss prevention (DLP) tools for Microsoft SharePoint. SharePoint DLP Tools utilize administrative web services to help automate the searching of SharePoint files and lists for SSNs, credit card numbers, passwords, and other common information disclosures.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== SharePoint Hacking Presentations ====&lt;br /&gt;
* '''2008'''&lt;br /&gt;
** [http://www.youtube.com/watch?v=DYudvh9cfZM hak5 - Episode 407 - Toorcon 2008: Robin Wood, Dan Griffin] - see 11:10 minute mark in video for interview with Dan Griffin about SharePoint Hacking.&lt;br /&gt;
* '''2012'''&lt;br /&gt;
** [http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/presentation-slides/ Bishop Fox - SharePoint Hacking Diggity Project - Presentations]:&lt;br /&gt;
*** OWASP L.A. 2012 - Los Angeles, CA - February 22, 2012 : [http://www.bishopfox.com/files/slides/2012/OWASP%20LA%20-%20SharePoint%20Hacking%20-%2022Feb2012.pdf SharePoint Hacking: Advanced SharePoint Security Tips and Tools]&lt;br /&gt;
* '''2013'''&lt;br /&gt;
** [http://www.youtube.com/watch?feature=player_embedded&amp;amp;v=AAObW2fcB_s TMI: Assessing and Exploiting SharePoint at DerbyCon 3.0]&lt;br /&gt;
** [https://media.blackhat.com/us-13/Arsenal/us-13-Sood-Sparty-Slides.pdf Sparty - Blackhat USA 2013] Sparty : A Frontpage and Sharepoint Auditing Tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WebParts Security ==&lt;br /&gt;
&lt;br /&gt;
* Security ratings &amp;amp; mappings of MOSS Deployed Web Parts&lt;br /&gt;
* Security ratings &amp;amp; mappings of 3rd Part Web Parts&lt;/div&gt;</summary>
		<author><name>Fran Brown</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=185801</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=185801"/>
				<updated>2014-11-24T07:48:42Z</updated>
		
		<summary type="html">&lt;p&gt;Fran Brown: Stach &amp;amp; Liu rebranded as &amp;quot;Bishop Fox&amp;quot;.  Updated links accordingly.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:pete.roalofs@owasp.org Pete Roalofs] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
No meetings currently scheduled. Join the mailing list for meeting announcements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;'''Thanks everyone for supporting CactusCon, over 320 people attended!  OWASP Phoenix was a partner sponsor.'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2014 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are on the first Tuesday of the month,  6:30 PM - 7:30 PM, for 1 hour. &lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2014 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2014 schedule TBD&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every month, typically with one or two speakers at each meeting. &lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fran Brown</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)&amp;diff=185800</id>
		<title>Conduct search engine discovery/reconnaissance for information leakage (OTG-INFO-001)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)&amp;diff=185800"/>
				<updated>2014-11-24T07:45:43Z</updated>
		
		<summary type="html">&lt;p&gt;Fran Brown: Stach &amp;amp; Liu rebranded as &amp;quot;Bishop Fox&amp;quot;.  Updated links accordingly.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
There are direct and indirect elements to search engine discovery and reconnaissance. Direct methods relate to searching the indexes and the associated content from caches. Indirect methods relate to gleaning sensitive design and configuration information by searching forums, newsgroups, and tendering websites.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once a search engine robot has completed crawling, it commences indexing the web page based on tags and associated attributes, such as &amp;lt;TITLE&amp;gt;, in order to return the relevant search results [1]. If the robots.txt file is not updated during the lifetime of the web site, and inline HTML meta tags that instruct robots not to index content have not been used, then it is possible for indexes to contain web content not intended to be included in by the owners. Website owners may use the previously mentioned robots.txt, HTML meta tags, authentication, and tools provided by search engines to remove such content.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Test Objectives ==&lt;br /&gt;
&lt;br /&gt;
To understand what sensitive design and configuration information of the application/system/organization is exposed both directly (on the organization's website) or indirectly (on a third party website).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== How to Test ==&lt;br /&gt;
&lt;br /&gt;
Use a search engine to search for:&lt;br /&gt;
* Network diagrams and configurations&lt;br /&gt;
* Archived posts and emails by administrators and other key staff&lt;br /&gt;
* Log on procedures and username formats&lt;br /&gt;
* Usernames and passwords&lt;br /&gt;
* Error message content&lt;br /&gt;
* Development, test, UAT and staging versions of the website&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Search operators ===&lt;br /&gt;
Using the advanced &amp;quot;site:&amp;quot; search operator, it is possible to restrict search results to a specific domain [2]. Do not limit testing to just one search engine provider as they may generate different results depending on when they crawled content and their own algorithms. Consider using the following search engines:&lt;br /&gt;
&lt;br /&gt;
* Baidu&lt;br /&gt;
* binsearch.info&lt;br /&gt;
* Bing&lt;br /&gt;
* Duck Duck Go&lt;br /&gt;
* ixquick/Startpage&lt;br /&gt;
* Google&lt;br /&gt;
* Shodan&lt;br /&gt;
* PunkSpider&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Duck Duck Go and ixquick/Startpage provide reduced information leakage about the tester.&lt;br /&gt;
&lt;br /&gt;
Google provides the Advanced &amp;quot;cache:&amp;quot; search operator [2], but this is the equivalent to clicking the &amp;quot;Cached&amp;quot; next to each Google Search Result.  Hence, the use of the Advanced &amp;quot;site:&amp;quot; Search Operator and then clicking &amp;quot;Cached&amp;quot; is preferred. &lt;br /&gt;
&lt;br /&gt;
The Google SOAP Search API supports the doGetCachedPage and the associated doGetCachedPageResponse SOAP Messages [3] to assist with retrieving cached pages. An implementation of this is under development by the [[::Category:OWASP_Google_Hacking_Project |OWASP &amp;quot;Google Hacking&amp;quot; Project]].&lt;br /&gt;
&lt;br /&gt;
PunkSpider is web application vulnerability search engine. It is of little use for a penetration tester doing manual work. However it can be useful as demonstration of easiness of finding vulnerabilities by script-kiddies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Example'''&lt;br /&gt;
To find the web content of owasp.org indexed by a typical search engine, the syntax required is:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
site:owasp.org&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
[[Image:Google_site_Operator_Search_Results_Example_20121219.jpg||border]]&lt;br /&gt;
&lt;br /&gt;
To display the index.html of owasp.org as cached, the syntax is:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
cache:owasp.org&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
[[Image:Google_cache_Operator_Search_Results_Example_20121219.jpg||border]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Google Hacking Database ===&lt;br /&gt;
&lt;br /&gt;
The Google Hacking Database is list of useful search queries for Google. Queries are put in several categories:&lt;br /&gt;
* Footholds&lt;br /&gt;
* Files containing usernames&lt;br /&gt;
* Sensitive Directories&lt;br /&gt;
* Web Server Detection&lt;br /&gt;
* Vulnerable Files&lt;br /&gt;
* Vulnerable Servers&lt;br /&gt;
* Error Messages&lt;br /&gt;
* Files containing juicy info&lt;br /&gt;
* Files containing passwords&lt;br /&gt;
* Sensitive Online Shopping Info&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
[4] FoundStone SiteDigger - http://www.mcafee.com/uk/downloads/free-tools/sitedigger.aspx &amp;lt;br&amp;gt;&lt;br /&gt;
[5] Google Hacker - http://yehg.net/lab/pr0js/files.php/googlehacker.zip&amp;lt;br&amp;gt;&lt;br /&gt;
[6] Bishop Fox's Google Hacking Diggity Project - http://www.bishopfox.com/resources/tools/google-hacking-diggity/ &amp;lt;br&amp;gt;&lt;br /&gt;
[7] PunkSPIDER - http://punkspider.hyperiongray.com/ &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Web'''&amp;lt;br&amp;gt;&lt;br /&gt;
[1] &amp;quot;Google Basics: Learn how Google Discovers, Crawls, and Serves Web Pages&amp;quot; - https://support.google.com/webmasters/answer/70897 &amp;lt;br&amp;gt;&lt;br /&gt;
[2] &amp;quot;Operators and More Search Help&amp;quot; - https://support.google.com/websearch/answer/136861?hl=en &amp;lt;br&amp;gt;&lt;br /&gt;
[3] &amp;quot;Google Hacking Database&amp;quot; - http://www.exploit-db.com/google-dorks/ &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Remediation ==&lt;br /&gt;
Carefully consider the sensitivity of design and configuration information before it is posted online.&lt;br /&gt;
&lt;br /&gt;
Periodically review the sensitivity of existing design and configuration information that is posted online.&lt;/div&gt;</summary>
		<author><name>Fran Brown</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Appendix_A:_Testing_Tools&amp;diff=185799</id>
		<title>Appendix A: Testing Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Appendix_A:_Testing_Tools&amp;diff=185799"/>
				<updated>2014-11-24T07:41:07Z</updated>
		
		<summary type="html">&lt;p&gt;Fran Brown: Stach &amp;amp; Liu rebranded as &amp;quot;Bishop Fox&amp;quot;.  Updated links accordingly.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
==Open Source Black Box Testing tools==&lt;br /&gt;
&lt;br /&gt;
=== General Testing ===&lt;br /&gt;
* '''[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project OWASP ZAP]'''&lt;br /&gt;
**The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.&lt;br /&gt;
**ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.&lt;br /&gt;
* '''[[OWASP_WebScarab_Project|OWASP WebScarab]]'''&lt;br /&gt;
** WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is portable to many platforms. WebScarab has several modes of operation that are implemented by a number of plugins.&lt;br /&gt;
* '''[[OWASP_CAL9000_Project|OWASP CAL9000]]'''&lt;br /&gt;
** CAL9000 is a collection of browser-based tools that enable more effective and efficient manual testing efforts.&lt;br /&gt;
** Includes an XSS Attack Library, Character Encoder/Decoder, HTTP Request Generator and Response Evaluator, Testing Checklist, Automated Attack Editor and much more.&lt;br /&gt;
*  '''[[:Category:OWASP Pantera Web Assessment Studio Project|OWASP Pantera Web Assessment Studio Project]]'''&lt;br /&gt;
** Pantera uses an improved version of SpikeProxy to provide a powerful web application analysis engine. The primary goal of Pantera is to combine automated capabilities with complete manual testing to get the best penetration testing results.&lt;br /&gt;
* '''[[:OWASP Mantra - Security Framework]]'''&lt;br /&gt;
**Mantra is a web application security testing framework built on top of a browser. It supports Windows, Linux(both 32 and 64 bit) and Macintosh. In addition, it can work with other software like ZAP using built in proxy management function which makes it much more convenient. Mantra is available in 9 languages: Arabic, Chinese - Simplified, Chinese - Traditional, English, French, Portuguese, Russian, Spanish and Turkish.&lt;br /&gt;
* '''SPIKE''' - http://www.immunitysec.com/resources-freesoftware.shtml&lt;br /&gt;
** SPIKE designed to analyze new network protocols for buffer overflows or similar weaknesses. It requires a strong knowledge of C to use and only available for the Linux platform.&lt;br /&gt;
* '''Burp Proxy''' - http://www.portswigger.net/Burp/&lt;br /&gt;
** Burp Proxy is an intercepting proxy server for security testing of web applications it allows Intercepting and modifying all HTTP(S) traffic passing in both directions, it can work with custom SSL certificates and non-proxy-aware clients.&lt;br /&gt;
* '''Odysseus Proxy''' - http://www.wastelands.gen.nz/odysseus/&lt;br /&gt;
** Odysseus is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical HTTP proxy will relay packets to and from a client browser and a web server. It will intercept an HTTP session's data in either direction.&lt;br /&gt;
* '''Webstretch Proxy''' - http://sourceforge.net/projects/webstretch&lt;br /&gt;
** Webstretch Proxy enable users to view and alter all aspects of communications with a web site via a proxy. It can also be used for debugging during development. &lt;br /&gt;
*  '''WATOBO''' - http://sourceforge.net/apps/mediawiki/watobo/index.php?title=Main_Page&lt;br /&gt;
** WATOBO works like a local proxy, similar to Webscarab, ZAP or BurpSuite and it supports passive and active checks.&lt;br /&gt;
* '''Firefox LiveHTTPHeaders''' - https://addons.mozilla.org/en-US/firefox/addon/live-http-headers/&lt;br /&gt;
** View HTTP headers of a page and while browsing.&lt;br /&gt;
* '''Firefox Tamper Data''' - https://addons.mozilla.org/en-US/firefox/addon/tamper-data/&lt;br /&gt;
** Use tamperdata to view and modify HTTP/HTTPS headers and post parameters&lt;br /&gt;
* '''Firefox Web Developer Tools''' - https://addons.mozilla.org/en-US/firefox/addon/web-developer/&lt;br /&gt;
** The Web Developer extension adds various web developer tools to the browser.&lt;br /&gt;
* '''DOM Inspector''' - https://developer.mozilla.org/en/docs/DOM_Inspector&lt;br /&gt;
**  DOM Inspector is a developer tool used to inspect, browse, and edit the Document Object Model (DOM)&lt;br /&gt;
* '''Firefox Firebug''' - http://getfirebug.com/&lt;br /&gt;
** Firebug integrates with Firefox to edit, debug, and monitor CSS, HTML, and JavaScript.&lt;br /&gt;
* '''Grendel-Scan''' - http://securitytube-tools.net/index.php?title=Grendel_Scan&lt;br /&gt;
** Grendel-Scan is an automated security scanning of web applications and also supports manual penetration testing.&lt;br /&gt;
*  '''OWASP SWFIntruder''' - http://www.mindedsecurity.com/swfintruder.html&lt;br /&gt;
** SWFIntruder (pronounced Swiff Intruder) is the first tool specifically developed for analyzing and testing security of Flash applications at runtime.&lt;br /&gt;
* '''SWFScan''' - http://h30499.www3.hp.com/t5/Following-the-Wh1t3-Rabbit/SWFScan-FREE-Flash-decompiler/ba-p/5440167 &lt;br /&gt;
** Flash decompiler&lt;br /&gt;
*  '''Wikto''' - http://www.sensepost.com/labs/tools/pentest/wikto&lt;br /&gt;
** Wikto features including fuzzy logic error code checking, a back-end miner, Google-assisted directory mining and real time HTTP request/response monitoring.&lt;br /&gt;
* '''w3af''' - http://w3af.org&lt;br /&gt;
** w3af is a Web Application Attack and Audit Framework. The project’s goal is finding and exploiting web application vulnerabilities.&lt;br /&gt;
* '''skipfish''' - http://code.google.com/p/skipfish/&lt;br /&gt;
** Skipfish is an active web application security reconnaissance tool.&lt;br /&gt;
* '''Web Developer toolbar''' - https://chrome.google.com/webstore/detail/bfbameneiokkgbdmiekhjnmfkcnldhhm&lt;br /&gt;
** The Web Developer extension adds a toolbar button to the browser with various web developer tools. This is the official port of the Web Developer extension for Firefox.&lt;br /&gt;
* '''HTTP Request Maker''' - https://chrome.google.com/webstore/detail/kajfghlhfkcocafkcjlajldicbikpgnp?hl=en-US&lt;br /&gt;
** Request Maker is a tool for penetration testing. With it you can easily capture requests made by web pages, tamper with the URL, headers and POST data and, of course, make new requests&lt;br /&gt;
* '''Cookie Editor''' - https://chrome.google.com/webstore/detail/fngmhnnpilhplaeedifhccceomclgfbg?hl=en-US&lt;br /&gt;
** Edit This Cookie is a cookie manager. You can add, delete, edit, search, protect and block cookies&lt;br /&gt;
* '''Cookie swap''' - https://chrome.google.com/webstore/detail/dffhipnliikkblkhpjapbecpmoilcama?hl=en-US&lt;br /&gt;
** Swap My Cookies is a session manager, it manages cookies, letting you login on any website with several different accounts. &lt;br /&gt;
* '''Firebug lite for Chrome&amp;quot;&amp;quot; -  https://chrome.google.com/webstore/detail/bmagokdooijbeehmkpknfglimnifench&lt;br /&gt;
**Firebug Lite is not a substitute for Firebug, or Chrome Developer Tools. It is a tool to be used in conjunction with these tools. Firebug Lite provides the rich visual representation we are used to see in Firebug when it comes to HTML elements, DOM elements, and Box Model shading. It provides also some cool features like inspecting HTML elements with your mouse, and live editing CSS properties&lt;br /&gt;
* '''Session Manager&amp;quot;&amp;quot; -  https://chrome.google.com/webstore/detail/bbcnbpafconjjigibnhbfmmgdbbkcjfi&lt;br /&gt;
**With Session Manager you can quickly save your current browser state and reload it whenever necessary. You can manage multiple sessions, rename or remove them from the session library. Each session remembers the state of the browser at its creation time, i.e the opened tabs and windows.&lt;br /&gt;
* '''Subgraph Vega''' - http://www.subgraph.com/products.html &lt;br /&gt;
**Vega is a free and open source scanner and testing platform to test the security of web applications. Vega can help you find and validate SQL Injection, Cross-Site Scripting (XSS), inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI based, and runs on Linux, OS X, and Windows.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Testing for specific vulnerabilities ===&lt;br /&gt;
&lt;br /&gt;
==== Testing for DOM XSS ====&lt;br /&gt;
* DOMinator Pro - https://dominator.mindedsecurity.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Testing AJAX ====&lt;br /&gt;
* '''[[:Category:OWASP Sprajax Project|OWASP Sprajax Project]]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Testing for SQL Injection ====&lt;br /&gt;
* '''[[:Category:OWASP_SQLiX_Project|OWASP SQLiX]]'''&lt;br /&gt;
* Sqlninja: a SQL Server Injection &amp;amp; Takeover Tool - http://sqlninja.sourceforge.net&lt;br /&gt;
* Bernardo Damele A. G.: sqlmap, automatic SQL injection tool - http://sqlmap.org/&lt;br /&gt;
* Absinthe 1.1 (formerly SQLSqueal) - http://sourceforge.net/projects/absinthe/&lt;br /&gt;
* SQLInjector - Uses inference techniques to extract data and determine the backend database server.  http://www.databasesecurity.com/sql-injector.htm&lt;br /&gt;
* Bsqlbf-v2: A perl script allows extraction of data from Blind SQL Injections - http://code.google.com/p/bsqlbf-v2/&lt;br /&gt;
* Pangolin: An automatic SQL injection penetration testing tool - http://www.darknet.org.uk/2009/05/pangolin-automatic-sql-injection-tool/&lt;br /&gt;
* Antonio Parata: Dump Files by sql inference on Mysql - SqlDumper - http://www.ruizata.com/&lt;br /&gt;
* Multiple DBMS Sql Injection tool - SQL Power Injector - http://www.sqlpowerinjector.com/&lt;br /&gt;
* MySql Blind Injection Bruteforcing, Reversing.org - sqlbftools - http://packetstormsecurity.org/files/43795/sqlbftools-1.2.tar.gz.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Testing Oracle ====&lt;br /&gt;
* TNS Listener tool (Perl) - http://www.jammed.com/%7Ejwa/hacks/security/tnscmd/tnscmd-doc.html&lt;br /&gt;
* Toad for Oracle - http://www.quest.com/toad &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Testing SSL ====&lt;br /&gt;
* Foundstone SSL Digger - http://www.mcafee.com/us/downloads/free-tools/ssldigger.aspx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Testing for Brute Force Password ====&lt;br /&gt;
* THC Hydra - http://www.thc.org/thc-hydra/&lt;br /&gt;
* John the Ripper - http://www.openwall.com/john/&lt;br /&gt;
* Brutus - http://www.hoobie.net/brutus/ &lt;br /&gt;
* Medusa - http://www.foofus.net/~jmk/medusa/medusa.html&lt;br /&gt;
* Ncat - http://nmap.org/ncat/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Testing Buffer Overflow ====&lt;br /&gt;
*  OllyDbg - http://www.ollydbg.de&lt;br /&gt;
** &amp;quot;A windows based debugger used for analyzing buffer overflow vulnerabilities&amp;quot;&lt;br /&gt;
* Spike - http://www.immunitysec.com/downloads/SPIKE2.9.tgz&lt;br /&gt;
** A fuzzer framework that can be used to explore vulnerabilities and perform length testing&lt;br /&gt;
* Brute Force Binary Tester (BFB) - http://bfbtester.sourceforge.net&lt;br /&gt;
** A proactive binary checker&lt;br /&gt;
* Metasploit - http://www.metasploit.com/&lt;br /&gt;
** A rapid exploit development and Testing frame work&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Fuzzer  ====&lt;br /&gt;
* '''[[:Category:OWASP_WSFuzzer_Project|OWASP WSFuzzer]]'''&lt;br /&gt;
* Wfuzz - http://www.darknet.org.uk/2007/07/wfuzz-a-tool-for-bruteforcingfuzzing-web-applications/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Googling ====&lt;br /&gt;
* Bishop Fox's Google Hacking Diggity Project - http://www.bishopfox.com/resources/tools/google-hacking-diggity/&lt;br /&gt;
* Foundstone Sitedigger (Google cached fault-finding) - http://www.mcafee.com/us/downloads/free-tools/sitedigger.aspx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Commercial Black Box Testing tools==&lt;br /&gt;
* NGS Typhon III - http://www.nccgroup.com/en/our-services/security-testing-audit-compliance/information-security-software/ngs-typhon-iii/&lt;br /&gt;
* NGSSQuirreL - http://www.nccgroup.com/en/our-services/security-testing-audit-compliance/information-security-software/ngs-squirrel-vulnerability-scanners/&lt;br /&gt;
* IBM AppScan - http://www-01.ibm.com/software/awdtools/appscan/&lt;br /&gt;
* Cenzic Hailstorm - http://www.cenzic.com/products_services/cenzic_hailstorm.php&lt;br /&gt;
* Burp Intruder - http://www.portswigger.net/burp/intruder.html&lt;br /&gt;
* Acunetix Web Vulnerability Scanner - http://www.acunetix.com&lt;br /&gt;
* Sleuth - http://www.sandsprite.com&lt;br /&gt;
* NT Objectives NTOSpider - http://www.ntobjectives.com/products/ntospider.php&lt;br /&gt;
* MaxPatrol Security Scanner - http://www.maxpatrol.com&lt;br /&gt;
* Ecyware GreenBlue Inspector - http://www.ecyware.com&lt;br /&gt;
* Parasoft SOAtest (more QA-type tool)- http://www.parasoft.com/jsp/products/soatest.jsp?itemId=101&lt;br /&gt;
* MatriXay - http://www.dbappsecurity.com/webscan.html&lt;br /&gt;
* N-Stalker Web Application Security Scanner - http://www.nstalker.com&lt;br /&gt;
* HP WebInspect - http://www.hpenterprisesecurity.com/products/hp-fortify-software-security-center/hp-webinspect&lt;br /&gt;
* SoapUI (Web Service security testing) - http://www.soapui.org/Security/getting-started.html&lt;br /&gt;
* Netsparker - http://www.mavitunasecurity.com/netsparker/&lt;br /&gt;
* SAINT - http://www.saintcorporation.com/&lt;br /&gt;
* QualysGuard WAS - http://www.qualys.com/enterprises/qualysguard/web-application-scanning/&lt;br /&gt;
* Retina Web - http://www.eeye.com/Products/Retina/Web-Security-Scanner.aspx&lt;br /&gt;
* Cenzic Hailstorm - http://www.cenzic.com/downloads/datasheets/Cenzic-datasheet-Hailstorm-Technology.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Source Code Analyzers==&lt;br /&gt;
&lt;br /&gt;
===Open Source / Freeware===&lt;br /&gt;
* [[:Category:OWASP_Orizon_Project|Owasp Orizon]]&lt;br /&gt;
* '''[[:Category:OWASP_LAPSE_Project|OWASP LAPSE]]''' &lt;br /&gt;
* [[OWASP O2 Platform]]&lt;br /&gt;
* Google CodeSearchDiggity - http://www.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/&lt;br /&gt;
* PMD - http://pmd.sourceforge.net/&lt;br /&gt;
* FlawFinder - http://www.dwheeler.com/flawfinder&lt;br /&gt;
* Microsoft’s [[FxCop]]&lt;br /&gt;
* Splint - http://splint.org&lt;br /&gt;
* Boon - http://www.cs.berkeley.edu/~daw/boon&lt;br /&gt;
* FindBugs - http://findbugs.sourceforge.net&lt;br /&gt;
* Find Security Bugs - http://h3xstream.github.io/find-sec-bugs/&lt;br /&gt;
* Oedipus - http://www.darknet.org.uk/2006/06/oedipus-open-source-web-application-security-analysis/&lt;br /&gt;
* W3af - http://w3af.sourceforge.net/&lt;br /&gt;
* phpcs-security-audit - https://github.com/Pheromone/phpcs-security-audit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Commercial ===&lt;br /&gt;
&lt;br /&gt;
* Armorize CodeSecure - http://www.armorize.com/index.php?link_id=codesecure&lt;br /&gt;
* Parasoft C/C++ test - http://www.parasoft.com/jsp/products/cpptest.jsp/index.htm&lt;br /&gt;
* Checkmarx CxSuite  - http://www.checkmarx.com&lt;br /&gt;
* HP Fortify - http://www.hpenterprisesecurity.com/products/hp-fortify-software-security-center/hp-fortify-static-code-analyzer&lt;br /&gt;
* GrammaTech - http://www.grammatech.com&lt;br /&gt;
* ITS4 - http://seclab.cs.ucdavis.edu/projects/testing/tools/its4.html&lt;br /&gt;
* Appscan - http://www-01.ibm.com/software/rational/products/appscan/source/&lt;br /&gt;
* ParaSoft - http://www.parasoft.com&lt;br /&gt;
* Virtual Forge CodeProfiler for ABAP - http://www.virtualforge.de&lt;br /&gt;
* Veracode - http://www.veracode.com&lt;br /&gt;
* Armorize CodeSecure - http://www.armorize.com/codesecure/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Acceptance Testing Tools==&lt;br /&gt;
Acceptance testing tools are used to validate the functionality of web applications.  Some follow a scripted approach and typically make use of a Unit Testing framework to construct test suites and test cases.  Most, if not all, can be adapted to perform security specific tests in addition to functional tests.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Open Source Tools===&lt;br /&gt;
&lt;br /&gt;
* WATIR - http://wtr.rubyforge.org&lt;br /&gt;
** A Ruby based web testing framework that provides an interface into Internet Explorer.&lt;br /&gt;
** Windows only.&lt;br /&gt;
* HtmlUnit - http://htmlunit.sourceforge.net &lt;br /&gt;
** A Java and JUnit based framework that uses the Apache HttpClient as the transport.&lt;br /&gt;
** Very robust and configurable and is used as the engine for a number of other testing tools.&lt;br /&gt;
* jWebUnit - http://jwebunit.sourceforge.net&lt;br /&gt;
** A Java based meta-framework that uses htmlunit or selenium as the testing engine.&lt;br /&gt;
* Canoo Webtest - http://webtest.canoo.com&lt;br /&gt;
** An XML based testing tool that provides a facade on top of htmlunit.&lt;br /&gt;
** No coding is necessary as the tests are completely specified in XML.&lt;br /&gt;
** There is the option of scripting some elements in Groovy if XML does not suffice.&lt;br /&gt;
** Very actively maintained.&lt;br /&gt;
* HttpUnit - http://httpunit.sourceforge.net&lt;br /&gt;
** One of the first web testing frameworks, suffers from using the native JDK provided HTTP transport, which can be a bit limiting for security testing.&lt;br /&gt;
* Watij - http://watij.com&lt;br /&gt;
** A Java implementation of WATIR.&lt;br /&gt;
** Windows only because it uses IE for its tests (Mozilla integration is in the works).&lt;br /&gt;
* Solex - http://solex.sourceforge.net&lt;br /&gt;
** An Eclipse plugin that provides a graphical tool to record HTTP sessions and make assertions based on the results.&lt;br /&gt;
* Selenium - http://seleniumhq.org/&lt;br /&gt;
** JavaScript based testing framework, cross-platform and provides a GUI for creating tests.&lt;br /&gt;
** Mature and popular tool, but the use of JavaScript could hamper certain security tests.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other Tools==&lt;br /&gt;
&lt;br /&gt;
===Runtime Analysis===&lt;br /&gt;
&lt;br /&gt;
* Rational PurifyPlus - http://www-01.ibm.com/software/awdtools/purify/&lt;br /&gt;
* Seeker by Quotium - http://www.quotium.com/prod/security.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Binary Analysis===&lt;br /&gt;
&lt;br /&gt;
* BugScam IDC Package - http://sourceforge.net/projects/bugscam&lt;br /&gt;
* Veracode - http://www.veracode.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Requirements Management===&lt;br /&gt;
&lt;br /&gt;
* Rational Requisite Pro - http://www-306.ibm.com/software/awdtools/reqpro&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Site Mirroring===&lt;br /&gt;
* wget - http://www.gnu.org/software/wget, http://www.interlog.com/~tcharron/wgetwin.html&lt;br /&gt;
* curl - http://curl.haxx.se &lt;br /&gt;
* Sam Spade - http://www.samspade.org&lt;br /&gt;
* Xenu's Link Sleuth - http://home.snafu.de/tilman/xenulink.html&lt;/div&gt;</summary>
		<author><name>Fran Brown</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Research_for_SharePoint_(MOSS)&amp;diff=185798</id>
		<title>Research for SharePoint (MOSS)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Research_for_SharePoint_(MOSS)&amp;diff=185798"/>
				<updated>2014-11-24T07:36:39Z</updated>
		
		<summary type="html">&lt;p&gt;Fran Brown: Stach &amp;amp; Liu rebranded as &amp;quot;Bishop Fox&amp;quot;.  Updated links and names to the SharePoint Hacking Diggity Project tools and resources accordingly.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains research notes on Microsoft's SharePoint MOSS and WSS&lt;br /&gt;
&lt;br /&gt;
== Resources==&lt;br /&gt;
&lt;br /&gt;
==== Microsoft resources====&lt;br /&gt;
* [http://office.microsoft.com/download/afile.aspx?AssetID=AM102437421033 Security Architecture for SharePoint Products and Technologies] (Word Doc)&lt;br /&gt;
* [http://sharepoint.microsoft.com SharePoint Community Portal]&lt;br /&gt;
* [http://technet.microsoft.com/en-us/library/cc262619.aspx Downloadable book: Security for Office SharePoint Server 2007] - [http://go.microsoft.com/fwlink/?LinkID=94375 link to 277 page Doc file]&lt;br /&gt;
* [http://blogs.msdn.com/arpans/archive/2008/05/09/sharepoint-end-user-security.aspx SharePoint End User Security]&lt;br /&gt;
&lt;br /&gt;
==== Other Resources and Documentation====&lt;br /&gt;
* [http://www.finalcandidate.com/en/tandp/Pages/SharePointSecurityConcepts.aspx SharePoint Security Concepts] - contains a number of other links to more material&lt;br /&gt;
* [http://blogs.gartner.com/neil_macdonald/2009/02/25/sharepoint-security-best-practices/ SharePoint Security Best Practices] - $995 Gartner report &lt;br /&gt;
* [http://sharepointmagazine.net/technical/administration/microsoft-office-sharepoint-server-2007-security-model Microsoft Office SharePoint Server 2007 Security Model]&lt;br /&gt;
* [http://www.cmswire.com/cms/enterprise-cms/sharepoint-security-concerns-simply-a-lack-of-governance-003551.php SharePoint Security Concerns Simply a Lack of Governance?]&lt;br /&gt;
* [http://www.cmswire.com/cms/enterprise-cms/governance-key-for-sharepoint-implementations-003123.php Governance Key for SharePoint Implementations]&lt;br /&gt;
* [http://www.bishopfox.com/files/articles/2012/Information%20Security%20Magazine%20JulyAug2012-SharePoint.pdf SearchSecurity – Securing SharePoint: SharePoint security best practices] - Information Security Magazine July/Aug2012 - Volume 14 - Locking Down Sharepoint - Businesses love Microsoft’s collaboration software but can forget to secure it.&lt;br /&gt;
&lt;br /&gt;
==== Presentations ====&lt;br /&gt;
* Bishop Fox - HackCon 2011 - Oslo, Norway - February 16, 2011 : [http://www.bishopfox.com/files/slides/2011/HackCon%202011%20-%20SharePoint%20Security%20-%20Feb2011.pdf SharePoint Security: Advanced SharePoint Security Tips and Tools]&lt;br /&gt;
* OWASP Houston Chapter - August 12, 2009 :  [http://owasp.icrew.org/downloads/OWASP_ShohnTrojacek.pdf SharePoint Auditing and Penetration Testing] Presentation by:  Shohn Trojacek&lt;br /&gt;
* from Denim group:&lt;br /&gt;
** [http://www.denimgroup.com/media/pdfs/DenimGroup_SecuringSharePoint_TASSCCTEC2009_20090326.pdf Securing SharePoint (PDF Format)] - TASSCC Technology Education Conference in Austin, March 26, 2009&lt;br /&gt;
** [http://www.denimgroup.com/media/pdfs/DenimGroup_SecuringSharePoint_TRISC_20090324.pdf Securing Sharepoint (PDF Format)] - Texas Regional Infrastructure Security Conference (TRISC) in Austin, March 24, 2009&lt;br /&gt;
** [http://sp.meetdux.com/archive/2009/07/08/a-primer-to-sharepoint-security.aspx A Primer to SharePoint Security] - video&lt;br /&gt;
&lt;br /&gt;
==== Other interesting resources====&lt;br /&gt;
* [http://www.indeed.com.au/jobs?q=Moss+Security&amp;amp;l= MOSS Security jobs (in Australia)]&lt;br /&gt;
* [http://www.cmswire.com/news/topic/sharepoint Articles on CMSWire about SharePoint]&lt;br /&gt;
&lt;br /&gt;
==== Other Blogs and Articles ====&lt;br /&gt;
* [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=212903345 Microsoft SharePoint: A Weak Link In Enterprise Security?] - Dark Reading&lt;br /&gt;
&lt;br /&gt;
==== Security related technical articles ====&lt;br /&gt;
* [http://www.sharepointsecurity.com/sharepoint/sharepoint-security/how-to-programmatically-disable-code-access-security/ How to Programmatically Disable Code Access Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Published Security issues ==&lt;br /&gt;
&lt;br /&gt;
=== SharePoint related vulnerabilities and its status ===&lt;br /&gt;
* {Note: Add MSRC case}&lt;br /&gt;
* http://milw0rm.com/exploits/8704 &amp;amp; http://milw0rm.com/sploits/2009-IIS-Advisory.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== MOSS Security related WebParts, Tools  &amp;amp; services ==&lt;br /&gt;
&lt;br /&gt;
==== Open Source ====&lt;br /&gt;
* From CodePlex (see more on this search for [http://www.codeplex.com/site/search?ProjectSearchText=Sharepoint%20Security SharePoint Security]&lt;br /&gt;
** [http://securitytemplates.codeplex.com/ SharePoint Security Templates] (CodePlex)&lt;br /&gt;
** [http://spsecurity.codeplex.com/ SharePoint Security Configuration Feature]&lt;br /&gt;
** [http://accesschecker.codeplex.com Sharepoint Access Checker Web Part]&lt;br /&gt;
** [http://sitesecuritymgmt.codeplex.com/ Site Security Management Utility]&lt;br /&gt;
** [http://cryptocollaboration.codeplex.com/ CryptoCollaboration For SharePoint]&lt;br /&gt;
&lt;br /&gt;
==== Commercially Supported ====&lt;br /&gt;
* [http://www.sharepointsecurity.com ARB Security Solutions (www.sharepointsecurity.com)]&lt;br /&gt;
* [http://www.surety.com/Offerings/AbsoluteProof/For-MS-SharePoint.aspx AbsoluteProof for MS SharePoint] - related article [http://www.cmswire.com/cms/enterprise-cms/surety-releases-absoluteproof-for-sharepoint-002471.php Surety Releases AbsoluteProof for SharePoint]&lt;br /&gt;
* [http://www.avepoint.com/assets/pdf/Social_Security_Administration_Case_Study.pdf Sharepoint case study (marketing doc)]&lt;br /&gt;
&lt;br /&gt;
== Dangerous MOSS APIs ==&lt;br /&gt;
&lt;br /&gt;
Map the security implications of MOSS APIs, for example:&lt;br /&gt;
*  which APIs (if badly used)are vulnerable to: XSS, CSRF, SQL Injection&lt;br /&gt;
* configuration settings that have security implications&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SharePoint Hacking ==&lt;br /&gt;
==== SharePoint Hacking Tools ====&lt;br /&gt;
* [http://extensions.professionallyevil.com/beef.php SharePoint Enumerator | Professionally Evil] - This is a collection of 4 modules that help enumerate the SharePoint server the victim is connected to.&lt;br /&gt;
* [http://sparty.secniche.org/ Sparty] - MS Sharepoint and Frontpage Auditing Tool&lt;br /&gt;
* [https://github.com/toddsiegel/spscan SPScan] - SharePoint scanner and fingerprinter based on WPScan&lt;br /&gt;
* [http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ Bishop Fox - SharePoint Hacking Diggity Project] - SharePoint hacking tools project page.  Currently includes such hacking tools as:&lt;br /&gt;
** [http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/attack-tools/#google-and-bing-hacking-dictionary-files SharePoint – Google and Bing Diggity Dictionary Files] - New GoogleDiggity input dictionary file containing 121 queries that allow users to uncover SharePoint specific vulnerabilities exposed via the Google search engine. This dictionary helps assessors locate exposures of common SharePoint administrative pages, web services, and site galleries that an organization typically would not want to be made available to the public, let alone indexed by Google.  Recently, we’ve also created a Bing hacking dictionary (124 Bing queries) that can be imported into BingDiggity and used to identify SharePoint exposures as well.&lt;br /&gt;
** [http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/attack-tools/#sharepoint-hacking-alerts-for-google-and-bing SharePoint Hacking Alerts for Google and Bing] - SharePoint Hacking Alerts provide real-time vulnerability updates from both the Google and Bing search engines.  These convenient RSS feeds help locate exposures of common SharePoint administrative pages, web services, and site galleries that an organization typically would not want to be made available to the public, let alone indexed by Google and Bing.  [http://www.google.com/alerts Google Alerts] have been created for all SharePoint related search strings, which generate a new alert each time newly indexed pages by Google match one of those regular expressions.  Microsoft Bing’s &amp;amp;format=rss directive was used to turn Bing searches into RSS feeds.&lt;br /&gt;
** [http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/attack-tools/#sharepointurlbrute SharePointURLBrute] - SharePointURLBrute is a new SharePoint hacking utility developed to help assessors quickly test user access to 101 common SharePoint administrative pages (e.g. “Add Users” page -&amp;gt; /_layouts/aclinv.aspx) by automating forceful browsing attacks.&lt;br /&gt;
** [http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/attack-tools/#sharepoint-userdispenum SharePoint UserDispEnum] - UserDispEnum is a new SharePoint user enumeration tool that exploits insecure access controls to the /_layouts/UserDisp.aspx?ID=1 page. This utility cycles through the integer ID values from 1 onward to identify valid users, account names, and other related profile information that can be easily extracted from the SharePoint user profiles.  For real, live examples of SharePoint site deployments insecurely exposing this functionality to anonymous users on the Internet, see Google results of: “http://www.google.com/#q=inurl:”/_layouts/userdisp.aspx”. Users can leverage [http://www.bishopfox.com/resources/tools/google-hacking-diggity/ Bishop Fox’s GoogleDiggity hacking tools] to identify these exposures within their own organization, and then employ the UserDispEnum tool to exploit them during penetration tests.&lt;br /&gt;
** [http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/attack-tools/#sharepoint-dlp-tools SharePoint DLP Tools] - COMING SOON – Bishop Fox's data loss prevention (DLP) tools for Microsoft SharePoint. SharePoint DLP Tools utilize administrative web services to help automate the searching of SharePoint files and lists for SSNs, credit card numbers, passwords, and other common information disclosures.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== SharePoint Hacking Presentations ====&lt;br /&gt;
* '''2008'''&lt;br /&gt;
** [http://www.youtube.com/watch?v=DYudvh9cfZM hak5 - Episode 407 - Toorcon 2008: Robin Wood, Dan Griffin] - see 11:10 minute mark in video for interview with Dan Griffin about SharePoint Hacking.&lt;br /&gt;
* '''2012'''&lt;br /&gt;
** [http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/presentation-slides/ Bishop Fox - SharePoint Hacking Diggity Project - Presentations]:&lt;br /&gt;
*** OWASP L.A. 2012 - Los Angeles, CA - February 22, 2012 : [http://www.bishopfox.com/files/slides/2012/OWASP%20LA%20-%20SharePoint%20Hacking%20-%2022Feb2012.pdf SharePoint Hacking: Advanced SharePoint Security Tips and Tools]&lt;br /&gt;
* '''2013'''&lt;br /&gt;
** [http://www.youtube.com/watch?feature=player_embedded&amp;amp;v=AAObW2fcB_s TMI: Assessing and Exploiting SharePoint at DerbyCon 3.0]&lt;br /&gt;
** [https://media.blackhat.com/us-13/Arsenal/us-13-Sood-Sparty-Slides.pdf Sparty - Blackhat USA 2013] Sparty : A Frontpage and Sharepoint Auditing Tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WebParts Security ==&lt;br /&gt;
&lt;br /&gt;
* Security ratings &amp;amp; mappings of MOSS Deployed Web Parts&lt;br /&gt;
* Security ratings &amp;amp; mappings of 3rd Part Web Parts&lt;/div&gt;</summary>
		<author><name>Fran Brown</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Appendix_A:_Testing_Tools&amp;diff=118372</id>
		<title>Appendix A: Testing Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Appendix_A:_Testing_Tools&amp;diff=118372"/>
				<updated>2011-10-01T19:09:05Z</updated>
		
		<summary type="html">&lt;p&gt;Fran Brown: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
==Open Source Black Box Testing tools==&lt;br /&gt;
&lt;br /&gt;
=== General Testing ===&lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP_WebScarab_Project|OWASP WebScarab]]'''&lt;br /&gt;
* '''[[OWASP_CAL9000_Project|OWASP CAL9000]]'''&lt;br /&gt;
** CAL9000 is a collection of browser-based tools that enable more effective and efficient manual testing efforts.&lt;br /&gt;
** Includes an XSS Attack Library, Character Encoder/Decoder, HTTP Request Generator and Response Evaluator, Testing Checklist, Automated Attack Editor and much more.&lt;br /&gt;
*  '''[[:Category:OWASP Pantera Web Assessment Studio Project|OWASP Pantera Web Assessment Studio Project]]'''&lt;br /&gt;
* SPIKE - http://www.immunitysec.com&lt;br /&gt;
* Paros - http://www.parosproxy.org&lt;br /&gt;
* Burp Proxy - http://www.portswigger.net&lt;br /&gt;
* Achilles Proxy - http://www.mavensecurity.com/achilles&lt;br /&gt;
* Odysseus Proxy - http://www.wastelands.gen.nz/odysseus/&lt;br /&gt;
* Webstretch Proxy - http://sourceforge.net/projects/webstretch&lt;br /&gt;
* Firefox LiveHTTPHeaders, Tamper Data and Developer Tools - http://www.mozdev.org&lt;br /&gt;
* Grendel-Scan - http://www.grendel-scan.com&lt;br /&gt;
* [[:Category:SWFIntruder|OWASP SWFIntruder]] &lt;br /&gt;
* http://www.mindedsecurity.com/swfintruder.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME| link not working&lt;br /&gt;
&lt;br /&gt;
* Sensepost Wikto (Google cached fault-finding) - http://www.sensepost.com/research/wikto/index2.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
=== Testing for specific vulnerabilities ===&lt;br /&gt;
&lt;br /&gt;
==== Testing AJAX ====&lt;br /&gt;
* '''[[:Category:OWASP Sprajax Project|OWASP Sprajax Project]]'''&lt;br /&gt;
==== Testing for SQL Injection ====&lt;br /&gt;
* '''[[:Category:OWASP_SQLiX_Project|OWASP SQLiX]]'''&lt;br /&gt;
* Sqlninja: a SQL Server Injection &amp;amp; Takeover Tool - http://sqlninja.sourceforge.net&lt;br /&gt;
* Bernardo Damele A. G.: sqlmap, automatic SQL injection tool - http://sqlmap.sourceforge.net&lt;br /&gt;
* Absinthe 1.1 (formerly SQLSqueal) - http://www.0x90.org/releases/absinthe/&lt;br /&gt;
* SQLInjector - http://www.databasesecurity.com/sql-injector.htm&lt;br /&gt;
* bsqlbf-1.2-th - http://www.514.es&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|link not working&lt;br /&gt;
&lt;br /&gt;
* Multiple DBMS Sql Injection tool - SQL Power Injector&lt;br /&gt;
* MySql Blind Injection Bruteforcing, Reversing.org - sqlbftools&lt;br /&gt;
* Antonio Parata: Dump Files by sql inference on Mysql - SqlDumper&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
==== Testing Oracle ====&lt;br /&gt;
* TNS Listener tool (Perl) - http://www.jammed.com/%7Ejwa/hacks/security/tnscmd/tnscmd-doc.html&lt;br /&gt;
* Toad for Oracle - http://www.quest.com/toad &lt;br /&gt;
==== Testing SSL ====&lt;br /&gt;
* Foundstone SSL Digger - http://www.foundstone.com/resources/proddesc/ssldigger.htm&lt;br /&gt;
==== Testing for Brute Force Password ====&lt;br /&gt;
* THC Hydra - http://www.thc.org/thc-hydra/&lt;br /&gt;
* John the Ripper - http://www.openwall.com/john/&lt;br /&gt;
* Brutus - http://www.hoobie.net/brutus/ &lt;br /&gt;
* Medusa - http://www.foofus.net/~jmk/medusa/medusa.html&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|link not working&lt;br /&gt;
==== Testing for HTTP Methods ====&lt;br /&gt;
* NetCat - http://www.vulnwatch.org/netcat&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
==== Testing Buffer Overflow ====&lt;br /&gt;
*  OllyDbg - http://www.ollydbg.de&lt;br /&gt;
** &amp;quot;A windows based debugger used for analyzing buffer overflow vulnerabilities&amp;quot;&lt;br /&gt;
* Spike - http://www.immunitysec.com/downloads/SPIKE2.9.tgz&lt;br /&gt;
** A fuzzer framework that can be used to explore vulnerabilities and perform length testing&lt;br /&gt;
* Brute Force Binary Tester (BFB) - http://bfbtester.sourceforge.net&lt;br /&gt;
** A proactive binary checker&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|link not working&lt;br /&gt;
&lt;br /&gt;
* Metasploit - http://www.metasploit.com/projects/Framework/&lt;br /&gt;
** A rapid exploit development and Testing frame work&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
==== Fuzzer  ====&lt;br /&gt;
* '''[[:Category:OWASP_WSFuzzer_Project|OWASP WSFuzzer]]'''&lt;br /&gt;
&lt;br /&gt;
==== Googling ====&lt;br /&gt;
* Stach &amp;amp; Liu's Google Hacking Diggity Project - http://www.stachliu.com/resources/tools/google-hacking-diggity-project/&lt;br /&gt;
* Foundstone Sitedigger (Google cached fault-finding) - http://www.foundstone.com/resources/proddesc/sitedigger.htm&lt;br /&gt;
&lt;br /&gt;
==Commercial Black Box Testing tools==&lt;br /&gt;
&lt;br /&gt;
* Typhon - http://www.ngssoftware.com/products/internet-security/ngs-typhon.php&lt;br /&gt;
* NGSSQuirreL - http://www.ngssoftware.com/products/database-security/&lt;br /&gt;
* Watchfire AppScan - http://www.watchfire.com&lt;br /&gt;
* Cenzic Hailstorm - http://www.cenzic.com/products_services/cenzic_hailstorm.php&lt;br /&gt;
* Burp Intruder - http://portswigger.net/intruder&lt;br /&gt;
* Acunetix Web Vulnerability Scanner - http://www.acunetix.com&lt;br /&gt;
* WebSleuth - http://www.sandsprite.com&lt;br /&gt;
* NT Objectives NTOSpider - http://www.ntobjectives.com/products/ntospider.php&lt;br /&gt;
* Fortify Pen Testing Team Tool - http://www.fortifysoftware.com/products/tester&lt;br /&gt;
* Sandsprite Web Sleuth - http://sandsprite.com/Sleuth/&lt;br /&gt;
* MaxPatrol Security Scanner - http://www.maxpatrol.com&lt;br /&gt;
* Ecyware GreenBlue Inspector - http://www.ecyware.com&lt;br /&gt;
* Parasoft WebKing (more QA-type tool)&lt;br /&gt;
* MatriXay - http://www.dbappsecurity.com&lt;br /&gt;
* N-Stalker Web Application Security Scanner - http://www.nstalker.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|check these links&lt;br /&gt;
&lt;br /&gt;
* Watchfire AppScan - http://www.watchfire.com&lt;br /&gt;
* Cenzic Hailstorm - http://www.cenzic.com/products_services/cenzic_hailstorm.php&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
link broken:&lt;br /&gt;
* SPI Dynamics WebInspect - http://www.spidynamics.com&lt;br /&gt;
* ScanDo - http://www.kavado.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
==Source Code Analyzers==&lt;br /&gt;
&lt;br /&gt;
===Open Source / Freeware===&lt;br /&gt;
* [[:Category:OWASP_Orizon_Project|Owasp Orizon]]&lt;br /&gt;
* '''[[:Category:OWASP_LAPSE_Project|OWASP LAPSE]]''' &lt;br /&gt;
* [[OWASP O2 Platform]]&lt;br /&gt;
* Google CodeSearchDiggity - http://www.stachliu.com/resources/tools/google-hacking-diggity-project/attack-tools/&lt;br /&gt;
* PMD - http://pmd.sourceforge.net/&lt;br /&gt;
* FlawFinder - http://www.dwheeler.com/flawfinder&lt;br /&gt;
* Microsoft’s [[FxCop]]&lt;br /&gt;
* Splint - http://splint.org&lt;br /&gt;
* Boon - http://www.cs.berkeley.edu/~daw/boon&lt;br /&gt;
* FindBugs - http://findbugs.sourceforge.net&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|broken link&lt;br /&gt;
&lt;br /&gt;
* Pscan - http://www.striker.ottawa.on.ca/~aland/pscan&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
===Commercial ===&lt;br /&gt;
&lt;br /&gt;
* Armorize CodeSecure - http://www.armorize.com/index.php?link_id=codesecure&lt;br /&gt;
* CodeWizard - http://www.parasoft.com/products/wizard&lt;br /&gt;
* Checkmarx CxSuite  - http://www.checkmarx.com&lt;br /&gt;
* Fortify - http://www.fortifysoftware.com&lt;br /&gt;
* GrammaTech - http://www.grammatech.com&lt;br /&gt;
* ITS4 - http://www.cigital.com/its4&lt;br /&gt;
* Ounce labs Prexis - http://www.ouncelabs.com&lt;br /&gt;
* ParaSoft - http://www.parasoft.com&lt;br /&gt;
* Virtual Forge CodeProfiler for ABAP - http://www.virtualforge.de&lt;br /&gt;
* Veracode - http://www.veracode.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|link not working&lt;br /&gt;
&lt;br /&gt;
* Armorize CodeSecure - http://www.armorize.com/product/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;br /&gt;
&lt;br /&gt;
==Acceptance Testing Tools==&lt;br /&gt;
Acceptance testing tools are used to validate the functionality of web applications.  Some follow a scripted approach and typically make use of a Unit Testing framework to construct test suites and test cases.  Most, if not all, can be adapted to perform security specific tests in addition to functional tests.&lt;br /&gt;
&lt;br /&gt;
===Open Source Tools===&lt;br /&gt;
&lt;br /&gt;
* WATIR - http://wtr.rubyforge.org&lt;br /&gt;
** A Ruby based web testing framework that provides an interface into Internet Explorer.&lt;br /&gt;
** Windows only.&lt;br /&gt;
* HtmlUnit - http://htmlunit.sourceforge.net &lt;br /&gt;
** A Java and JUnit based framework that uses the Apache HttpClient as the transport.&lt;br /&gt;
** Very robust and configurable and is used as the engine for a number of other testing tools.&lt;br /&gt;
* jWebUnit - http://jwebunit.sourceforge.net&lt;br /&gt;
** A Java based meta-framework that uses htmlunit or selenium as the testing engine.&lt;br /&gt;
* Canoo Webtest - http://webtest.canoo.com&lt;br /&gt;
** An XML based testing tool that provides a facade on top of htmlunit.&lt;br /&gt;
** No coding is necessary as the tests are completely specified in XML.&lt;br /&gt;
** There is the option of scripting some elements in Groovy if XML does not suffice.&lt;br /&gt;
** Very actively maintained.&lt;br /&gt;
* HttpUnit - http://httpunit.sourceforge.net&lt;br /&gt;
** One of the first web testing frameworks, suffers from using the native JDK provided HTTP transport, which can be a bit limiting for security testing.&lt;br /&gt;
* Watij - http://watij.com&lt;br /&gt;
** A Java implementation of WATIR.&lt;br /&gt;
** Windows only because it uses IE for its tests (Mozilla integration is in the works).&lt;br /&gt;
* Solex - http://solex.sourceforge.net&lt;br /&gt;
** An Eclipse plugin that provides a graphical tool to record HTTP sessions and make assertions based on the results.&lt;br /&gt;
* Selenium - http://www.openqa.org/selenium/&lt;br /&gt;
** JavaScript based testing framework, cross-platform and provides a GUI for creating tests.&lt;br /&gt;
** Mature and popular tool, but the use of JavaScript could hamper certain security tests.&lt;br /&gt;
&lt;br /&gt;
==Other Tools==&lt;br /&gt;
&lt;br /&gt;
===Runtime Analysis===&lt;br /&gt;
&lt;br /&gt;
*  Rational PurifyPlus - http://www-306.ibm.com/software/awdtools&lt;br /&gt;
&lt;br /&gt;
===Binary Analysis===&lt;br /&gt;
&lt;br /&gt;
* BugScam - http://sourceforge.net/projects/bugscam&lt;br /&gt;
* BugScan - http://www.hbgary.com&lt;br /&gt;
* Veracode - http://www.veracode.com&lt;br /&gt;
&lt;br /&gt;
===Requirements Management===&lt;br /&gt;
&lt;br /&gt;
* Rational Requisite Pro - http://www-306.ibm.com/software/awdtools/reqpro&lt;br /&gt;
&lt;br /&gt;
===Site Mirroring===&lt;br /&gt;
* wget - http://www.gnu.org/software/wget, http://www.interlog.com/~tcharron/wgetwin.html&lt;br /&gt;
* curl - http://curl.haxx.se &lt;br /&gt;
* Sam Spade - http://www.samspade.org&lt;br /&gt;
* Xenu - http://home.snafu.de/tilman/xenulink.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|check this link&lt;br /&gt;
&lt;br /&gt;
*  Rational PurifyPlus - http://www-306.ibm.com/software/awdtools&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
]]&lt;/div&gt;</summary>
		<author><name>Fran Brown</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Source_Code_Analysis_Tools&amp;diff=118371</id>
		<title>Source Code Analysis Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Source_Code_Analysis_Tools&amp;diff=118371"/>
				<updated>2011-10-01T19:05:20Z</updated>
		
		<summary type="html">&lt;p&gt;Fran Brown: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Source Code Analysis tools are designed to analyze source code and/or compiled version of code in order to help find security flaws. Ideally, such tools would automatically find security flaws with a high degree of confidence that what is found is indeed a flaw. However, this is beyond the state of the art for many types of application security flaws. Thus, such tools frequently serve as aids for an analyst to help them zero in on security relevant portions of code so they can find flaws more efficiently, rather than a tool that simply finds flaws automatically.&lt;br /&gt;
&lt;br /&gt;
Some tools are starting to move into the IDE. For the types of problems that can be detected during the software development phase itself, this is a powerful phase within the development lifecycle to employ such tools, as it provides immediate feedback to the developer on issues they might be introducing into the code during code development itself. This immediate feedback is very useful as compared to finding vulnerabilities much later in the development cycle.&lt;br /&gt;
&lt;br /&gt;
==Strengths and Weaknesses of such tools==&lt;br /&gt;
&lt;br /&gt;
=== Strengths ===&lt;br /&gt;
* Scales Well (Can be run on lots of software, and can be repeatedly (like in nightly builds))&lt;br /&gt;
* For things that such tools can automatically find with high confidence, such as buffer overflows, SQL Injection Flaws, etc. they are great.&lt;br /&gt;
&lt;br /&gt;
=== Weaknesses ===&lt;br /&gt;
* Many types of security vulnerabilities are very difficult to find automatically, such as authentication problems, access control issues, insecure use of cryptography, etc. The current state of the art only allows such tools to automatically find a relatively small percentage of application security flaws. Tools of this type are getting better, however.&lt;br /&gt;
* High numbers of false positives.&lt;br /&gt;
* Frequently can't find configuration issues, since they are not represented in the code.&lt;br /&gt;
* Difficult to 'prove' that an identified security issue is an actual vulnerability.&lt;br /&gt;
* Many of these tools have difficulty analyzing code that can't be compiled. Analysts frequently can't compile code because they don't have the right libraries, all the compilation instructions, all the code, etc.&lt;br /&gt;
&lt;br /&gt;
==Important Selection Criteria==&lt;br /&gt;
&lt;br /&gt;
* Requirement: Must support your language, but not usually a key factor once it does.&lt;br /&gt;
&lt;br /&gt;
* Types of Vulnerabilities it can detect (Out of the OWASP Top Ten?) (plus more?)&lt;br /&gt;
* Does it require a fully buildable set of source?&lt;br /&gt;
* Can it run against binaries instead of source?&lt;br /&gt;
* Can it be integrated into the developer's IDE?&lt;br /&gt;
* License cost for the tool. (Some are sold per user, per org, per app, per line of code analyzed. Consulting licenses are frequently different than end user licenses.)&lt;br /&gt;
&lt;br /&gt;
==OWASP Tools Of This Type==&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project OWASP Orizon Project]&lt;br /&gt;
* [[OWASP_LAPSE_Project | OWASP LAPSE Project]]&lt;br /&gt;
* [[OWASP O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
==Open Source or Free Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [http://www.stachliu.com/resources/tools/google-hacking-diggity-project/attack-tools/ Google CodeSearchDiggity] - Utilizes Google Code Search to identifies vulnerabilities in open source code projects hosted by Google Code, MS CodePlex, SourceForge, Github, and more. The tool comes with over 130 default searches that identify SQL injection, cross-site scripting (XSS), insecure remote and local file includes, hard-coded passwords, and much more.  ''Essentially, Google CodeSearchDiggity provides a source code security analysis of nearly every single open source code project in existence – simultaneously.'' &lt;br /&gt;
* [http://findbugs.sourceforge.net/ FindBugs] - Find Bugs (including some security flaws) in Java Programs&lt;br /&gt;
* [http://msdn.microsoft.com/en-us/library/bb429476(VS.80).aspx FxCop] (Microsoft) - FxCop is an application that analyzes managed code assemblies (code that targets the .NET Framework common language runtime) and reports information about the assemblies, such as possible design, localization, performance, and security improvements.&lt;br /&gt;
* [http://pmd.sourceforge.net/ PMD] - PMD scans Java source code and looks for potential code problems (this is a code quality tool that does not focus on security issues)&lt;br /&gt;
* [http://msdn.microsoft.com/en-us/library/ms933794.aspx PreFast] (Microsoft) - PREfast is a static analysis tool that identifies defects in C/C++ programs&lt;br /&gt;
* [http://www.fortify.com/security-resources/rats.jsp RATS] (Fortify) - Scans C, C++, Perl, PHP and Python source code for security problems like buffer overflows and TOCTOU (Time Of Check, Time Of Use) race conditions&lt;br /&gt;
* [http://www.securitycompass.com/inner_swaat.shtml SWAAT] - Simplistic Beta Tool - Languages: Java, JSP, ASP .Net, and PHP&lt;br /&gt;
* [http://www.dwheeler.com/flawfinder/ Flawfinder] Flawfinder - Scans C and C++&lt;br /&gt;
* [http://sourceforge.net/projects/rips-scanner/ RIPS] - RIPS is a static source code analyzer for vulnerabilities in PHP web applications&lt;br /&gt;
&lt;br /&gt;
==Commercial Tools from OWASP Members Of This Type==&lt;br /&gt;
&lt;br /&gt;
These vendors have decided to support OWASP by becoming [[Membership|members]]. OWASP appreciates the support from these organizations, but cannot endorse any commercial products or services.&lt;br /&gt;
&lt;br /&gt;
* [http://www.armorize.com/corpweb/en/products/codesecure Static Source Code Analysis with CodeSecure™] (Armorize Technologies)&lt;br /&gt;
* [http://www.artofdefence.com/en/hypersource/hypersource.html Static Source Code Analysis with hypersource] (art of defence)&lt;br /&gt;
* [http://www.fortifysoftware.com/products/sca.jsp Source Code Analysis] (HP/Fortify)&lt;br /&gt;
* [http://www.veracode.com/ Veracode] (Veracode)&lt;br /&gt;
&lt;br /&gt;
==Other Well Known Commercial Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [http://www.checkmarx.com/Products.aspx?id=3 CxSuite] (Checkmarx)&lt;br /&gt;
* [http://www.coverity.com/products/prevent.html Prevent] (Coverity)&lt;br /&gt;
* [http://www-01.ibm.com/software/awdtools/appscan/ IBM Rational AppScan Developer] (formerly Ounce)&lt;br /&gt;
* [http://www.klocwork.com/products/insight.asp Insight] (KlocWork)&lt;br /&gt;
&lt;br /&gt;
==More Info==&lt;br /&gt;
&lt;br /&gt;
* TODO: add comments from: http://lists.owasp.org/pipermail/owasp-dotnet/2006-August/000002.html&lt;br /&gt;
* [[Appendix_A:_Testing_Tools | Appendix A: Testing Tools]]&lt;br /&gt;
* [http://samate.nist.gov/index.php/Source_Code_Security_Analyzers NIST's list of Source Code Security Analysis Tools]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP .NET Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Fran Brown</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Research_for_SharePoint_(MOSS)&amp;diff=108339</id>
		<title>Research for SharePoint (MOSS)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Research_for_SharePoint_(MOSS)&amp;diff=108339"/>
				<updated>2011-04-07T14:12:31Z</updated>
		
		<summary type="html">&lt;p&gt;Fran Brown: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains research notes on Microsoft's SharePoint MOSS and WSS&lt;br /&gt;
&lt;br /&gt;
== Resources==&lt;br /&gt;
&lt;br /&gt;
==== Microsoft resources====&lt;br /&gt;
* [http://office.microsoft.com/download/afile.aspx?AssetID=AM102437421033 Security Architecture for SharePoint Products and Technologies] (Word Doc)&lt;br /&gt;
* [http://sharepoint.microsoft.com SharePoint Community Portal]&lt;br /&gt;
* [http://technet.microsoft.com/en-us/library/cc262619.aspx Downloadable book: Security for Office SharePoint Server 2007] - [http://go.microsoft.com/fwlink/?LinkID=94375 link to 277 page Doc file]&lt;br /&gt;
* [http://blogs.msdn.com/arpans/archive/2008/05/09/sharepoint-end-user-security.aspx SharePoint End User Security]&lt;br /&gt;
&lt;br /&gt;
==== Other Resources and Documentation====&lt;br /&gt;
* [http://www.finalcandidate.com/en/tandp/Pages/SharePointSecurityConcepts.aspx SharePoint Security Concepts] - contains a number of other links to more material&lt;br /&gt;
* [http://blogs.gartner.com/neil_macdonald/2009/02/25/sharepoint-security-best-practices/ SharePoint Security Best Practices] - $995 Gartner report &lt;br /&gt;
* [http://sharepointmagazine.net/technical/administration/microsoft-office-sharepoint-server-2007-security-model Microsoft Office SharePoint Server 2007 Security Model]&lt;br /&gt;
* [http://www.cmswire.com/cms/enterprise-cms/sharepoint-security-concerns-simply-a-lack-of-governance-003551.php SharePoint Security Concerns Simply a Lack of Governance?]&lt;br /&gt;
* [http://www.cmswire.com/cms/enterprise-cms/governance-key-for-sharepoint-implementations-003123.php Governance Key for SharePoint Implementations]&lt;br /&gt;
&lt;br /&gt;
==== Presentations ====&lt;br /&gt;
* HackCon 2011 - Oslo, Norway - February 16, 2011 : [http://www.stachliu.com/wp-content/uploads/2011/03/HackCon%202011%20-%20SharePoint%20Security%20-%20Feb2011.pdf SharePoint Security: Advanced SharePoint Security Tips and Tools]&lt;br /&gt;
* OWASP Houston Chapter - August 12, 2009 :  [http://owasp.icrew.org/downloads/OWASP_ShohnTrojacek.pdf SharePoint Auditing and Penetration Testing] Presentation by:  Shohn Trojacek&lt;br /&gt;
* from Denim group:&lt;br /&gt;
** [http://www.denimgroup.com/media/pdfs/DenimGroup_SecuringSharePoint_TASSCCTEC2009_20090326.pdf Securing SharePoint (PDF Format)] - TASSCC Technology Education Conference in Austin, March 26, 2009&lt;br /&gt;
** [http://www.denimgroup.com/media/pdfs/DenimGroup_SecuringSharePoint_TRISC_20090324.pdf Securing Sharepoint (PDF Format)] - Texas Regional Infrastructure Security Conference (TRISC) in Austin, March 24, 2009&lt;br /&gt;
** [http://sp.meetdux.com/archive/2009/07/08/a-primer-to-sharepoint-security.aspx A Primer to SharePoint Security] - video&lt;br /&gt;
&lt;br /&gt;
==== Other interesting resources====&lt;br /&gt;
* [http://www.indeed.com.au/jobs?q=Moss+Security&amp;amp;l= MOSS Security jobs (in Australia)]&lt;br /&gt;
* [http://www.cmswire.com/news/topic/sharepoint Articles on CMSWire about SharePoint]&lt;br /&gt;
&lt;br /&gt;
==== Other Blogs and Articles ====&lt;br /&gt;
* [http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=212903345 Microsoft SharePoint: A Weak Link In Enterprise Security?] - Dark Reading&lt;br /&gt;
&lt;br /&gt;
==== Security related technical articles ====&lt;br /&gt;
* [http://www.sharepointsecurity.com/sharepoint/sharepoint-security/how-to-programmatically-disable-code-access-security/ How to Programmatically Disable Code Access Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Published Security issues ==&lt;br /&gt;
&lt;br /&gt;
=== SharePoint related vulnerabilities and its status ===&lt;br /&gt;
* {Note: Add MSRC case}&lt;br /&gt;
* http://milw0rm.com/exploits/8704 &amp;amp; http://milw0rm.com/sploits/2009-IIS-Advisory.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== MOSS Security related WebParts, Tools  &amp;amp; services ==&lt;br /&gt;
&lt;br /&gt;
==== Open Source ====&lt;br /&gt;
* From CodePlex (see more on this search for [http://www.codeplex.com/site/search?ProjectSearchText=Sharepoint%20Security SharePoint Security]&lt;br /&gt;
** [http://securitytemplates.codeplex.com/ SharePoint Security Templates] (CodePlex)&lt;br /&gt;
** [http://spsecurity.codeplex.com/ SharePoint Security Configuration Feature]&lt;br /&gt;
** [http://accesschecker.codeplex.com Sharepoint Access Checker Web Part]&lt;br /&gt;
** [http://sitesecuritymgmt.codeplex.com/ Site Security Management Utility]&lt;br /&gt;
** [http://cryptocollaboration.codeplex.com/ CryptoCollaboration For SharePoint]&lt;br /&gt;
&lt;br /&gt;
==== Commercially Supported ====&lt;br /&gt;
* [http://www.sharepointsecurity.com ARB Security Solutions (www.sharepointsecurity.com)]&lt;br /&gt;
* [http://www.surety.com/Offerings/AbsoluteProof/For-MS-SharePoint.aspx AbsoluteProof for MS SharePoint] - related article [http://www.cmswire.com/cms/enterprise-cms/surety-releases-absoluteproof-for-sharepoint-002471.php Surety Releases AbsoluteProof for SharePoint]&lt;br /&gt;
* [http://www.avepoint.com/assets/pdf/Social_Security_Administration_Case_Study.pdf Sharepoint case study (marketing doc)]&lt;br /&gt;
&lt;br /&gt;
== Dangerous MOSS APIs ==&lt;br /&gt;
&lt;br /&gt;
Map the security implications of MOSS APIs, for example:&lt;br /&gt;
*  which APIs (if badly used)are vulnerable to: XSS, CSRF, SQL Injection&lt;br /&gt;
* configuration settings that have security implications&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SharePoint Hacking ==&lt;br /&gt;
==== SharePoint Hacking Tools ====&lt;br /&gt;
* [http://www.stachliu.com/resources/tools/sharepoint-hacking-diggity-project/ Stach &amp;amp; Liu's SharePoint Hacking Diggity Project] - SharePoint hacking tools project page.  Currently includes such hacking tools as:&lt;br /&gt;
** [http://www.stachliu.com/resources/tools/sharepoint-hacking-diggity-project/#SharePoint%20-%20GoogleDiggity%20Dictionary%20File SharePoint – GoogleDiggity Dictionary File] - New GoogleDiggity input dictionary file containing 118 queries that allow users to uncover SharePoint specific vulnerabilities exposed via the Google search engine. This dictionary helps assessors locate exposures of common SharePoint administrative pages, web services, and site galleries that an organization typically would not want to be made available to the public, let alone indexed by Google.&lt;br /&gt;
** [http://www.stachliu.com/resources/tools/sharepoint-hacking-diggity-project/#SharePointURLBrute SharePointURLBrute] - SharePointURLBrute is a new SharePoint hacking utility developed to help assessors quickly test user access to 99 common SharePoint administrative pages (e.g. “Add Users” page -&amp;gt; /_layouts/aclinv.aspx) by automating forceful browsing attacks.&lt;br /&gt;
** [http://www.stachliu.com/resources/tools/sharepoint-hacking-diggity-project/#SharePoint%20UserDispEnum SharePoint UserDispEnum] - UserDispEnum is a new SharePoint user enumeration tool that exploits insecure access controls to the /_layouts/UserDisp.aspx?ID=1 page. This utility cycles through the integer ID values from 1 onward to identify valid users, account names, and other related profile information that can be easily extracted from the SharePoint user profiles.&lt;br /&gt;
** [http://www.stachliu.com/resources/tools/sharepoint-hacking-diggity-project/#SharePoint%20DLP%20Tools SharePoint DLP Tools] - COMING SOON – Stach &amp;amp; Liu data loss prevention (DLP) tools for Microsoft SharePoint. SharePoint DLP Tools utilize administrative web services to help automate the searching of SharePoint files and lists for SSNs, credit card numbers, passwords, and other common information disclosures.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== SharePoint Hacking Presentations ====&lt;br /&gt;
* [http://www.youtube.com/watch?v=DYudvh9cfZM hak5 - Episode 407 - Toorcon 2008: Robin Wood, Dan Griffin] - see 11:10 minute mark in video for interview with Dan Griffin about SharePoint Hacking.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== WebParts Security ==&lt;br /&gt;
&lt;br /&gt;
* Security ratings &amp;amp; mappings of MOSS Deployed Web Parts&lt;br /&gt;
* Security ratings &amp;amp; mappings of 3rd Part Web Parts&lt;/div&gt;</summary>
		<author><name>Fran Brown</name></author>	</entry>

	</feed>