<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ken+van+Wyk</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ken+van+Wyk"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Ken_van_Wyk"/>
		<updated>2026-05-09T12:29:38Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=226645</id>
		<title>Projects/OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=226645"/>
				<updated>2017-02-23T10:11:31Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Project About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| project_name = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_home_page = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_description = The iGoat project aims to be a developer learning environment for iOS app developers. It was inspired by the OWASP WebGoat project in particular the developer edition of WebGoat.&lt;br /&gt;
&lt;br /&gt;
Similar to WebGoat (developer), the user is presented with a series of lessons surrounding numerous vulnerabilities associated with iOS apps. The student exploits each vulnerability to validate its existence, and then he implements a remediation in the lesson's source code.&lt;br /&gt;
&lt;br /&gt;
Further, iGoat is designed and implemented modularly, similar conceptually to WebGoat's modular Java EE servlet model. It is intended to provide a foundational framework to build lessons on top of, starting with a core set of lessons provided in the first release.&lt;br /&gt;
&lt;br /&gt;
iGoat can be downloaded here: http://code.google.com/p/owasp-igoat/&lt;br /&gt;
&lt;br /&gt;
| project_license = [http://www.gnu.org/licenses/gpl-3.0.html GPL v3] &lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Swaroop Yermalkar&lt;br /&gt;
| leader_email1 = swaroop.sy@gmail.com&lt;br /&gt;
| leader_username1 = &lt;br /&gt;
&lt;br /&gt;
| leader_name[2-10] =&lt;br /&gt;
| leader_email[2-10] =&lt;br /&gt;
| leader_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| contributor_name1 = Jonathan Carter&lt;br /&gt;
| contributor_email1 = jonathan.carter@owasp.org&lt;br /&gt;
| contributor_username1 = &lt;br /&gt;
&lt;br /&gt;
| contributor_name[2-10] = &lt;br /&gt;
| contributor_email[2-10] = &lt;br /&gt;
| contributor_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link = &lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-igoat-project&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/OWASP_iGoat_Project/Roadmap&lt;br /&gt;
| links_url[1-10] = &lt;br /&gt;
| links_name[1-10] = &lt;br /&gt;
&lt;br /&gt;
| release_1 = iGoat v1.1&lt;br /&gt;
| release_2 = iGoat v2.0&lt;br /&gt;
| release_3 = iGoat v2.1&lt;br /&gt;
| release_4 =iGoat v2.3&lt;br /&gt;
&amp;lt;!--- The line below is for GPC usage only. Please do not edit it ---&amp;gt;&lt;br /&gt;
| project_about_page = Projects/OWASP_iGoat_Project&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=226638</id>
		<title>Projects/OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=226638"/>
				<updated>2017-02-23T01:00:33Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Project About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| project_name = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_home_page = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_description = The iGoat project aims to be a developer learning environment for iOS app developers. It was inspired by the OWASP WebGoat project in particular the developer edition of WebGoat.&lt;br /&gt;
&lt;br /&gt;
Similar to WebGoat (developer), the user is presented with a series of lessons surrounding numerous vulnerabilities associated with iOS apps. The student exploits each vulnerability to validate its existence, and then he implements a remediation in the lesson's source code.&lt;br /&gt;
&lt;br /&gt;
Further, iGoat is designed and implemented modularly, similar conceptually to WebGoat's modular Java EE servlet model. It is intended to provide a foundational framework to build lessons on top of, starting with a core set of lessons provided in the first release.&lt;br /&gt;
&lt;br /&gt;
iGoat can be downloaded here: http://code.google.com/p/owasp-igoat/&lt;br /&gt;
&lt;br /&gt;
| project_license = [http://www.gnu.org/licenses/gpl-3.0.html GPL v3] &lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Swaroop Yermalka&lt;br /&gt;
| leader_email1 = swaroop.sy@gmail.com&lt;br /&gt;
| leader_username1 = &lt;br /&gt;
&lt;br /&gt;
| leader_name[2-10] =&lt;br /&gt;
| leader_email[2-10] =&lt;br /&gt;
| leader_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| contributor_name1 = Jonathan Carter&lt;br /&gt;
| contributor_email1 = jonathan.carter@owasp.org&lt;br /&gt;
| contributor_username1 = &lt;br /&gt;
&lt;br /&gt;
| contributor_name[2-10] = &lt;br /&gt;
| contributor_email[2-10] = &lt;br /&gt;
| contributor_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link = &lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-igoat-project&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/OWASP_iGoat_Project/Roadmap&lt;br /&gt;
| links_url[1-10] = &lt;br /&gt;
| links_name[1-10] = &lt;br /&gt;
&lt;br /&gt;
| release_1 = iGoat v1.1&lt;br /&gt;
| release_2 = iGoat v2.0&lt;br /&gt;
| release_3 = iGoat v2.1&lt;br /&gt;
| release_4 =iGoat v2.3&lt;br /&gt;
&amp;lt;!--- The line below is for GPC usage only. Please do not edit it ---&amp;gt;&lt;br /&gt;
| project_about_page = Projects/OWASP_iGoat_Project&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=210926</id>
		<title>OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=210926"/>
				<updated>2016-03-10T14:47:42Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=  Main  =&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
^^^ Rest assured the iGoat project is NOT inactive. We're merely finding it a new home on Github after its home on Google Code went away. Sorry for the inconvenience, but we most assuredly are working on a new release.&lt;br /&gt;
&lt;br /&gt;
iGoat is a learning tool for iOS developers (iPhone, iPad, etc.). It was inspired by the WebGoat project, and has a similar conceptual flow to it.&lt;br /&gt;
&lt;br /&gt;
As such, iGoat is a safe environment where iOS developers can learn about the major security pitfalls they face as well as how to avoid them. It is made up of a series of lessons that each teach a single (but vital) security lesson.&lt;br /&gt;
&lt;br /&gt;
The lessons are laid out in the following steps:&lt;br /&gt;
&lt;br /&gt;
#  Brief introduction to the problem.&lt;br /&gt;
# Verify the problem by exploiting it.&lt;br /&gt;
# Brief description of available remediations to the problem.&lt;br /&gt;
# Fix the problem by correcting and rebuilding the iGoat program.&lt;br /&gt;
&lt;br /&gt;
Step 4 is optional, but highly recommended for all iOS developers. Assistance is available within iGoat if you don't know how to fix a specific problem.&lt;br /&gt;
&lt;br /&gt;
iGoat is free software, released under the GPLv3 license.&lt;br /&gt;
&lt;br /&gt;
NOTE: Please bear with us as we move this project over to Github. In the meantime, the current version is 2.3, and it can be downloaded here: https://drive.google.com/folderview?id=0B4JD0hBwn1-uZmJXU0pfdEUtdlE&amp;amp;usp=sharing&lt;br /&gt;
&lt;br /&gt;
= Framework =&lt;br /&gt;
&lt;br /&gt;
iGoat has been designed and built to be a foundation on which to build a series of iOS security lessons. The initial iGoat release will include a handful of lessons to work through, but one of the aims of the project is to build a community of developers to help build out additional lessons over time -- much as WebGoat has before it.&lt;br /&gt;
&lt;br /&gt;
Interested contributors are encouraged to contact the project leader (Ken van Wyk, ken@krvw.com) to find out how they can contribute to future releases of iGoat.&lt;br /&gt;
&lt;br /&gt;
= Status =&lt;br /&gt;
&lt;br /&gt;
The iGoat project was launched in May 2011. Version 2.3 was released on 20 November 2014. Source repository and download site:&lt;br /&gt;
&lt;br /&gt;
http://code.google.com/p/owasp-igoat/&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP iGoat Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|iGoat Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=210925</id>
		<title>OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=210925"/>
				<updated>2016-03-10T14:46:35Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=  Main  =&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
iGoat is a learning tool for iOS developers (iPhone, iPad, etc.). It was inspired by the WebGoat project, and has a similar conceptual flow to it.&lt;br /&gt;
&lt;br /&gt;
As such, iGoat is a safe environment where iOS developers can learn about the major security pitfalls they face as well as how to avoid them. It is made up of a series of lessons that each teach a single (but vital) security lesson.&lt;br /&gt;
&lt;br /&gt;
The lessons are laid out in the following steps:&lt;br /&gt;
&lt;br /&gt;
#  Brief introduction to the problem.&lt;br /&gt;
# Verify the problem by exploiting it.&lt;br /&gt;
# Brief description of available remediations to the problem.&lt;br /&gt;
# Fix the problem by correcting and rebuilding the iGoat program.&lt;br /&gt;
&lt;br /&gt;
Step 4 is optional, but highly recommended for all iOS developers. Assistance is available within iGoat if you don't know how to fix a specific problem.&lt;br /&gt;
&lt;br /&gt;
iGoat is free software, released under the GPLv3 license.&lt;br /&gt;
&lt;br /&gt;
NOTE: Please bear with us as we move this project over to Github. In the meantime, the current version is 2.3, and it can be downloaded here: https://drive.google.com/folderview?id=0B4JD0hBwn1-uZmJXU0pfdEUtdlE&amp;amp;usp=sharing&lt;br /&gt;
&lt;br /&gt;
= Framework =&lt;br /&gt;
&lt;br /&gt;
iGoat has been designed and built to be a foundation on which to build a series of iOS security lessons. The initial iGoat release will include a handful of lessons to work through, but one of the aims of the project is to build a community of developers to help build out additional lessons over time -- much as WebGoat has before it.&lt;br /&gt;
&lt;br /&gt;
Interested contributors are encouraged to contact the project leader (Ken van Wyk, ken@krvw.com) to find out how they can contribute to future releases of iGoat.&lt;br /&gt;
&lt;br /&gt;
= Status =&lt;br /&gt;
&lt;br /&gt;
The iGoat project was launched in May 2011. Version 2.3 was released on 20 November 2014. Source repository and download site:&lt;br /&gt;
&lt;br /&gt;
http://code.google.com/p/owasp-igoat/&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP iGoat Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|iGoat Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=210906</id>
		<title>OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=210906"/>
				<updated>2016-03-10T14:22:25Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=  Main  =&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:100px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
iGoat is a learning tool for iOS developers (iPhone, iPad, etc.). It was inspired by the WebGoat project, and has a similar conceptual flow to it.&lt;br /&gt;
&lt;br /&gt;
As such, iGoat is a safe environment where iOS developers can learn about the major security pitfalls they face as well as how to avoid them. It is made up of a series of lessons that each teach a single (but vital) security lesson.&lt;br /&gt;
&lt;br /&gt;
The lessons are laid out in the following steps:&lt;br /&gt;
&lt;br /&gt;
#  Brief introduction to the problem.&lt;br /&gt;
# Verify the problem by exploiting it.&lt;br /&gt;
# Brief description of available remediations to the problem.&lt;br /&gt;
# Fix the problem by correcting and rebuilding the iGoat program.&lt;br /&gt;
&lt;br /&gt;
Step 4 is optional, but highly recommended for all iOS developers. Assistance is available within iGoat if you don't know how to fix a specific problem.&lt;br /&gt;
&lt;br /&gt;
iGoat is free software, released under the GPLv3 license.&lt;br /&gt;
&lt;br /&gt;
The current version is 2.3, and it can be downloaded here: https://drive.google.com/folderview?id=0B4JD0hBwn1-uZmJXU0pfdEUtdlE&amp;amp;usp=sharing&lt;br /&gt;
&lt;br /&gt;
= Framework =&lt;br /&gt;
&lt;br /&gt;
iGoat has been designed and built to be a foundation on which to build a series of iOS security lessons. The initial iGoat release will include a handful of lessons to work through, but one of the aims of the project is to build a community of developers to help build out additional lessons over time -- much as WebGoat has before it.&lt;br /&gt;
&lt;br /&gt;
Interested contributors are encouraged to contact the project leader (Ken van Wyk, ken@krvw.com) to find out how they can contribute to future releases of iGoat.&lt;br /&gt;
&lt;br /&gt;
= Status =&lt;br /&gt;
&lt;br /&gt;
The iGoat project was launched in May 2011. Version 2.3 was released on 20 November 2014. Source repository and download site:&lt;br /&gt;
&lt;br /&gt;
http://code.google.com/p/owasp-igoat/&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP iGoat Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|iGoat Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=185650</id>
		<title>OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=185650"/>
				<updated>2014-11-20T14:06:26Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: /* Status */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=  Main  =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Welcome to the iGoat OWASP project home page.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
iGoat is a learning tool for iOS developers (iPhone, iPad, etc.). It was inspired by the WebGoat project, and has a similar conceptual flow to it.&lt;br /&gt;
&lt;br /&gt;
As such, iGoat is a safe environment where iOS developers can learn about the major security pitfalls they face as well as how to avoid them. It is made up of a series of lessons that each teach a single (but vital) security lesson.&lt;br /&gt;
&lt;br /&gt;
The lessons are laid out in the following steps:&lt;br /&gt;
&lt;br /&gt;
#  Brief introduction to the problem.&lt;br /&gt;
# Verify the problem by exploiting it.&lt;br /&gt;
# Brief description of available remediations to the problem.&lt;br /&gt;
# Fix the problem by correcting and rebuilding the iGoat program.&lt;br /&gt;
&lt;br /&gt;
Step 4 is optional, but highly recommended for all iOS developers. Assistance is available within iGoat if you don't know how to fix a specific problem.&lt;br /&gt;
&lt;br /&gt;
iGoat is free software, released under the GPLv3 license.&lt;br /&gt;
&lt;br /&gt;
iGoat can be downloaded here: http://code.google.com/p/owasp-igoat/&lt;br /&gt;
&lt;br /&gt;
= Framework =&lt;br /&gt;
&lt;br /&gt;
iGoat has been designed and built to be a foundation on which to build a series of iOS security lessons. The initial iGoat release will include a handful of lessons to work through, but one of the aims of the project is to build a community of developers to help build out additional lessons over time -- much as WebGoat has before it.&lt;br /&gt;
&lt;br /&gt;
Interested contributors are encouraged to contact the project leader (Ken van Wyk, ken@krvw.com) to find out how they can contribute to future releases of iGoat.&lt;br /&gt;
&lt;br /&gt;
= Status =&lt;br /&gt;
&lt;br /&gt;
The iGoat project was launched in May 2011. Version 2.3 was released on 20 November 2014. Source repository and download site:&lt;br /&gt;
&lt;br /&gt;
http://code.google.com/p/owasp-igoat/&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP iGoat Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|iGoat Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Ken_van_Wyk&amp;diff=184234</id>
		<title>User talk:Ken van Wyk</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Ken_van_Wyk&amp;diff=184234"/>
				<updated>2014-10-29T11:22:31Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''OWASP''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [[Help:Contents|help pages]].&lt;br /&gt;
Again, welcome and have fun! 21:41, 10 May 2011 (EDT)&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/Current&amp;diff=172127</id>
		<title>Projects/OWASP iGoat Project/Releases/Current</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/Current&amp;diff=172127"/>
				<updated>2014-04-09T20:35:35Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; [[OWASP iGoat Project Source (2.1)] https://code.google.com/p/owasp-igoat/]&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/Current&amp;diff=172124</id>
		<title>Projects/OWASP iGoat Project/Releases/Current</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/Current&amp;diff=172124"/>
				<updated>2014-04-09T20:21:09Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; [[https://www.owasp.org/index.php/OWASP_iGoat_Project] OWASP iGoat project]&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/Current&amp;diff=172123</id>
		<title>Projects/OWASP iGoat Project/Releases/Current</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/Current&amp;diff=172123"/>
				<updated>2014-04-09T20:20:33Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; [[https://www.owasp.org/index.php/OWASP_iGoat_Project]]&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/Current&amp;diff=172120</id>
		<title>Projects/OWASP iGoat Project/Releases/Current</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/Current&amp;diff=172120"/>
				<updated>2014-04-09T20:18:03Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: Redirected page to Projects/OWASP iGoat Project/Releases/iGoat v2.1&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; #REDIRECT [[Projects/OWASP iGoat Project/Releases/iGoat v2.1]]&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=172119</id>
		<title>Projects/OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=172119"/>
				<updated>2014-04-09T20:17:00Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Project About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| project_name = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_home_page = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_description = The iGoat project aims to be a developer learning environment for iOS app developers. It was inspired by the OWASP WebGoat project in particular the developer edition of WebGoat.&lt;br /&gt;
&lt;br /&gt;
Similar to WebGoat (developer), the user is presented with a series of lessons surrounding numerous vulnerabilities associated with iOS apps. The student exploits each vulnerability to validate its existence, and then he implements a remediation in the lesson's source code.&lt;br /&gt;
&lt;br /&gt;
Further, iGoat is designed and implemented modularly, similar conceptually to WebGoat's modular Java EE servlet model. It is intended to provide a foundational framework to build lessons on top of, starting with a core set of lessons provided in the first release.&lt;br /&gt;
&lt;br /&gt;
iGoat can be downloaded here: http://code.google.com/p/owasp-igoat/&lt;br /&gt;
&lt;br /&gt;
| project_license = [http://www.gnu.org/licenses/gpl-3.0.html GPL v3] &lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Kenneth R. van Wyk&lt;br /&gt;
| leader_email1 = ken@krvw.com&lt;br /&gt;
| leader_username1 = Ken van Wyk&lt;br /&gt;
&lt;br /&gt;
| leader_name[2-10] =&lt;br /&gt;
| leader_email[2-10] =&lt;br /&gt;
| leader_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| contributor_name1 = Jonathan Carter&lt;br /&gt;
| contributor_email1 = jonathan.carter@owasp.org&lt;br /&gt;
| contributor_username1 = &lt;br /&gt;
&lt;br /&gt;
| contributor_name[2-10] = &lt;br /&gt;
| contributor_email[2-10] = &lt;br /&gt;
| contributor_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link = &lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-igoat-project&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/OWASP_iGoat_Project/Roadmap&lt;br /&gt;
| links_url[1-10] = &lt;br /&gt;
| links_name[1-10] = &lt;br /&gt;
&lt;br /&gt;
| release_1 = iGoat v1.1&lt;br /&gt;
| release_2 = iGoat v2.0&lt;br /&gt;
| release_3 = iGoat v2.1&lt;br /&gt;
| release_4 =&lt;br /&gt;
&amp;lt;!--- The line below is for GPC usage only. Please do not edit it ---&amp;gt;&lt;br /&gt;
| project_about_page = Projects/OWASP_iGoat_Project&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=172118</id>
		<title>OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=172118"/>
				<updated>2014-04-09T20:13:47Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=  Main  =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Welcome to the iGoat OWASP project home page.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
iGoat is a learning tool for iOS developers (iPhone, iPad, etc.). It was inspired by the WebGoat project, and has a similar conceptual flow to it.&lt;br /&gt;
&lt;br /&gt;
As such, iGoat is a safe environment where iOS developers can learn about the major security pitfalls they face as well as how to avoid them. It is made up of a series of lessons that each teach a single (but vital) security lesson.&lt;br /&gt;
&lt;br /&gt;
The lessons are laid out in the following steps:&lt;br /&gt;
&lt;br /&gt;
#  Brief introduction to the problem.&lt;br /&gt;
# Verify the problem by exploiting it.&lt;br /&gt;
# Brief description of available remediations to the problem.&lt;br /&gt;
# Fix the problem by correcting and rebuilding the iGoat program.&lt;br /&gt;
&lt;br /&gt;
Step 4 is optional, but highly recommended for all iOS developers. Assistance is available within iGoat if you don't know how to fix a specific problem.&lt;br /&gt;
&lt;br /&gt;
iGoat is free software, released under the GPLv3 license.&lt;br /&gt;
&lt;br /&gt;
iGoat can be downloaded here: http://code.google.com/p/owasp-igoat/&lt;br /&gt;
&lt;br /&gt;
= Framework =&lt;br /&gt;
&lt;br /&gt;
iGoat has been designed and built to be a foundation on which to build a series of iOS security lessons. The initial iGoat release will include a handful of lessons to work through, but one of the aims of the project is to build a community of developers to help build out additional lessons over time -- much as WebGoat has before it.&lt;br /&gt;
&lt;br /&gt;
Interested contributors are encouraged to contact the project leader (Ken van Wyk, ken@krvw.com) to find out how they can contribute to future releases of iGoat.&lt;br /&gt;
&lt;br /&gt;
= Status =&lt;br /&gt;
&lt;br /&gt;
The iGoat project was launched in May 2011. Version 2.1 was released on 9 April 2014. Source repository and download site:&lt;br /&gt;
&lt;br /&gt;
http://code.google.com/p/owasp-igoat/&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP iGoat Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|iGoat Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2014_Ideas&amp;diff=167777</id>
		<title>GSoC2014 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2014_Ideas&amp;diff=167777"/>
				<updated>2014-02-10T11:18:06Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==OWASP Project Requests==&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - New challenges and Improvements to the existing ones ===&lt;br /&gt;
&lt;br /&gt;
''''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The challenges that have been implemented so far include: web application challenges covering several vulnerabilities included in the OWASP Top 10, cryptographic challenges, and entire virtual machines including several vulnerabilities.&lt;br /&gt;
New challenges need to be created in order to cover a broader set of vulnerabilities.&lt;br /&gt;
Also existing challenges can be modified to accept a broader set of valid answers, e.g. by using regular expressions.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
* Simulated simple buffer overflows&lt;br /&gt;
* SQL injections&lt;br /&gt;
* Man in the middle simulation&lt;br /&gt;
* Bypassing regular expression filtering&lt;br /&gt;
* Your idea here&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New cool challenges&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Source Code testing environment ===&lt;br /&gt;
&lt;br /&gt;
''''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Existing challenges are based on a dynamic application testing concept. We would like to work on a project that will give the capability to the attacker to review a vulnerable piece of source code, make corrections and see the result in a realistic (but yet safe) runtime environment. The code can either be run if needed or tested for correctness and security. The implementation challenges of such a project can be numerous, including creating a realistic but also secure environment, testing submitted solutions and grading them in an automatic manner. At the same time there are now numerous sites that support submitting code and then simulate or implement a compiler's functionality.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A source code testing and improvement environment where a user will be able to review, improve and test the result of a piece of source code.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Java. Good understanding of Application Security, source code analysis and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Challenge Sandbox ===&lt;br /&gt;
&lt;br /&gt;
Now, in order to create a challenge, one has to validate the solution with regular expressions (or just plaintext comparison) and report success or failure to the backend,&lt;br /&gt;
we'd like the ability to write a normal vulnerable web application as a challenge and leave it to hackademic to make sure that the server is not affected.&lt;br /&gt;
Since this is probably the most difficult task proposed, if you are considering it, please get in touch with us early on so we can discuss about it and plan it correctly.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
''' *Administrator's point of view* '''&lt;br /&gt;
&lt;br /&gt;
Create an infrastructure that spawns virtual environments for users while keeping the load reasonable on the server(s).&lt;br /&gt;
Or configure apache,php,mysql in a way that allows for multiple instances of the programms to run in parallel completely seperated from the rest of the server.&lt;br /&gt;
The student is expected to provide configuration scripts that do the above&lt;br /&gt;
&lt;br /&gt;
''' *Coder's Way* '''&lt;br /&gt;
&lt;br /&gt;
This is better explained with an example:&lt;br /&gt;
In order to create an sql injection challenge one should be able to call a common unsecure mysql execute statement function.&lt;br /&gt;
The student can override common functions like this providing their own implementation of a very temporary database (based on flat files or nosql solutions e.t.c.).&lt;br /&gt;
The new functions should be able to detect the sqli and apply its results in a secure way(if the student drops a table no actual tables should be dropped but the table should not be visible to the student anymore).&lt;br /&gt;
&lt;br /&gt;
''' * Your solution here * '''&lt;br /&gt;
&lt;br /&gt;
The above solutions are by no way complete,their intention is to start you thinking.&lt;br /&gt;
This is a difficult task so if you consider takling it talk to us early on so we can reach a good solution which is possible in the GSoC timeframe.&lt;br /&gt;
&lt;br /&gt;
''' Expected results '''&lt;br /&gt;
&lt;br /&gt;
You should be able to run a big enough subset of OWASP WebGoat PHP with minimal modification as a Hackademic Challenge&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - CMS improvements ===&lt;br /&gt;
&lt;br /&gt;
''''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The new CMS was created during last year's GSOC. We have received feedback from users that suggest various improvements regarding functionality e.g. better user, teacher and challenges management. There are also some security improvements that are needed and in general any functionality that adds up to the educational nature of the project is more than welcome.&lt;br /&gt;
&lt;br /&gt;
Ideas on this project:&lt;br /&gt;
&lt;br /&gt;
* ''' Template''' *&lt;br /&gt;
&lt;br /&gt;
Since it's creation the project has received a good number of new features, but the visual/ux/ui part has never gotten much love.&lt;br /&gt;
It would be good if we had a new template with proper ui design.&lt;br /&gt;
&lt;br /&gt;
* '''Questionaire creation plugin''' *&lt;br /&gt;
&lt;br /&gt;
We'd like the admin to be able to create questionaires, assign rules for each question (e.g. correct answer +2pts incorrect answer -2, no answer 0)  and assign them to students as homework/exams.&lt;br /&gt;
The grading can either be done automatically (for multiple choice) or be submitted to the creator of the questionaire.&lt;br /&gt;
&lt;br /&gt;
* '''Ability to show different articles on the user's home screen''' &lt;br /&gt;
&lt;br /&gt;
Now each user is served the latest article in her/his home screen. We need the ability for either  the teacher/admin to be able to define what article each class is served.&lt;br /&gt;
&lt;br /&gt;
* '''Gamification of the user's progress''' *&lt;br /&gt;
&lt;br /&gt;
A series of plugins and a template which allow the user to earn badges as they solve challenges and a better visual representation of their progress.&lt;br /&gt;
&lt;br /&gt;
* '''Ability to define series of challenges'''&lt;br /&gt;
&lt;br /&gt;
The teacher/admin should be able to define a series of challenges (e.g. 2,5,3,1) which are meant to be solved in that order and if one is not solved then the student can't try the next one.&lt;br /&gt;
&lt;br /&gt;
* ''' Tagging of articles, users, challenges '''&lt;br /&gt;
&lt;br /&gt;
A user should be able to put tags on articles and challenges if he is a student and on users, classes, articles and challenges if he is a teacher.&lt;br /&gt;
Also the user should be able to search according to the tags.&lt;br /&gt;
&lt;br /&gt;
* '''Your idea here''' &lt;br /&gt;
&lt;br /&gt;
We welcome new ideas to make the project look awesome.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New features  and security improvements on the CMS part of the project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP and HTML. Good understanding of Application Security and related vulnerabilities if you undertake security improvements. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
===OWASP WebGoatPHP===&lt;br /&gt;
'''Description:'''&lt;br /&gt;
[[Webgoat]] is a deliberately insecure open source software made by OWASP using Java programming language. It has a set of challenges and steps, each providing the user with one or more web application vulnerability which user tries to solve. There are also hints and auto-detection of correct solutions. &lt;br /&gt;
Since Java is not the most common web application programming language, and it doesn't have many of the bugs other languages such as PHP have when it comes to security, OWASP has [[OWASP_WebGoat_Reboot2012|dedicated in 2012]] an amount of $5000 for promotion of WebGoatPHP.&lt;br /&gt;
&lt;br /&gt;
If you want to know more about WebGoatPHP, I suggest downloading and giving WebGoat a try. It is one of OWASP prides (about 200000 downloads).&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' WebGoatPHP will be a deliberately insecure PHP web application which operates in different modes. A contest mode where challenges are selected by an admin and the system starts a contest. Admins can open up hints for participants and manage everything. A workshop mode, where the educator has control of the most of application features, as well as feedback of user activities and is ideal for learning environments, and a single mode where someone can browse challenges and solve them.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' You just need to know PHP. You are supposed to define flawed systems, which is not the hardest thing. Familiarity with web application security and SQL is recommended.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]]&lt;br /&gt;
&lt;br /&gt;
===OWASP CSRF Guard===&lt;br /&gt;
'''Description:''' [[Cross-Site_Request_Forgery_(CSRF)|CSRF]] is a complicated yet very effective web attack. The most important thing about CSRF is that it's hard to properly defend against it, specially when it comes to Web 2 and AJAX. We have had discussions on means of mitigating CSRF for years at OWASP, and are now ready to develop libraries for it. Many of the key ideas of this library can be found at [http://www.cs.sunysb.edu/~rpelizzi/jcsrf.pdf].&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' A transparent Apache 2 module properly mitigating all POST CSRF attacks, as well as a lightweight PHP library doing the same.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisites:''' Knowing CSRF and at least one way to defend against it, PHP, C/C++, Linux.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===OWASP PHP Security Project===&lt;br /&gt;
&lt;br /&gt;
'''Description:'''&lt;br /&gt;
OWASP PHP Security project plans to gather around secure PHP libraries, and provide a full featured framework of libraries for secure web applications in PHP, both as separate de-coupled libraries and as a whole secure web application framework. Many aspects of this project are already handled, and are being added to OWASP.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results: ''' Result of this project is much more security among PHP applications. Most PHP applications are vulnerable and there's no central approach to secure them (due to open source nature). Many people look at OWASP for such information.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Anyone with adequate PHP programming language experience (possibly web application development in PHP).  There are hard and easy parts of this project. For tougher parts, familiarity with security concepts, advanced SQL, and advanced PHP and web server configuration is required. &lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary , Johanna Curiel&lt;br /&gt;
&lt;br /&gt;
===OWASP RBAC Project===&lt;br /&gt;
'''Description:''' ''For the last 6 years, improper access control has been the issue behind two of the Top Ten lists''. &lt;br /&gt;
&lt;br /&gt;
RBAC stands for Role Based Access Control and is the de-facto access control and authorization standard. It simplifies access control and its maintenance for small and enterprise systems alike. NIST RBAC standard has four levels, the second level hierarchical RBAC is intended for this project.&lt;br /&gt;
&lt;br /&gt;
Unfortunately because of many performance and development problems, no suitable RBAC implementation was available until recently, so developers and admins mostly used ACLs and other forms of simple access control methods, which leads to broken and unmaintainable access control over the time. &lt;br /&gt;
&lt;br /&gt;
OWASP provides the RBAC project, as a stand-alone library with very fast access control checks and standard mature code-base. Currently [[PHPRBAC]] which is the PHP version of the RBAC project is released.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' Standard NIST level 2 hierarchical RBAC libraries for different programming languages, specially web-based ones such as C/C++/Java/ASP/ASPX/Python/Perl/etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Good SQL knowledge, library development schemes, familiarity with one of the programming languages.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary &lt;br /&gt;
&lt;br /&gt;
'''Skill Level:''' Advanced&lt;br /&gt;
&lt;br /&gt;
For more info, visit [http://phprbac.net phprbac.net]&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Zest support ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The Mozilla foundation has done great work with the Zest iniciative, this provides a great automated mechanism to replicate exploitation of security vulnerabilities in a format that makes tool communication easier: For example, ZAP supports Zest, so if OWTF can create a Zest script for a vulnerability in an automated fashion, this may in turn be easier to import into ZAP and other tools.&lt;br /&gt;
&lt;br /&gt;
[https://developer.mozilla.org/en-US/docs/Zest More information on Zest can be found here]&lt;br /&gt;
&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Some previous exposure to security concepts, penetration testing, Python and development in general is important for this project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Improved Plug-n-Hack support ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The Mozilla foundation has done great work with the Plug-n-Hack standard, this provides greatly improved interaction with the web browser.&lt;br /&gt;
Although OWTF already supports Plug-n-Hack for MiTM purposes, there are many other features that could be implemented to leaverage Plug-n-Hack.&lt;br /&gt;
The aim of this project would be to try to cover as much as possible from the Plug-n-Hack standard as relevant to OWTF.&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=pYFtLA2yTR8 Please see this demo to see the newest Plug-n-Hack additions]&lt;br /&gt;
&lt;br /&gt;
[https://blog.mozilla.org/security/2013/08/22/plug-n-hack/ For more information about plug and hack please see this]&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience is very welcome but not strictly necessary, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Stateful Browser with configurable authentication ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The automated functionality of OWASP OWTF is currently limited to the non-authenticated portion of a website. We would like to implement authentication support through:&lt;br /&gt;
&lt;br /&gt;
1) OWTF parameters&lt;br /&gt;
&lt;br /&gt;
2) Configuration files&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What we would like to do here is to leverage the [http://wwwsearch.sourceforge.net/mechanize/ powerful mechanize python library] and build at least support for the following authentication options:&lt;br /&gt;
* Basic authentication [https://github.com/7a/owtf/issues/9 Already implemented here]&lt;br /&gt;
* Cookie based authentication&lt;br /&gt;
* Form-based authentication&lt;br /&gt;
&lt;br /&gt;
Additionally, we would welcome here a feature to detect when the user has been logged off, to log OWTF back in again before retrying the next request. &amp;lt;-- The proxy is probably a better place to implement this since external tools would also benefit from this. This feature will have to be coordinated with the MiTM proxy feature (already implemented).&lt;br /&gt;
&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with the mechanize library or HTTP state is very welcome but not strictly necessary, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - SQL database ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF scans may take a large amount of disk space due to saving information in text files, we would like to add an option to use a SQL database, probably using the sqlalchemy python library.&lt;br /&gt;
* Keep the current text file format as an option&lt;br /&gt;
* Add a database storage option using the sqlalchemy library &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Reliability: Both with the sql database option and the text file options.&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, sqlalchemy experience would be beneficial for this&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Unit Test Framework ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
As OWASP OWTF grows it makes sense to build custom unit tests to automatically re-test that functionality has not been broken. In this project we would like to improve the existing unit testing framework so that creating OWASP OWTF unit tests is as simple as possible and all missing tests for new functionality are created. The goal of this project is to update the existing Unit Test Framework to create all missing tests as well as improve the existing ones to verify OWASP OWTF functionality in an automated fashion.&lt;br /&gt;
&lt;br /&gt;
The Unit Test Framework should be able to:&lt;br /&gt;
* Define test categories: For example, &amp;quot;all plugins&amp;quot;, &amp;quot;web plugins&amp;quot;, &amp;quot;aux plugins&amp;quot;, &amp;quot;test framework core&amp;quot;, etc. (please see [http://www.slideshare.net/abrahamaranguren/introducing-owasp-owtf-workshop-brucon-2012 this presentation] for more background)&lt;br /&gt;
* Allow to regression test isolated plugins (i.e. &amp;quot;only test _this_ plugin&amp;quot;)&lt;br /&gt;
* Allow to regression test by test categories (i.e. &amp;quot;test only web plugins&amp;quot;)&lt;br /&gt;
* Allow to regression test everything (i.e. plugins + framework core: &amp;quot;test all&amp;quot;)&lt;br /&gt;
* Produce meaningful statistics and easy to navigate logs to identify which tests failed and ideally also hints on how to potentially fix the problem where possible&lt;br /&gt;
* Allow for easy creation of _new_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Allow for easy modification and maintenance of _existing_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Perform well so that we can run as many tests as possible in a given period of time&lt;br /&gt;
* Potentially leverage the python unittest library: [http://docs.python.org/2/library/unittest.html http://docs.python.org/2/library/unittest.html]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Performant and automated regression testing&lt;br /&gt;
* Unit tests for a wide coverage of OWASP OWTF, ideally leveraging the Unit Test Framework where possible&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with unit tests and automated regression testing would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Python version upgrade and compatibility ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Right now OWASP OWTF works on Python 2.6.5-2.7.3 (might work on surrounding versions too), the aim of this project would be to change the existing codebase so that it additionally works on newer python versions too, for example Python 3.3.&lt;br /&gt;
The intention here is to take advantage of improvements in newer python versions when available while letting OWASP OWTF work on older python versions too (i.e. 2.6.5) if that is the only option available.&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable due to compatibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Performant and reliable OWASP OWTF execution on multiple python versions, in particular the latest python version (i.e. 3.3.x) as well as the previous 2.6.5-2.7.3 range.&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with python version upgrades and python version compatibility implementations, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
===OWASP PCI TOOLKIT===&lt;br /&gt;
[[File:Pci-toolkit-items-small.gif]]&amp;lt;br&amp;gt; OWASP PCI toolkit is an Open Source project built using Google Engine App, that will help organizations scope the PCI-DSS requirements for their System Components. The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards.&lt;br /&gt;
&lt;br /&gt;
In order to comply with this standard, organizations need to understand the PCI-DSS requirements. Many of these requirements use OWASP guidelines as their baseline.&lt;br /&gt;
 &lt;br /&gt;
The OWASP PCI toolkit is a project focused on helping organization understand how OWASP guidelines apply to the PCI-DSS requirements.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
4 complete modules built as a Google App Engine: &lt;br /&gt;
http://pci-toolkit.appspot.com/&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Skill Level: Easy-Medium&lt;br /&gt;
Python, HTML, CSS, Google App Engine.&lt;br /&gt;
&lt;br /&gt;
Affinity with financial institutions, Web security and credit card-online transactions&lt;br /&gt;
&lt;br /&gt;
'''OWASP project page:'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_PCI_Project&lt;br /&gt;
&lt;br /&gt;
Mentor: Johanna Curiel - emai: firstname.lastname@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP iGoat ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Right now OWASP iGoat works fine as a full universal iOS app on iPhone and iPads up to iOS 6.x and Xcode 4.x. It needs to be updated to properly function under iOS 7.x and Xcode 5.x, which will require some code maintenance, GUI changes, and so on.&lt;br /&gt;
&lt;br /&gt;
Although it is primarily maintenance items that need the updating, the student will gain an intimate familiarity with how the iGoat platform works, including how to write and plug-in new exercise modules. Writing additional exercises, with all due credit, will also be encouraged in an optional second phase of this project.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP iGoat please see: https://www.owasp.org/index.php/OWASP_iGoat_Project&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* iGoat functions properly in all current aspects under iOS 7.x, compiled under Xcode 5.x.&lt;br /&gt;
* All GUI, buttons, and other presentation layer aspects of iGoat are compliant with iOS 7.x look and feel.&lt;br /&gt;
* (Optionally) write one or more new iGoat exercise modules, based on existing design descriptions to be provided by the project mentor.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
iOS app development in Xcode using Objective C will be quite necessary. Familiarity with iOS 7.x user interface updates additionally helpful.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Ken van Wyk - OWASP iGoat Project Leader - Contact: ken@krvw.com'''&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2014_Ideas&amp;diff=167776</id>
		<title>GSoC2014 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2014_Ideas&amp;diff=167776"/>
				<updated>2014-02-10T11:13:44Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==OWASP Project Requests==&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - New challenges and Improvements to the existing ones ===&lt;br /&gt;
&lt;br /&gt;
''''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The challenges that have been implemented so far include: web application challenges covering several vulnerabilities included in the OWASP Top 10, cryptographic challenges, and entire virtual machines including several vulnerabilities.&lt;br /&gt;
New challenges need to be created in order to cover a broader set of vulnerabilities.&lt;br /&gt;
Also existing challenges can be modified to accept a broader set of valid answers, e.g. by using regular expressions.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
* Simulated simple buffer overflows&lt;br /&gt;
* SQL injections&lt;br /&gt;
* Man in the middle simulation&lt;br /&gt;
* Bypassing regular expression filtering&lt;br /&gt;
* Your idea here&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New cool challenges&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Source Code testing environment ===&lt;br /&gt;
&lt;br /&gt;
''''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Existing challenges are based on a dynamic application testing concept. We would like to work on a project that will give the capability to the attacker to review a vulnerable piece of source code, make corrections and see the result in a realistic (but yet safe) runtime environment. The code can either be run if needed or tested for correctness and security. The implementation challenges of such a project can be numerous, including creating a realistic but also secure environment, testing submitted solutions and grading them in an automatic manner. At the same time there are now numerous sites that support submitting code and then simulate or implement a compiler's functionality.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A source code testing and improvement environment where a user will be able to review, improve and test the result of a piece of source code.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Java. Good understanding of Application Security, source code analysis and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Challenge Sandbox ===&lt;br /&gt;
&lt;br /&gt;
Now, in order to create a challenge, one has to validate the solution with regular expressions (or just plaintext comparison) and report success or failure to the backend,&lt;br /&gt;
we'd like the ability to write a normal vulnerable web application as a challenge and leave it to hackademic to make sure that the server is not affected.&lt;br /&gt;
Since this is probably the most difficult task proposed, if you are considering it, please get in touch with us early on so we can discuss about it and plan it correctly.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
''' *Administrator's point of view* '''&lt;br /&gt;
&lt;br /&gt;
Create an infrastructure that spawns virtual environments for users while keeping the load reasonable on the server(s).&lt;br /&gt;
Or configure apache,php,mysql in a way that allows for multiple instances of the programms to run in parallel completely seperated from the rest of the server.&lt;br /&gt;
The student is expected to provide configuration scripts that do the above&lt;br /&gt;
&lt;br /&gt;
''' *Coder's Way* '''&lt;br /&gt;
&lt;br /&gt;
This is better explained with an example:&lt;br /&gt;
In order to create an sql injection challenge one should be able to call a common unsecure mysql execute statement function.&lt;br /&gt;
The student can override common functions like this providing their own implementation of a very temporary database (based on flat files or nosql solutions e.t.c.).&lt;br /&gt;
The new functions should be able to detect the sqli and apply its results in a secure way(if the student drops a table no actual tables should be dropped but the table should not be visible to the student anymore).&lt;br /&gt;
&lt;br /&gt;
''' * Your solution here * '''&lt;br /&gt;
&lt;br /&gt;
The above solutions are by no way complete,their intention is to start you thinking.&lt;br /&gt;
This is a difficult task so if you consider takling it talk to us early on so we can reach a good solution which is possible in the GSoC timeframe.&lt;br /&gt;
&lt;br /&gt;
''' Expected results '''&lt;br /&gt;
&lt;br /&gt;
You should be able to run a big enough subset of OWASP WebGoat PHP with minimal modification as a Hackademic Challenge&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - CMS improvements ===&lt;br /&gt;
&lt;br /&gt;
''''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The new CMS was created during last year's GSOC. We have received feedback from users that suggest various improvements regarding functionality e.g. better user, teacher and challenges management. There are also some security improvements that are needed and in general any functionality that adds up to the educational nature of the project is more than welcome.&lt;br /&gt;
&lt;br /&gt;
Ideas on this project:&lt;br /&gt;
&lt;br /&gt;
* ''' Template''' *&lt;br /&gt;
&lt;br /&gt;
Since it's creation the project has received a good number of new features, but the visual/ux/ui part has never gotten much love.&lt;br /&gt;
It would be good if we had a new template with proper ui design.&lt;br /&gt;
&lt;br /&gt;
* '''Questionaire creation plugin''' *&lt;br /&gt;
&lt;br /&gt;
We'd like the admin to be able to create questionaires, assign rules for each question (e.g. correct answer +2pts incorrect answer -2, no answer 0)  and assign them to students as homework/exams.&lt;br /&gt;
The grading can either be done automatically (for multiple choice) or be submitted to the creator of the questionaire.&lt;br /&gt;
&lt;br /&gt;
* '''Ability to show different articles on the user's home screen''' &lt;br /&gt;
&lt;br /&gt;
Now each user is served the latest article in her/his home screen. We need the ability for either  the teacher/admin to be able to define what article each class is served.&lt;br /&gt;
&lt;br /&gt;
* '''Gamification of the user's progress''' *&lt;br /&gt;
&lt;br /&gt;
A series of plugins and a template which allow the user to earn badges as they solve challenges and a better visual representation of their progress.&lt;br /&gt;
&lt;br /&gt;
* '''Ability to define series of challenges'''&lt;br /&gt;
&lt;br /&gt;
The teacher/admin should be able to define a series of challenges (e.g. 2,5,3,1) which are meant to be solved in that order and if one is not solved then the student can't try the next one.&lt;br /&gt;
&lt;br /&gt;
* ''' Tagging of articles, users, challenges '''&lt;br /&gt;
&lt;br /&gt;
A user should be able to put tags on articles and challenges if he is a student and on users, classes, articles and challenges if he is a teacher.&lt;br /&gt;
Also the user should be able to search according to the tags.&lt;br /&gt;
&lt;br /&gt;
* '''Your idea here''' &lt;br /&gt;
&lt;br /&gt;
We welcome new ideas to make the project look awesome.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New features  and security improvements on the CMS part of the project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP and HTML. Good understanding of Application Security and related vulnerabilities if you undertake security improvements. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
===OWASP WebGoatPHP===&lt;br /&gt;
'''Description:'''&lt;br /&gt;
[[Webgoat]] is a deliberately insecure open source software made by OWASP using Java programming language. It has a set of challenges and steps, each providing the user with one or more web application vulnerability which user tries to solve. There are also hints and auto-detection of correct solutions. &lt;br /&gt;
Since Java is not the most common web application programming language, and it doesn't have many of the bugs other languages such as PHP have when it comes to security, OWASP has [[OWASP_WebGoat_Reboot2012|dedicated in 2012]] an amount of $5000 for promotion of WebGoatPHP.&lt;br /&gt;
&lt;br /&gt;
If you want to know more about WebGoatPHP, I suggest downloading and giving WebGoat a try. It is one of OWASP prides (about 200000 downloads).&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' WebGoatPHP will be a deliberately insecure PHP web application which operates in different modes. A contest mode where challenges are selected by an admin and the system starts a contest. Admins can open up hints for participants and manage everything. A workshop mode, where the educator has control of the most of application features, as well as feedback of user activities and is ideal for learning environments, and a single mode where someone can browse challenges and solve them.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' You just need to know PHP. You are supposed to define flawed systems, which is not the hardest thing. Familiarity with web application security and SQL is recommended.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]]&lt;br /&gt;
&lt;br /&gt;
===OWASP CSRF Guard===&lt;br /&gt;
'''Description:''' [[Cross-Site_Request_Forgery_(CSRF)|CSRF]] is a complicated yet very effective web attack. The most important thing about CSRF is that it's hard to properly defend against it, specially when it comes to Web 2 and AJAX. We have had discussions on means of mitigating CSRF for years at OWASP, and are now ready to develop libraries for it. Many of the key ideas of this library can be found at [http://www.cs.sunysb.edu/~rpelizzi/jcsrf.pdf].&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' A transparent Apache 2 module properly mitigating all POST CSRF attacks, as well as a lightweight PHP library doing the same.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisites:''' Knowing CSRF and at least one way to defend against it, PHP, C/C++, Linux.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===OWASP PHP Security Project===&lt;br /&gt;
&lt;br /&gt;
'''Description:'''&lt;br /&gt;
OWASP PHP Security project plans to gather around secure PHP libraries, and provide a full featured framework of libraries for secure web applications in PHP, both as separate de-coupled libraries and as a whole secure web application framework. Many aspects of this project are already handled, and are being added to OWASP.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results: ''' Result of this project is much more security among PHP applications. Most PHP applications are vulnerable and there's no central approach to secure them (due to open source nature). Many people look at OWASP for such information.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Anyone with adequate PHP programming language experience (possibly web application development in PHP).  There are hard and easy parts of this project. For tougher parts, familiarity with security concepts, advanced SQL, and advanced PHP and web server configuration is required. &lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary , Johanna Curiel&lt;br /&gt;
&lt;br /&gt;
===OWASP RBAC Project===&lt;br /&gt;
'''Description:''' ''For the last 6 years, improper access control has been the issue behind two of the Top Ten lists''. &lt;br /&gt;
&lt;br /&gt;
RBAC stands for Role Based Access Control and is the de-facto access control and authorization standard. It simplifies access control and its maintenance for small and enterprise systems alike. NIST RBAC standard has four levels, the second level hierarchical RBAC is intended for this project.&lt;br /&gt;
&lt;br /&gt;
Unfortunately because of many performance and development problems, no suitable RBAC implementation was available until recently, so developers and admins mostly used ACLs and other forms of simple access control methods, which leads to broken and unmaintainable access control over the time. &lt;br /&gt;
&lt;br /&gt;
OWASP provides the RBAC project, as a stand-alone library with very fast access control checks and standard mature code-base. Currently [[PHPRBAC]] which is the PHP version of the RBAC project is released.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' Standard NIST level 2 hierarchical RBAC libraries for different programming languages, specially web-based ones such as C/C++/Java/ASP/ASPX/Python/Perl/etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Good SQL knowledge, library development schemes, familiarity with one of the programming languages.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary &lt;br /&gt;
&lt;br /&gt;
'''Skill Level:''' Advanced&lt;br /&gt;
&lt;br /&gt;
For more info, visit [http://phprbac.net phprbac.net]&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Zest support ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The Mozilla foundation has done great work with the Zest iniciative, this provides a great automated mechanism to replicate exploitation of security vulnerabilities in a format that makes tool communication easier: For example, ZAP supports Zest, so if OWTF can create a Zest script for a vulnerability in an automated fashion, this may in turn be easier to import into ZAP and other tools.&lt;br /&gt;
&lt;br /&gt;
[https://developer.mozilla.org/en-US/docs/Zest More information on Zest can be found here]&lt;br /&gt;
&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Some previous exposure to security concepts, penetration testing, Python and development in general is important for this project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Improved Plug-n-Hack support ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The Mozilla foundation has done great work with the Plug-n-Hack standard, this provides greatly improved interaction with the web browser.&lt;br /&gt;
Although OWTF already supports Plug-n-Hack for MiTM purposes, there are many other features that could be implemented to leaverage Plug-n-Hack.&lt;br /&gt;
The aim of this project would be to try to cover as much as possible from the Plug-n-Hack standard as relevant to OWTF.&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=pYFtLA2yTR8 Please see this demo to see the newest Plug-n-Hack additions]&lt;br /&gt;
&lt;br /&gt;
[https://blog.mozilla.org/security/2013/08/22/plug-n-hack/ For more information about plug and hack please see this]&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience is very welcome but not strictly necessary, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Stateful Browser with configurable authentication ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The automated functionality of OWASP OWTF is currently limited to the non-authenticated portion of a website. We would like to implement authentication support through:&lt;br /&gt;
&lt;br /&gt;
1) OWTF parameters&lt;br /&gt;
&lt;br /&gt;
2) Configuration files&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What we would like to do here is to leverage the [http://wwwsearch.sourceforge.net/mechanize/ powerful mechanize python library] and build at least support for the following authentication options:&lt;br /&gt;
* Basic authentication [https://github.com/7a/owtf/issues/9 Already implemented here]&lt;br /&gt;
* Cookie based authentication&lt;br /&gt;
* Form-based authentication&lt;br /&gt;
&lt;br /&gt;
Additionally, we would welcome here a feature to detect when the user has been logged off, to log OWTF back in again before retrying the next request. &amp;lt;-- The proxy is probably a better place to implement this since external tools would also benefit from this. This feature will have to be coordinated with the MiTM proxy feature (already implemented).&lt;br /&gt;
&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with the mechanize library or HTTP state is very welcome but not strictly necessary, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - SQL database ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF scans may take a large amount of disk space due to saving information in text files, we would like to add an option to use a SQL database, probably using the sqlalchemy python library.&lt;br /&gt;
* Keep the current text file format as an option&lt;br /&gt;
* Add a database storage option using the sqlalchemy library &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Reliability: Both with the sql database option and the text file options.&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, sqlalchemy experience would be beneficial for this&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Unit Test Framework ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
As OWASP OWTF grows it makes sense to build custom unit tests to automatically re-test that functionality has not been broken. In this project we would like to improve the existing unit testing framework so that creating OWASP OWTF unit tests is as simple as possible and all missing tests for new functionality are created. The goal of this project is to update the existing Unit Test Framework to create all missing tests as well as improve the existing ones to verify OWASP OWTF functionality in an automated fashion.&lt;br /&gt;
&lt;br /&gt;
The Unit Test Framework should be able to:&lt;br /&gt;
* Define test categories: For example, &amp;quot;all plugins&amp;quot;, &amp;quot;web plugins&amp;quot;, &amp;quot;aux plugins&amp;quot;, &amp;quot;test framework core&amp;quot;, etc. (please see [http://www.slideshare.net/abrahamaranguren/introducing-owasp-owtf-workshop-brucon-2012 this presentation] for more background)&lt;br /&gt;
* Allow to regression test isolated plugins (i.e. &amp;quot;only test _this_ plugin&amp;quot;)&lt;br /&gt;
* Allow to regression test by test categories (i.e. &amp;quot;test only web plugins&amp;quot;)&lt;br /&gt;
* Allow to regression test everything (i.e. plugins + framework core: &amp;quot;test all&amp;quot;)&lt;br /&gt;
* Produce meaningful statistics and easy to navigate logs to identify which tests failed and ideally also hints on how to potentially fix the problem where possible&lt;br /&gt;
* Allow for easy creation of _new_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Allow for easy modification and maintenance of _existing_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Perform well so that we can run as many tests as possible in a given period of time&lt;br /&gt;
* Potentially leverage the python unittest library: [http://docs.python.org/2/library/unittest.html http://docs.python.org/2/library/unittest.html]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Performant and automated regression testing&lt;br /&gt;
* Unit tests for a wide coverage of OWASP OWTF, ideally leveraging the Unit Test Framework where possible&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with unit tests and automated regression testing would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Python version upgrade and compatibility ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Right now OWASP OWTF works on Python 2.6.5-2.7.3 (might work on surrounding versions too), the aim of this project would be to change the existing codebase so that it additionally works on newer python versions too, for example Python 3.3.&lt;br /&gt;
The intention here is to take advantage of improvements in newer python versions when available while letting OWASP OWTF work on older python versions too (i.e. 2.6.5) if that is the only option available.&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable due to compatibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Performant and reliable OWASP OWTF execution on multiple python versions, in particular the latest python version (i.e. 3.3.x) as well as the previous 2.6.5-2.7.3 range.&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with python version upgrades and python version compatibility implementations, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
===OWASP PCI TOOLKIT===&lt;br /&gt;
[[File:Pci-toolkit-items-small.gif]]&amp;lt;br&amp;gt; OWASP PCI toolkit is an Open Source project built using Google Engine App, that will help organizations scope the PCI-DSS requirements for their System Components. The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards.&lt;br /&gt;
&lt;br /&gt;
In order to comply with this standard, organizations need to understand the PCI-DSS requirements. Many of these requirements use OWASP guidelines as their baseline.&lt;br /&gt;
 &lt;br /&gt;
The OWASP PCI toolkit is a project focused on helping organization understand how OWASP guidelines apply to the PCI-DSS requirements.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
4 complete modules built as a Google App Engine: &lt;br /&gt;
http://pci-toolkit.appspot.com/&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Skill Level: Easy-Medium&lt;br /&gt;
Python, HTML, CSS, Google App Engine.&lt;br /&gt;
&lt;br /&gt;
Affinity with financial institutions, Web security and credit card-online transactions&lt;br /&gt;
&lt;br /&gt;
'''OWASP project page:'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_PCI_Project&lt;br /&gt;
&lt;br /&gt;
Mentor: Johanna Curiel - emai: firstname.lastname@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP iGoat ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Right now OWASP iGoat works fine as a full universal iOS app on iPhone and iPads up to iOS 6.x and Xcode 4.x. It needs to be updated to properly function under iOS 7.x and Xcode 5.x, which will require some code maintenance, GUI changes, and so on.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP iGoat please see: https://www.owasp.org/index.php/OWASP_iGoat_Project&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* iGoat functions properly in all current aspects under iOS 7.x, compiled under Xcode 5.x.&lt;br /&gt;
* All GUI, buttons, and other presentation layer aspects of iGoat are compliant with iOS 7.x look and feel.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
iOS app development in Xcode using Objective C will be quite necessary. Familiarity with iOS 7.x user interface updates additionally helpful.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Ken van Wyk - OWASP iGoat Project Leader - Contact: ken@krvw.com'''&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2014_Ideas&amp;diff=167775</id>
		<title>GSoC2014 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2014_Ideas&amp;diff=167775"/>
				<updated>2014-02-10T11:12:37Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==OWASP Project Requests==&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - New challenges and Improvements to the existing ones ===&lt;br /&gt;
&lt;br /&gt;
''''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The challenges that have been implemented so far include: web application challenges covering several vulnerabilities included in the OWASP Top 10, cryptographic challenges, and entire virtual machines including several vulnerabilities.&lt;br /&gt;
New challenges need to be created in order to cover a broader set of vulnerabilities.&lt;br /&gt;
Also existing challenges can be modified to accept a broader set of valid answers, e.g. by using regular expressions.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
* Simulated simple buffer overflows&lt;br /&gt;
* SQL injections&lt;br /&gt;
* Man in the middle simulation&lt;br /&gt;
* Bypassing regular expression filtering&lt;br /&gt;
* Your idea here&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New cool challenges&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Javascript. Good understanding of Application Security and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Source Code testing environment ===&lt;br /&gt;
&lt;br /&gt;
''''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Existing challenges are based on a dynamic application testing concept. We would like to work on a project that will give the capability to the attacker to review a vulnerable piece of source code, make corrections and see the result in a realistic (but yet safe) runtime environment. The code can either be run if needed or tested for correctness and security. The implementation challenges of such a project can be numerous, including creating a realistic but also secure environment, testing submitted solutions and grading them in an automatic manner. At the same time there are now numerous sites that support submitting code and then simulate or implement a compiler's functionality.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
A source code testing and improvement environment where a user will be able to review, improve and test the result of a piece of source code.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP, HTML and possibly Java. Good understanding of Application Security, source code analysis and related vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - Challenge Sandbox ===&lt;br /&gt;
&lt;br /&gt;
Now, in order to create a challenge, one has to validate the solution with regular expressions (or just plaintext comparison) and report success or failure to the backend,&lt;br /&gt;
we'd like the ability to write a normal vulnerable web application as a challenge and leave it to hackademic to make sure that the server is not affected.&lt;br /&gt;
Since this is probably the most difficult task proposed, if you are considering it, please get in touch with us early on so we can discuss about it and plan it correctly.&lt;br /&gt;
&lt;br /&gt;
Ideas on the project:&lt;br /&gt;
&lt;br /&gt;
''' *Administrator's point of view* '''&lt;br /&gt;
&lt;br /&gt;
Create an infrastructure that spawns virtual environments for users while keeping the load reasonable on the server(s).&lt;br /&gt;
Or configure apache,php,mysql in a way that allows for multiple instances of the programms to run in parallel completely seperated from the rest of the server.&lt;br /&gt;
The student is expected to provide configuration scripts that do the above&lt;br /&gt;
&lt;br /&gt;
''' *Coder's Way* '''&lt;br /&gt;
&lt;br /&gt;
This is better explained with an example:&lt;br /&gt;
In order to create an sql injection challenge one should be able to call a common unsecure mysql execute statement function.&lt;br /&gt;
The student can override common functions like this providing their own implementation of a very temporary database (based on flat files or nosql solutions e.t.c.).&lt;br /&gt;
The new functions should be able to detect the sqli and apply its results in a secure way(if the student drops a table no actual tables should be dropped but the table should not be visible to the student anymore).&lt;br /&gt;
&lt;br /&gt;
''' * Your solution here * '''&lt;br /&gt;
&lt;br /&gt;
The above solutions are by no way complete,their intention is to start you thinking.&lt;br /&gt;
This is a difficult task so if you consider takling it talk to us early on so we can reach a good solution which is possible in the GSoC timeframe.&lt;br /&gt;
&lt;br /&gt;
''' Expected results '''&lt;br /&gt;
&lt;br /&gt;
You should be able to run a big enough subset of OWASP WebGoat PHP with minimal modification as a Hackademic Challenge&lt;br /&gt;
&lt;br /&gt;
=== OWASP Hackademic Challenges - CMS improvements ===&lt;br /&gt;
&lt;br /&gt;
''''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The new CMS was created during last year's GSOC. We have received feedback from users that suggest various improvements regarding functionality e.g. better user, teacher and challenges management. There are also some security improvements that are needed and in general any functionality that adds up to the educational nature of the project is more than welcome.&lt;br /&gt;
&lt;br /&gt;
Ideas on this project:&lt;br /&gt;
&lt;br /&gt;
* ''' Template''' *&lt;br /&gt;
&lt;br /&gt;
Since it's creation the project has received a good number of new features, but the visual/ux/ui part has never gotten much love.&lt;br /&gt;
It would be good if we had a new template with proper ui design.&lt;br /&gt;
&lt;br /&gt;
* '''Questionaire creation plugin''' *&lt;br /&gt;
&lt;br /&gt;
We'd like the admin to be able to create questionaires, assign rules for each question (e.g. correct answer +2pts incorrect answer -2, no answer 0)  and assign them to students as homework/exams.&lt;br /&gt;
The grading can either be done automatically (for multiple choice) or be submitted to the creator of the questionaire.&lt;br /&gt;
&lt;br /&gt;
* '''Ability to show different articles on the user's home screen''' &lt;br /&gt;
&lt;br /&gt;
Now each user is served the latest article in her/his home screen. We need the ability for either  the teacher/admin to be able to define what article each class is served.&lt;br /&gt;
&lt;br /&gt;
* '''Gamification of the user's progress''' *&lt;br /&gt;
&lt;br /&gt;
A series of plugins and a template which allow the user to earn badges as they solve challenges and a better visual representation of their progress.&lt;br /&gt;
&lt;br /&gt;
* '''Ability to define series of challenges'''&lt;br /&gt;
&lt;br /&gt;
The teacher/admin should be able to define a series of challenges (e.g. 2,5,3,1) which are meant to be solved in that order and if one is not solved then the student can't try the next one.&lt;br /&gt;
&lt;br /&gt;
* ''' Tagging of articles, users, challenges '''&lt;br /&gt;
&lt;br /&gt;
A user should be able to put tags on articles and challenges if he is a student and on users, classes, articles and challenges if he is a teacher.&lt;br /&gt;
Also the user should be able to search according to the tags.&lt;br /&gt;
&lt;br /&gt;
* '''Your idea here''' &lt;br /&gt;
&lt;br /&gt;
We welcome new ideas to make the project look awesome.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
&lt;br /&gt;
New features  and security improvements on the CMS part of the project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
Comfortable in PHP and HTML. Good understanding of Application Security and related vulnerabilities if you undertake security improvements. &lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' Konstantinos Papapanagiotou, Spyros Gasteratos - Hackademic Challenges Project Leaders&lt;br /&gt;
&lt;br /&gt;
===OWASP WebGoatPHP===&lt;br /&gt;
'''Description:'''&lt;br /&gt;
[[Webgoat]] is a deliberately insecure open source software made by OWASP using Java programming language. It has a set of challenges and steps, each providing the user with one or more web application vulnerability which user tries to solve. There are also hints and auto-detection of correct solutions. &lt;br /&gt;
Since Java is not the most common web application programming language, and it doesn't have many of the bugs other languages such as PHP have when it comes to security, OWASP has [[OWASP_WebGoat_Reboot2012|dedicated in 2012]] an amount of $5000 for promotion of WebGoatPHP.&lt;br /&gt;
&lt;br /&gt;
If you want to know more about WebGoatPHP, I suggest downloading and giving WebGoat a try. It is one of OWASP prides (about 200000 downloads).&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' WebGoatPHP will be a deliberately insecure PHP web application which operates in different modes. A contest mode where challenges are selected by an admin and the system starts a contest. Admins can open up hints for participants and manage everything. A workshop mode, where the educator has control of the most of application features, as well as feedback of user activities and is ideal for learning environments, and a single mode where someone can browse challenges and solve them.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' You just need to know PHP. You are supposed to define flawed systems, which is not the hardest thing. Familiarity with web application security and SQL is recommended.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]]&lt;br /&gt;
&lt;br /&gt;
===OWASP CSRF Guard===&lt;br /&gt;
'''Description:''' [[Cross-Site_Request_Forgery_(CSRF)|CSRF]] is a complicated yet very effective web attack. The most important thing about CSRF is that it's hard to properly defend against it, specially when it comes to Web 2 and AJAX. We have had discussions on means of mitigating CSRF for years at OWASP, and are now ready to develop libraries for it. Many of the key ideas of this library can be found at [http://www.cs.sunysb.edu/~rpelizzi/jcsrf.pdf].&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' A transparent Apache 2 module properly mitigating all POST CSRF attacks, as well as a lightweight PHP library doing the same.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisites:''' Knowing CSRF and at least one way to defend against it, PHP, C/C++, Linux.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===OWASP PHP Security Project===&lt;br /&gt;
&lt;br /&gt;
'''Description:'''&lt;br /&gt;
OWASP PHP Security project plans to gather around secure PHP libraries, and provide a full featured framework of libraries for secure web applications in PHP, both as separate de-coupled libraries and as a whole secure web application framework. Many aspects of this project are already handled, and are being added to OWASP.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results: ''' Result of this project is much more security among PHP applications. Most PHP applications are vulnerable and there's no central approach to secure them (due to open source nature). Many people look at OWASP for such information.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Anyone with adequate PHP programming language experience (possibly web application development in PHP).  There are hard and easy parts of this project. For tougher parts, familiarity with security concepts, advanced SQL, and advanced PHP and web server configuration is required. &lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary , Johanna Curiel&lt;br /&gt;
&lt;br /&gt;
===OWASP RBAC Project===&lt;br /&gt;
'''Description:''' ''For the last 6 years, improper access control has been the issue behind two of the Top Ten lists''. &lt;br /&gt;
&lt;br /&gt;
RBAC stands for Role Based Access Control and is the de-facto access control and authorization standard. It simplifies access control and its maintenance for small and enterprise systems alike. NIST RBAC standard has four levels, the second level hierarchical RBAC is intended for this project.&lt;br /&gt;
&lt;br /&gt;
Unfortunately because of many performance and development problems, no suitable RBAC implementation was available until recently, so developers and admins mostly used ACLs and other forms of simple access control methods, which leads to broken and unmaintainable access control over the time. &lt;br /&gt;
&lt;br /&gt;
OWASP provides the RBAC project, as a stand-alone library with very fast access control checks and standard mature code-base. Currently [[PHPRBAC]] which is the PHP version of the RBAC project is released.&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:''' Standard NIST level 2 hierarchical RBAC libraries for different programming languages, specially web-based ones such as C/C++/Java/ASP/ASPX/Python/Perl/etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge prerequisite:''' Good SQL knowledge, library development schemes, familiarity with one of the programming languages.&lt;br /&gt;
&lt;br /&gt;
'''Mentor:''' [[User:Abbas Naderi|Abbas Naderi]], Rahul Chaudhary &lt;br /&gt;
&lt;br /&gt;
'''Skill Level:''' Advanced&lt;br /&gt;
&lt;br /&gt;
For more info, visit [http://phprbac.net phprbac.net]&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Zest support ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The Mozilla foundation has done great work with the Zest iniciative, this provides a great automated mechanism to replicate exploitation of security vulnerabilities in a format that makes tool communication easier: For example, ZAP supports Zest, so if OWTF can create a Zest script for a vulnerability in an automated fashion, this may in turn be easier to import into ZAP and other tools.&lt;br /&gt;
&lt;br /&gt;
[https://developer.mozilla.org/en-US/docs/Zest More information on Zest can be found here]&lt;br /&gt;
&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Some previous exposure to security concepts, penetration testing, Python and development in general is important for this project.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Improved Plug-n-Hack support ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The Mozilla foundation has done great work with the Plug-n-Hack standard, this provides greatly improved interaction with the web browser.&lt;br /&gt;
Although OWTF already supports Plug-n-Hack for MiTM purposes, there are many other features that could be implemented to leaverage Plug-n-Hack.&lt;br /&gt;
The aim of this project would be to try to cover as much as possible from the Plug-n-Hack standard as relevant to OWTF.&lt;br /&gt;
&lt;br /&gt;
[https://www.youtube.com/watch?v=pYFtLA2yTR8 Please see this demo to see the newest Plug-n-Hack additions]&lt;br /&gt;
&lt;br /&gt;
[https://blog.mozilla.org/security/2013/08/22/plug-n-hack/ For more information about plug and hack please see this]&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience is very welcome but not strictly necessary, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Stateful Browser with configurable authentication ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The automated functionality of OWASP OWTF is currently limited to the non-authenticated portion of a website. We would like to implement authentication support through:&lt;br /&gt;
&lt;br /&gt;
1) OWTF parameters&lt;br /&gt;
&lt;br /&gt;
2) Configuration files&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
What we would like to do here is to leverage the [http://wwwsearch.sourceforge.net/mechanize/ powerful mechanize python library] and build at least support for the following authentication options:&lt;br /&gt;
* Basic authentication [https://github.com/7a/owtf/issues/9 Already implemented here]&lt;br /&gt;
* Cookie based authentication&lt;br /&gt;
* Form-based authentication&lt;br /&gt;
&lt;br /&gt;
Additionally, we would welcome here a feature to detect when the user has been logged off, to log OWTF back in again before retrying the next request. &amp;lt;-- The proxy is probably a better place to implement this since external tools would also benefit from this. This feature will have to be coordinated with the MiTM proxy feature (already implemented).&lt;br /&gt;
&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* High performance&lt;br /&gt;
* Reliability&lt;br /&gt;
* Ease of use&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with the mechanize library or HTTP state is very welcome but not strictly necessary, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - SQL database ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
OWASP OWTF scans may take a large amount of disk space due to saving information in text files, we would like to add an option to use a SQL database, probably using the sqlalchemy python library.&lt;br /&gt;
* Keep the current text file format as an option&lt;br /&gt;
* Add a database storage option using the sqlalchemy library &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Reliability: Both with the sql database option and the text file options.&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, sqlalchemy experience would be beneficial for this&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Unit Test Framework ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
As OWASP OWTF grows it makes sense to build custom unit tests to automatically re-test that functionality has not been broken. In this project we would like to improve the existing unit testing framework so that creating OWASP OWTF unit tests is as simple as possible and all missing tests for new functionality are created. The goal of this project is to update the existing Unit Test Framework to create all missing tests as well as improve the existing ones to verify OWASP OWTF functionality in an automated fashion.&lt;br /&gt;
&lt;br /&gt;
The Unit Test Framework should be able to:&lt;br /&gt;
* Define test categories: For example, &amp;quot;all plugins&amp;quot;, &amp;quot;web plugins&amp;quot;, &amp;quot;aux plugins&amp;quot;, &amp;quot;test framework core&amp;quot;, etc. (please see [http://www.slideshare.net/abrahamaranguren/introducing-owasp-owtf-workshop-brucon-2012 this presentation] for more background)&lt;br /&gt;
* Allow to regression test isolated plugins (i.e. &amp;quot;only test _this_ plugin&amp;quot;)&lt;br /&gt;
* Allow to regression test by test categories (i.e. &amp;quot;test only web plugins&amp;quot;)&lt;br /&gt;
* Allow to regression test everything (i.e. plugins + framework core: &amp;quot;test all&amp;quot;)&lt;br /&gt;
* Produce meaningful statistics and easy to navigate logs to identify which tests failed and ideally also hints on how to potentially fix the problem where possible&lt;br /&gt;
* Allow for easy creation of _new_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Allow for easy modification and maintenance of _existing_ unit tests specific to OWASP OWTF&lt;br /&gt;
* Perform well so that we can run as many tests as possible in a given period of time&lt;br /&gt;
* Potentially leverage the python unittest library: [http://docs.python.org/2/library/unittest.html http://docs.python.org/2/library/unittest.html]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Performant and automated regression testing&lt;br /&gt;
* Unit tests for a wide coverage of OWASP OWTF, ideally leveraging the Unit Test Framework where possible&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with unit tests and automated regression testing would be beneficial, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP OWTF - Python version upgrade and compatibility ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Right now OWASP OWTF works on Python 2.6.5-2.7.3 (might work on surrounding versions too), the aim of this project would be to change the existing codebase so that it additionally works on newer python versions too, for example Python 3.3.&lt;br /&gt;
The intention here is to take advantage of improvements in newer python versions when available while letting OWASP OWTF work on older python versions too (i.e. 2.6.5) if that is the only option available.&lt;br /&gt;
The solution will ideally be as simple and extensible as possible so that the codebase does not become unmaintanable due to compatibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: [https://www.owasp.org/index.php/OWASP_OWTF https://www.owasp.org/index.php/OWASP_OWTF]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* Performant and reliable OWASP OWTF execution on multiple python versions, in particular the latest python version (i.e. 3.3.x) as well as the previous 2.6.5-2.7.3 range.&lt;br /&gt;
* Test cases&lt;br /&gt;
* Good documentation&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Python, experience with python version upgrades and python version compatibility implementations, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Abraham Aranguren - OWASP OWTF Project Leader - Contact: name.surname@owasp.org'''&lt;br /&gt;
&lt;br /&gt;
===OWASP PCI TOOLKIT===&lt;br /&gt;
[[File:Pci-toolkit-items-small.gif]]&amp;lt;br&amp;gt; OWASP PCI toolkit is an Open Source project built using Google Engine App, that will help organizations scope the PCI-DSS requirements for their System Components. The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards.&lt;br /&gt;
&lt;br /&gt;
In order to comply with this standard, organizations need to understand the PCI-DSS requirements. Many of these requirements use OWASP guidelines as their baseline.&lt;br /&gt;
 &lt;br /&gt;
The OWASP PCI toolkit is a project focused on helping organization understand how OWASP guidelines apply to the PCI-DSS requirements.&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
4 complete modules built as a Google App Engine: &lt;br /&gt;
http://pci-toolkit.appspot.com/&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
Skill Level: Easy-Medium&lt;br /&gt;
Python, HTML, CSS, Google App Engine.&lt;br /&gt;
&lt;br /&gt;
Affinity with financial institutions, Web security and credit card-online transactions&lt;br /&gt;
&lt;br /&gt;
'''OWASP project page:'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_PCI_Project&lt;br /&gt;
&lt;br /&gt;
Mentor: Johanna Curiel - emai: firstname.lastname@owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OWASP iGoat ===&lt;br /&gt;
&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
Right now OWASP iGoat works fine as a full universal iOS app on iPhone and iPads up to iOS 6.x and Xcode 4.x. It needs to be updated to properly function under iOS 7.x and Xcode 5.x, which will require some code maintenance, GUI changes, and so on.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For background on OWASP iGoat please see: [https://www.owasp.org/index.php/OWASP_iGoat_Project]&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
&lt;br /&gt;
* iGoat functions properly in all current aspects under iOS 7.x, compiled under Xcode 5.x.&lt;br /&gt;
* All GUI, buttons, and other presentation layer aspects of iGoat are compliant with iOS 7.x look and feel.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisite:'''&lt;br /&gt;
&lt;br /&gt;
iOS app development in Xcode using Objective C will be quite necessary. Familiarity with iOS 7.x user interface updates additionally helpful.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mentor: Ken van Wyk - OWASP iGoat Project Leader - Contact: ken@krvw.com'''&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/iGoat_v1.0&amp;diff=145946</id>
		<title>Projects/OWASP iGoat Project/Releases/iGoat v1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/iGoat_v1.0&amp;diff=145946"/>
				<updated>2013-02-26T20:03:27Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template: &amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Release About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP iGoat Project&lt;br /&gt;
| project_home_page = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| release_name = iGoat v2.0&lt;br /&gt;
| release_date = 26 February 2013&lt;br /&gt;
| release_description = The OWASP iGoat project is a security learning tool for iOS developers to learn about security weaknesses in iOS -- by breaking things as well as fixing them.&lt;br /&gt;
| release_license =  [http://www.gnu.org/licenses/gpl-3.0.html GPL v3] &lt;br /&gt;
| release_download_link = http://owasp-igoat.googlecode.com/files/owasp-igoat-2.0.tar.bz2&lt;br /&gt;
 &lt;br /&gt;
| leader_name1 = Kenneth R. van Wyk&lt;br /&gt;
| leader_email1 = ken@krvw.com&lt;br /&gt;
| leader_username1 = Ken van Wyk&lt;br /&gt;
&lt;br /&gt;
| contributor_name[1-10] = &lt;br /&gt;
| contributor_email[1-10] = &lt;br /&gt;
| contributor_username[1-10] =  &lt;br /&gt;
&lt;br /&gt;
| release_notes = http://code.google.com/p/owasp-igoat/issues/list&lt;br /&gt;
&lt;br /&gt;
| links_url[1-10] =&lt;br /&gt;
| links_name[1-10] =&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/iGoat_v1.0&amp;diff=145945</id>
		<title>Projects/OWASP iGoat Project/Releases/iGoat v1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/iGoat_v1.0&amp;diff=145945"/>
				<updated>2013-02-26T19:32:16Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template: &amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Release About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP iGoat Project&lt;br /&gt;
| project_home_page = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| release_name = iGoat v2.0&lt;br /&gt;
| release_date = 26 February 2012&lt;br /&gt;
| release_description = The OWASP iGoat project is a security learning tool for iOS developers to learn about security weaknesses in iOS -- by breaking things as well as fixing them.&lt;br /&gt;
| release_license =  [http://www.gnu.org/licenses/gpl-3.0.html GPL v3] &lt;br /&gt;
| release_download_link = http://owasp-igoat.googlecode.com/files/owasp-igoat-2.0.tar.bz2&lt;br /&gt;
 &lt;br /&gt;
| leader_name1 = Kenneth R. van Wyk&lt;br /&gt;
| leader_email1 = ken@krvw.com&lt;br /&gt;
| leader_username1 = Ken van Wyk&lt;br /&gt;
&lt;br /&gt;
| contributor_name[1-10] = &lt;br /&gt;
| contributor_email[1-10] = &lt;br /&gt;
| contributor_username[1-10] =  &lt;br /&gt;
&lt;br /&gt;
| release_notes = http://code.google.com/p/owasp-igoat/issues/list&lt;br /&gt;
&lt;br /&gt;
| links_url[1-10] =&lt;br /&gt;
| links_name[1-10] =&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=145944</id>
		<title>OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=145944"/>
				<updated>2013-02-26T19:29:25Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=  Main  =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Welcome to the iGoat OWASP project home page.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
iGoat is a learning tool for iOS developers (iPhone, iPad, etc.). It was inspired by the WebGoat project, and has a similar conceptual flow to it.&lt;br /&gt;
&lt;br /&gt;
As such, iGoat is a safe environment where iOS developers can learn about the major security pitfalls they face as well as how to avoid them. It is made up of a series of lessons that each teach a single (but vital) security lesson.&lt;br /&gt;
&lt;br /&gt;
The lessons are laid out in the following steps:&lt;br /&gt;
&lt;br /&gt;
#  Brief introduction to the problem.&lt;br /&gt;
# Verify the problem by exploiting it.&lt;br /&gt;
# Brief description of available remediations to the problem.&lt;br /&gt;
# Fix the problem by correcting and rebuilding the iGoat program.&lt;br /&gt;
&lt;br /&gt;
Step 4 is optional, but highly recommended for all iOS developers. Assistance is available within iGoat if you don't know how to fix a specific problem.&lt;br /&gt;
&lt;br /&gt;
iGoat is free software, released under the GPLv3 license.&lt;br /&gt;
&lt;br /&gt;
iGoat can be downloaded here: http://code.google.com/p/owasp-igoat/&lt;br /&gt;
&lt;br /&gt;
= Framework =&lt;br /&gt;
&lt;br /&gt;
iGoat has been designed and built to be a foundation on which to build a series of iOS security lessons. The initial iGoat release will include a handful of lessons to work through, but one of the aims of the project is to build a community of developers to help build out additional lessons over time -- much as WebGoat has before it.&lt;br /&gt;
&lt;br /&gt;
Interested contributors are encouraged to contact the project leader (Ken van Wyk, ken@krvw.com) to find out how they can contribute to future releases of iGoat.&lt;br /&gt;
&lt;br /&gt;
= Status =&lt;br /&gt;
&lt;br /&gt;
The iGoat project was launched in May 2011. Version 2.0 released on 26 February 2013. Source repository and download site:&lt;br /&gt;
&lt;br /&gt;
http://code.google.com/p/owasp-igoat/&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP iGoat Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|iGoat Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IOS_Developer_Cheat_Sheet&amp;diff=134615</id>
		<title>IOS Developer Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IOS_Developer_Cheat_Sheet&amp;diff=134615"/>
				<updated>2012-08-22T19:08:09Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: Edited caveats re consumer grade local data storage to emphasize the risks.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Introduction =&lt;br /&gt;
This document is written for iOS app developers and is intended to provide a set of basic pointers to vital aspects of developing secure apps for Apple’s iOS operating system. It follows the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Mobile Top 10 Risks] list.&lt;br /&gt;
&lt;br /&gt;
= Basics =&lt;br /&gt;
From a user perspective, two of the best things one can do to protect her iOS device are: enable strong passwords, and [https://www.owasp.org/index.php/Mobile_Jailbreaking_Cheat_Sheet refrain from jailbreaking the device]. For developers, both of these issues are problematic, as they are not verifiable within an app’s sandbox environment. (Apple previously had an API for testing devices to see if they are jailbroken, but that API was deprecated in 2010.) For enterprises, strong passwords, along with dozens of other security configuration attributes can be managed and enforced via a Mobile Device Management (MDM) product. Small businesses and individuals with multiple devices can use Apple’s iPhone Configuration Utility (http://www.apple.com/support/iphone/enterprise/) and Apple Configurator (available in the Mac App Store) to build secure configuration profiles and deploy them on multiple devices.&lt;br /&gt;
&lt;br /&gt;
= Remediation’s to OWASP Mobile Top 10 Risks =&lt;br /&gt;
== Insecure Data Storage (M1) ==&lt;br /&gt;
Without a doubt, the biggest risk faced by mobile device consumers comes from a lost or stolen device. The information stored on the device is thus exposed to anyone who finds or steals another person’s device. It is largely up to the apps on the device to provide adequate protection of any data they store. Apple’s iOS provides several mechanisms for protecting data. These built in protections are quite adequate for most consumer-grade information. For more stringent security requirements (e.g., financial data), additional protections beyond those provided by Apple can be built into an application.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
In general, an app should store locally only the data that is required to perform its functional tasks. This includes side channel data such as system logging (see M8 below). For any form of sensitive data, storing plaintext data storage in an app’s sandbox (e.g., ~/Documents/* ) should always be avoided. Consumer-grade sensitive data should be stored in secure containers using Apple-provided APIs.&lt;br /&gt;
* Small amounts of consumer grade sensitive data, such as user authentication credentials, session tokens, etc., can be securely stored in the device’s Keychain (see Keychain Services Reference in Apple’s iOS Developer Library).&lt;br /&gt;
* For larger, or more general types of consumer-grade data, Apple’s File Protection mechanism can safely be used (see NSData Class Reference for protection options).&lt;br /&gt;
More data that exceeds normal consumer-grade sensitivity, if it absolutely must be stored locally, consider using a third party container encryption API that is not encumbered by the inherent weaknesses in Apple’s encryption (e.g., keying tied to user’s device passcode, which is often a 4-digit PIN). Freely available examples include SQLcipher (see http://sqlcipher.net). In doing this, proper key management is of utmost importance -- and beyond the scope of this document.&lt;br /&gt;
&lt;br /&gt;
== Weak Server Side Controls (M2) ==&lt;br /&gt;
Although most server side controls are in fact necessary to handle on the server side — and as such we refer the reader to the [[Web Service Security Cheat Sheet]]—there are several things that can be done on the mobile that aid in the work to be done on the server.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
Design and implement the mobile client and the server to support a common set of security requirements. For example, information deemed sensitive on the server should be handled with equivalent due caution on the client side.&lt;br /&gt;
Perform positive input validation and canonicalization on all client-side input data. Use regular expressions and other mechanisms to ensure that only allowable data may enter the application at the client end.&lt;br /&gt;
Perform output encoding on untrusted data where feasible.&lt;br /&gt;
&lt;br /&gt;
== Insufficient Transport Layer Protection (M3) ==&lt;br /&gt;
Exposing sensitive data to eavesdropping attacks is a common issue with all networked applications, and iOS mobile apps are no exception.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
Design and implement all apps under the assumption that they will be used on the most wide-open Wi-Fi networks on the planet.&lt;br /&gt;
Make an inventory of all app data that must be protected while in transit. (Protections should include confidentiality as well as integrity.) The inventory should include authentication tokens, session tokens, as well as application data directly.&lt;br /&gt;
Ensure SSL/TLS encryption is used when transmitting or receiving all inventoried data. (See CFNetwork Programming Guide.)&lt;br /&gt;
Ensure your app only accepts properly validated SSL certificates. (CA chain validation is routinely disabled in testing environments; ensure your app has removed any such code prior to public release.)&lt;br /&gt;
Verify through dynamic testing that all inventoried data is adequately protected throughout the operation of the app.&lt;br /&gt;
Verify through dynamic testing that forged, self-signed, etc., certificates cannot be accepted by the app under any circumstances.&lt;br /&gt;
&lt;br /&gt;
== Client Side Injection (M4) ==&lt;br /&gt;
Data injection attacks are as real in mobile apps as they are in web apps, although the attack scenarios tend to differ (e.g., exploiting URL schemes to send premium text messages or toll phone calls).&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
In general, follow the same rules as a web app for input validation and output escaping.&lt;br /&gt;
Canonicalize and positively validate all data input.&lt;br /&gt;
Use parameterized queries, even for local SQLite/SQLcipher calls. &lt;br /&gt;
When using URL schemes, take extra care in validating and accepting input, as any app on the device is able to call a URL scheme.&lt;br /&gt;
When building a hybrid web/mobile app, keep the native/local capabilities of the app to a bare minimum required. That is, maintain control of all UIWebView content and pages, and prevent the user from accessing arbitrary, untrusted web content.&lt;br /&gt;
== Poor Authorization and Authentication (M5) ==&lt;br /&gt;
Although largely a server side control, some mobile features (e.g., unique device identifiers) and common uses can exacerbate the problems surrounding securely authenticating and authorizing users and other entities.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
In general follow the same rules as a web app for authentication and authorization.&lt;br /&gt;
Never use a device identifier (e.g., UDID , IP number, MAC address, IMEI) to identify a user or session.&lt;br /&gt;
Avoid when possible “out-of-band” authentication tokens sent to the same device as the user is using to log in (e.g., SMS to the same iPhone).&lt;br /&gt;
Implement strong server side authentication, authorization, and session management (control # 4.1-4.6).&lt;br /&gt;
Authenticate all API calls to paid resources (control 8.4).&lt;br /&gt;
== Improper Session Handling (M6) ==&lt;br /&gt;
Similarly, session handling is in general, principally a server task, but mobile devices tend to amplify traditional problems in unforeseen ways. For example, on mobile devices, “sessions” often last far longer than on traditional web applications.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
For the most part, follow sound session management practices as you would for a web application, with a few twists that are specific to mobile devices.&lt;br /&gt;
Never use a device identifier (e.g., UDID, IP number, MAC address, IMEI) to identify a session. (Control 1.13)&lt;br /&gt;
Use only tokens that can be quickly revoked in the event of a lost/stolen device, or compromised session.&lt;br /&gt;
Protect the confidentiality and integrity of session tokens at all times (e.g., always use SSL/TLS when transmitting).&lt;br /&gt;
Use only trustworthy sources for generating sessions.&lt;br /&gt;
== Security Decisions via Untrusted Inputs (M7) ==&lt;br /&gt;
While iOS does not give apps many channels for communicating among themselves, some exist—and can be abused by an attacker via data injection attacks, malicious apps, etc.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
The combination of input validation, output escaping, and authorization controls can be used against these weaknesses.&lt;br /&gt;
Canonicalize and positively validate all input data, particularly at boundaries between apps.&lt;br /&gt;
When using URL schemes, take extra care in validating and accepting input, as any app on the device is able to call a URL scheme.&lt;br /&gt;
Contextually escape all untrusted data output, so that it cannot change the intent of the output itself.&lt;br /&gt;
Verify the caller is permitted to access any requested resources. If appropriate, prompt the user to allow/disallow access to the requested resource.&lt;br /&gt;
== Side Channel Data Leakage (M8) ==&lt;br /&gt;
Side channels refer here to data I/O generally used for administrative or non-functional (directly) purposes, such as web caches (used to optimize browser speed), keystroke logs (used for spell checking), and similar. Apple’s iOS presents several opportunities for side channel data to inadvertently leak from an app, and that data is often available to anyone who has found or stolen a victim’s device. Most of these can be controlled programmatically in an app.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
Design and implement all apps under the assumption that the user’s device will be lost or stolen.&lt;br /&gt;
Start by identifying all potential side channel data present on a device. These sources should include, at a bare minimum: web caches, keystroke logs, screen shots, system logs, and cut-and-paste buffers. Be sure to include any third party libraries used.&lt;br /&gt;
Never include sensitive data (e.g., credentials, tokens, PII) in system logs.&lt;br /&gt;
Control iOS’s screenshot behavior to prevent sensitive app data from being captured when an app is minimized.&lt;br /&gt;
Disable keystroke logging for the most sensitive data, to prevent it from being stored in plaintext on the device.&lt;br /&gt;
Disable cut-and-paste buffer for the most sensitive data, to prevent it from being leaked outside of the app.&lt;br /&gt;
Dynamically test the app, including its data stores and communications channels, to verify that no sensitive data is being inappropriately transmitted or stored.&lt;br /&gt;
== Broken Cryptography (M9) ==&lt;br /&gt;
Although the vast majority of cryptographic weaknesses in software result from poor key management, all aspects of a crypto system should be carefully designed and implemented. Mobile apps are no different in that regard.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
Never “hard code” or store cryptographic keys where an attacker can trivially recover them. This includes plaintext data files, properties files, and compiled binaries.&lt;br /&gt;
Use secure containers for storing crypto keys; alternately, build a secure key exchange system where the key is controlled by a secure server, and never stored locally on the mobile device.&lt;br /&gt;
Use only strong crypto algorithms and implementations, including key generation tools, hashes, etc.&lt;br /&gt;
Use platform crypto APIs when feasible; use trusted third party code when not.&lt;br /&gt;
Consumer-grade sensitive data should be stored in secure containers using Apple-provided APIs.&lt;br /&gt;
* Small amounts of data, such as user authentication credentials, session tokens, etc., can be securely stored in the device’s Keychain (see Keychain Services Reference in Apple’s iOS Developer Library).&lt;br /&gt;
* For larger, or more general types of data, Apple’s File Protection mechanism can safely be used (see NSData Class Reference for protection options).&lt;br /&gt;
To more securely protect static data, consider using a third party encryption API that is not encumbered by the inherent weaknesses in Apple’s encryption (e.g., keying tied to user’s device passcode, which is often a 4-digit PIN). Freely available examples include SQLcipher (see http://sqlcipher.net).&lt;br /&gt;
&lt;br /&gt;
== Sensitive Information Disclosure (M10) ==&lt;br /&gt;
All sorts of sensitive data can leak out of iOS apps. Among other things to remember at all times, each app’s compiled binary code is available on the device, and can be reverse engineered by a determined adversary.&lt;br /&gt;
=== Remediations ===&lt;br /&gt;
Anything that must truly remain private should not reside on the mobile device; keep private information (e.g., algorithms, proprietary information) on the server.&lt;br /&gt;
If private information must be present on a mobile device, ensure it remains in process memory and is never unprotected if it is stored on the device.&lt;br /&gt;
Never hard code or otherwise trivially store passwords, session tokens, etc.&lt;br /&gt;
Strip binaries prior to shipping, and be aware that compiled executable files can still be reverse engineered.&lt;br /&gt;
&lt;br /&gt;
= References and Further Reading =&lt;br /&gt;
&lt;br /&gt;
OWASP Top 10 Mobile Risks presentation, Appsec USA, Minneapolis, MN, 23 Sept 2011. Jack Mannino, Mike Zusman, and Zach Lanier.&lt;br /&gt;
&lt;br /&gt;
“iOS Security”, Apple, May 2012, http://images.apple.com/iphone/business/docs/iOS_Security_May12.pdf &lt;br /&gt;
&lt;br /&gt;
“Deploying iPhone and iPad: Apple Configurator”, Apple, March 2012, http://images.apple.com/iphone/business/docs/iOS_Apple_Configurator_Mar12.pdf &lt;br /&gt;
&lt;br /&gt;
“iPhone OS: Enterprise Deployment Guide”, Apple, 2010, http://manuals.info.apple.com/en_US/Enterprise_Deployment_Guide.pdf &lt;br /&gt;
&lt;br /&gt;
“iPhone in Business”, Apple resources, http://www.apple.com/iphone/business/resources/ &lt;br /&gt;
&lt;br /&gt;
Apple iOS Developer website.&lt;br /&gt;
&lt;br /&gt;
&amp;quot;iOS Application (in)Security&amp;quot;, MDSec - May 2012, http://www.mdsec.co.uk/research/iOS_Application_Insecurity_wp_v1.0_final.pdf&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
Ken van Wyk ken[at]krvw.com&lt;br /&gt;
&lt;br /&gt;
= Other Cheatsheets =&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/iGoat_v1.0&amp;diff=127125</id>
		<title>Projects/OWASP iGoat Project/Releases/iGoat v1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/iGoat_v1.0&amp;diff=127125"/>
				<updated>2012-03-30T14:02:03Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template: &amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Release About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP iGoat Project&lt;br /&gt;
| project_home_page = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| release_name = iGoat v1.2&lt;br /&gt;
| release_date = 29 March 2012&lt;br /&gt;
| release_description = The OWASP iGoat project is a security learning tool for iOS developers to learn about security weaknesses in iOS -- by breaking things as well as fixing them.&lt;br /&gt;
| release_license =  [http://www.gnu.org/licenses/gpl-3.0.html GPL v3] &lt;br /&gt;
| release_download_link = http://code.google.com/p/owasp-igoat/downloads/detail?name=owasp-igoat-1.2.tar.bz2&amp;amp;can=2&amp;amp;q=&lt;br /&gt;
 &lt;br /&gt;
| leader_name1 = Kenneth R. van Wyk&lt;br /&gt;
| leader_email1 = ken@krvw.com&lt;br /&gt;
| leader_username1 = Ken van Wyk&lt;br /&gt;
&lt;br /&gt;
| contributor_name[1-10] = &lt;br /&gt;
| contributor_email[1-10] = &lt;br /&gt;
| contributor_username[1-10] =  &lt;br /&gt;
&lt;br /&gt;
| release_notes = http://code.google.com/p/owasp-igoat/issues/list&lt;br /&gt;
&lt;br /&gt;
| links_url[1-10] =&lt;br /&gt;
| links_name[1-10] =&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/iGoat_v1.0&amp;diff=127124</id>
		<title>Projects/OWASP iGoat Project/Releases/iGoat v1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/iGoat_v1.0&amp;diff=127124"/>
				<updated>2012-03-30T14:01:26Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template: &amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Release About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP iGoat Project&lt;br /&gt;
| project_home_page = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| release_name = iGoat v1.2&lt;br /&gt;
| release_date = 29 March 2012&lt;br /&gt;
| release_description = The OWASP iGoat project is a security learning tool for iOS developers to learn about security weaknesses in iOS -- by breaking things as well as fixing them.&lt;br /&gt;
| release_license =  [http://www.gnu.org/licenses/gpl-3.0.html GPL v3] &lt;br /&gt;
| release_download_link = http://code.google.com/p/owasp-igoat/downloads/detail?name=owasp-igoat-1.0.tar.bz2&amp;amp;can=2&amp;amp;q=&lt;br /&gt;
 &lt;br /&gt;
| leader_name1 = Kenneth R. van Wyk&lt;br /&gt;
| leader_email1 = ken@krvw.com&lt;br /&gt;
| leader_username1 = Ken van Wyk&lt;br /&gt;
&lt;br /&gt;
| contributor_name[1-10] = &lt;br /&gt;
| contributor_email[1-10] = &lt;br /&gt;
| contributor_username[1-10] =  &lt;br /&gt;
&lt;br /&gt;
| release_notes = http://code.google.com/p/owasp-igoat/issues/list&lt;br /&gt;
&lt;br /&gt;
| links_url[1-10] =&lt;br /&gt;
| links_name[1-10] =&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=127122</id>
		<title>OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=127122"/>
				<updated>2012-03-30T14:00:50Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
Welcome to the iGoat OWASP project home page.&lt;br /&gt;
&lt;br /&gt;
iGoat is a learning tool for iOS developers (iPhone, iPad, etc.). It was inspired by the WebGoat project, and has a similar conceptual flow to it.&lt;br /&gt;
&lt;br /&gt;
As such, iGoat is a safe environment where iOS developers can learn about the major security pitfalls they face as well as how to avoid them. It is made up of a series of lessons that each teach a single (but vital) security lesson.&lt;br /&gt;
&lt;br /&gt;
The lessons are laid out in the following steps:&lt;br /&gt;
&lt;br /&gt;
1 - Brief introduction to the problem.&lt;br /&gt;
&lt;br /&gt;
2 - Verify the problem by exploiting it.&lt;br /&gt;
&lt;br /&gt;
3 - Brief description of available remediations to the problem.&lt;br /&gt;
&lt;br /&gt;
4 - Fix the problem by correcting and rebuilding the iGoat program.&lt;br /&gt;
&lt;br /&gt;
Step 4 is optional, but highly recommended for all iOS developers. Assistance is available within iGoat if you don't know how to fix a specific problem.&lt;br /&gt;
&lt;br /&gt;
iGoat is free software, released under the GPLv3 license.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Framework&lt;br /&gt;
&lt;br /&gt;
iGoat has been designed and built to be a foundation on which to build a series of iOS security lessons. The initial iGoat release will include a handful of lessons to work through, but one of the aims of the project is to build a community of developers to help build out additional lessons over time -- much as WebGoat has before it.&lt;br /&gt;
&lt;br /&gt;
Interested contributors are encouraged to contact the project leader (Ken van Wyk, ken@krvw.com) to find out how they can contribute to future releases of iGoat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Status&lt;br /&gt;
&lt;br /&gt;
The iGoat project was launched in May 2011. Version 1.2 released on 29 March 2012. Source repository and download site:&lt;br /&gt;
&lt;br /&gt;
http://code.google.com/p/owasp-igoat/&lt;br /&gt;
&lt;br /&gt;
==== Project About ====&lt;br /&gt;
{{:Projects/OWASP iGoat Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|iGoat Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project/Roadmap&amp;diff=116155</id>
		<title>OWASP iGoat Project/Roadmap</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project/Roadmap&amp;diff=116155"/>
				<updated>2011-08-23T14:08:06Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*Short term goals:&lt;br /&gt;
*Medium term goals:&lt;br /&gt;
#Build and integrate additional lessons iteratively, on an as-needed basis.&lt;br /&gt;
#Maintain and update iGoat for new iOS and Xcode versions, as appropriate.&lt;br /&gt;
*Long term goals:&lt;br /&gt;
#Expand iGoat to a Universal app (fully compatible with iPad and other iOS devices).&lt;br /&gt;
#Merge in other content, such as instructional videos and such (Possibly externally hosted).&lt;br /&gt;
&lt;br /&gt;
*Finished:&lt;br /&gt;
#Design and build the basic iGoat foundation, with a modular approach to including lessons.&lt;br /&gt;
#Integrate several initial lessons into the iGoat framework. &lt;br /&gt;
#Complete documentation, including HOWTOs for installing/building iGoat, and building new lessons.&lt;br /&gt;
#Improved user interface.&lt;br /&gt;
#Added SQLcipher exercise.&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/iGoat_v1.0&amp;diff=116154</id>
		<title>Projects/OWASP iGoat Project/Releases/iGoat v1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/iGoat_v1.0&amp;diff=116154"/>
				<updated>2011-08-23T13:27:21Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template: &amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Release About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP iGoat Project&lt;br /&gt;
| project_home_page = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| release_name = iGoat v1.1&lt;br /&gt;
| release_date = 23 August 2011&lt;br /&gt;
| release_description = The OWASP iGoat project is a security learning tool for iOS developers to learn about security weaknesses in iOS -- by breaking things as well as fixing them.&lt;br /&gt;
| release_license =  [http://www.gnu.org/licenses/gpl-3.0.html GPL v3] &lt;br /&gt;
| release_download_link = http://code.google.com/p/owasp-igoat/downloads/detail?name=owasp-igoat-1.0.tar.bz2&amp;amp;can=2&amp;amp;q=&lt;br /&gt;
 &lt;br /&gt;
| leader_name1 = Kenneth R. van Wyk&lt;br /&gt;
| leader_email1 = ken@krvw.com&lt;br /&gt;
| leader_username1 = Ken van Wyk&lt;br /&gt;
&lt;br /&gt;
| contributor_name[1-10] = &lt;br /&gt;
| contributor_email[1-10] = &lt;br /&gt;
| contributor_username[1-10] =  &lt;br /&gt;
&lt;br /&gt;
| release_notes = http://code.google.com/p/owasp-igoat/issues/list&lt;br /&gt;
&lt;br /&gt;
| links_url[1-10] =&lt;br /&gt;
| links_name[1-10] =&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=116153</id>
		<title>Projects/OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=116153"/>
				<updated>2011-08-23T13:26:30Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Project About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| project_name = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_home_page = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_description = The iGoat project aims to be a developer learning environment for iOS app developers. It was inspired by the OWASP WebGoat project in particular the developer edition of WebGoat.&lt;br /&gt;
&lt;br /&gt;
Similar to WebGoat (developer), the user is presented with a series of lessons surrounding numerous vulnerabilities associated with iOS apps. The student exploits each vulnerability to validate its existence, and then he implements a remediation in the lesson's source code.&lt;br /&gt;
&lt;br /&gt;
Further, iGoat is designed and implemented modularly, similar conceptually to WebGoat's modular Java EE servlet model. It is intended to provide a foundational framework to build lessons on top of, starting with a core set of lessons provided in the first release.&lt;br /&gt;
&lt;br /&gt;
| project_license = [http://www.gnu.org/licenses/gpl-3.0.html GPL v3] &lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Kenneth R. van Wyk&lt;br /&gt;
| leader_email1 = ken@krvw.com&lt;br /&gt;
| leader_username1 = Ken van Wyk&lt;br /&gt;
&lt;br /&gt;
| leader_name[2-10] =&lt;br /&gt;
| leader_email[2-10] =&lt;br /&gt;
| leader_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| contributor_name1 = Sean Eidemiller (KRvW Associates)&lt;br /&gt;
| contributor_email1 = sean@krvw.com&lt;br /&gt;
| contributor_username1 = &lt;br /&gt;
&lt;br /&gt;
| contributor_name[2-10] = &lt;br /&gt;
| contributor_email[2-10] = &lt;br /&gt;
| contributor_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link = &lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-igoat-project&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/OWASP_iGoat_Project/Roadmap&lt;br /&gt;
| links_url[1-10] = &lt;br /&gt;
| links_name[1-10] = &lt;br /&gt;
&lt;br /&gt;
| release_1 = iGoat v1.1&lt;br /&gt;
| release_2 = &lt;br /&gt;
| release_3 =&lt;br /&gt;
| release_4 =&lt;br /&gt;
&amp;lt;!--- The line below is for GPC usage only. Please do not edit it ---&amp;gt;&lt;br /&gt;
| project_about_page = Projects/OWASP_iGoat_Project&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=116152</id>
		<title>OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=116152"/>
				<updated>2011-08-23T13:25:15Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
Welcome to the iGoat OWASP project home page.&lt;br /&gt;
&lt;br /&gt;
iGoat is a learning tool for iOS developers (iPhone, iPad, etc.). It was inspired by the WebGoat project, and has a similar conceptual flow to it.&lt;br /&gt;
&lt;br /&gt;
As such, iGoat is a safe environment where iOS developers can learn about the major security pitfalls they face as well as how to avoid them. It is made up of a series of lessons that each teach a single (but vital) security lesson.&lt;br /&gt;
&lt;br /&gt;
The lessons are laid out in the following steps:&lt;br /&gt;
&lt;br /&gt;
1 - Brief introduction to the problem.&lt;br /&gt;
&lt;br /&gt;
2 - Verify the problem by exploiting it.&lt;br /&gt;
&lt;br /&gt;
3 - Brief description of available remediations to the problem.&lt;br /&gt;
&lt;br /&gt;
4 - Fix the problem by correcting and rebuilding the iGoat program.&lt;br /&gt;
&lt;br /&gt;
Step 4 is optional, but highly recommended for all iOS developers. Assistance is available within iGoat if you don't know how to fix a specific problem.&lt;br /&gt;
&lt;br /&gt;
iGoat is free software, released under the GPLv3 license.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Framework&lt;br /&gt;
&lt;br /&gt;
iGoat has been designed and built to be a foundation on which to build a series of iOS security lessons. The initial iGoat release will include a handful of lessons to work through, but one of the aims of the project is to build a community of developers to help build out additional lessons over time -- much as WebGoat has before it.&lt;br /&gt;
&lt;br /&gt;
Interested contributors are encouraged to contact the project leader (Ken van Wyk, ken@krvw.com) to find out how they can contribute to future releases of iGoat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Status&lt;br /&gt;
&lt;br /&gt;
The iGoat project was launched in May 2011. Version 1.1 released on 23 August 2011. Source repository and download site:&lt;br /&gt;
&lt;br /&gt;
http://code.google.com/p/owasp-igoat/&lt;br /&gt;
&lt;br /&gt;
==== Project About ====&lt;br /&gt;
{{:Projects/OWASP iGoat Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|iGoat Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/Current&amp;diff=112241</id>
		<title>Projects/OWASP iGoat Project/Releases/Current</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project/Releases/Current&amp;diff=112241"/>
				<updated>2011-06-16T07:00:02Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: Created page with &amp;quot;http://code.google.com/p/owasp-igoat/&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;http://code.google.com/p/owasp-igoat/&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=112228</id>
		<title>Projects/OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=112228"/>
				<updated>2011-06-16T05:58:37Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Project About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| project_name = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_home_page = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_description = The iGoat project aims to be a developer learning environment for iOS app developers. It was inspired by the OWASP WebGoat project in particular the developer edition of WebGoat.&lt;br /&gt;
&lt;br /&gt;
Similar to WebGoat (developer), the user is presented with a series of lessons surrounding numerous vulnerabilities associated with iOS apps. The student exploits each vulnerability to validate its existence, and then he implements a remediation in the lesson's source code.&lt;br /&gt;
&lt;br /&gt;
Further, iGoat is designed and implemented modularly, similar conceptually to WebGoat's modular Java EE servlet model. It is intended to provide a foundational framework to build lessons on top of, starting with a core set of lessons provided in the first release.&lt;br /&gt;
&lt;br /&gt;
| project_license = [http://www.gnu.org/licenses/gpl-3.0.html GPL v3] &lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Kenneth R. van Wyk&lt;br /&gt;
| leader_email1 = ken@krvw.com&lt;br /&gt;
| leader_username1 = Ken van Wyk&lt;br /&gt;
&lt;br /&gt;
| leader_name[2-10] =&lt;br /&gt;
| leader_email[2-10] =&lt;br /&gt;
| leader_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| contributor_name1 = Sean Eidemiller (KRvW Associates)&lt;br /&gt;
| contributor_email1 = sean@krvw.com&lt;br /&gt;
| contributor_username1 = &lt;br /&gt;
&lt;br /&gt;
| contributor_name[2-10] = &lt;br /&gt;
| contributor_email[2-10] = &lt;br /&gt;
| contributor_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link = &lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-igoat-project&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/OWASP_iGoat_Project/Roadmap&lt;br /&gt;
| links_url[1-10] = &lt;br /&gt;
| links_name[1-10] = &lt;br /&gt;
&lt;br /&gt;
| release_1 = 1.0 released 15 June 2011&lt;br /&gt;
| release_2 = &lt;br /&gt;
| release_3 =&lt;br /&gt;
| release_4 =&lt;br /&gt;
&amp;lt;!--- The line below is for GPC usage only. Please do not edit it ---&amp;gt;&lt;br /&gt;
| project_about_page = Projects/OWASP_iGoat_Project&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=112226</id>
		<title>Projects/OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=112226"/>
				<updated>2011-06-16T05:57:45Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Project About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| project_name = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_home_page = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_description = The iGoat project aims to be a developer learning environment for iOS app developers. It was inspired by the OWASP WebGoat project in particular the developer edition of WebGoat.&lt;br /&gt;
&lt;br /&gt;
Similar to WebGoat (developer), the user is presented with a series of lessons surrounding numerous vulnerabilities associated with iOS apps. The student exploits each vulnerability to validate its existence, and then he implements a remediation in the lesson's source code.&lt;br /&gt;
&lt;br /&gt;
Further, iGoat is designed and implemented modularly, similar conceptually to WebGoat's modular Java EE servlet model. It is intended to provide a foundational framework to build lessons on top of, starting with a core set of lessons provided in the first release.&lt;br /&gt;
&lt;br /&gt;
| project_license = [http://www.gnu.org/licenses/gpl-3.0.html GPL v3] &lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Kenneth R. van Wyk&lt;br /&gt;
| leader_email1 = ken@krvw.com&lt;br /&gt;
| leader_username1 = Ken van Wyk&lt;br /&gt;
&lt;br /&gt;
| leader_name[2-10] =&lt;br /&gt;
| leader_email[2-10] =&lt;br /&gt;
| leader_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| contributor_name1 = Sean Eidemiller (KRvW Associates)&lt;br /&gt;
| contributor_email1 = sean@krvw.com&lt;br /&gt;
| contributor_username1 = &lt;br /&gt;
&lt;br /&gt;
| contributor_name[2-10] = &lt;br /&gt;
| contributor_email[2-10] = &lt;br /&gt;
| contributor_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link = &lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-igoat-project&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/OWASP_iGoat_Project/Roadmap&lt;br /&gt;
| links_url[1-10] = &lt;br /&gt;
| links_name[1-10] = &lt;br /&gt;
&lt;br /&gt;
| release_1 = 1.0 released 15 June 2011, see http://code.google.com/p/owasp-igoat/&lt;br /&gt;
| release_2 = &lt;br /&gt;
| release_3 =&lt;br /&gt;
| release_4 =&lt;br /&gt;
&amp;lt;!--- The line below is for GPC usage only. Please do not edit it ---&amp;gt;&lt;br /&gt;
| project_about_page = Projects/OWASP_iGoat_Project&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=112225</id>
		<title>Projects/OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=112225"/>
				<updated>2011-06-16T05:56:25Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Project About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| project_name = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_home_page = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_download_page = http://code.google.com/p/owasp-igoat/&lt;br /&gt;
&lt;br /&gt;
| project_description = The iGoat project aims to be a developer learning environment for iOS app developers. It was inspired by the OWASP WebGoat project in particular the developer edition of WebGoat.&lt;br /&gt;
&lt;br /&gt;
Similar to WebGoat (developer), the user is presented with a series of lessons surrounding numerous vulnerabilities associated with iOS apps. The student exploits each vulnerability to validate its existence, and then he implements a remediation in the lesson's source code.&lt;br /&gt;
&lt;br /&gt;
Further, iGoat is designed and implemented modularly, similar conceptually to WebGoat's modular Java EE servlet model. It is intended to provide a foundational framework to build lessons on top of, starting with a core set of lessons provided in the first release.&lt;br /&gt;
&lt;br /&gt;
| project_license = [http://www.gnu.org/licenses/gpl-3.0.html GPL v3] &lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Kenneth R. van Wyk&lt;br /&gt;
| leader_email1 = ken@krvw.com&lt;br /&gt;
| leader_username1 = Ken van Wyk&lt;br /&gt;
&lt;br /&gt;
| leader_name[2-10] =&lt;br /&gt;
| leader_email[2-10] =&lt;br /&gt;
| leader_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| contributor_name1 = Sean Eidemiller (KRvW Associates)&lt;br /&gt;
| contributor_email1 = sean@krvw.com&lt;br /&gt;
| contributor_username1 = &lt;br /&gt;
&lt;br /&gt;
| contributor_name[2-10] = &lt;br /&gt;
| contributor_email[2-10] = &lt;br /&gt;
| contributor_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link = &lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-igoat-project&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/OWASP_iGoat_Project/Roadmap&lt;br /&gt;
| links_url[1-10] = http://code.google.com/p/owasp-igoat/&lt;br /&gt;
| links_name[1-10] = Download and src repository&lt;br /&gt;
&lt;br /&gt;
| release_1 = 1.0 released 15 June 2011, see http://code.google.com/p/owasp-igoat/&lt;br /&gt;
| release_2 = &lt;br /&gt;
| release_3 =&lt;br /&gt;
| release_4 =&lt;br /&gt;
&amp;lt;!--- The line below is for GPC usage only. Please do not edit it ---&amp;gt;&lt;br /&gt;
| project_about_page = Projects/OWASP_iGoat_Project&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=112224</id>
		<title>Projects/OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=112224"/>
				<updated>2011-06-16T05:55:33Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Project About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| project_name = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_home_page = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_download_page = http://code.google.com/p/owasp-igoat/&lt;br /&gt;
&lt;br /&gt;
| project_description = The iGoat project aims to be a developer learning environment for iOS app developers. It was inspired by the OWASP WebGoat project in particular the developer edition of WebGoat.&lt;br /&gt;
&lt;br /&gt;
Similar to WebGoat (developer), the user is presented with a series of lessons surrounding numerous vulnerabilities associated with iOS apps. The student exploits each vulnerability to validate its existence, and then he implements a remediation in the lesson's source code.&lt;br /&gt;
&lt;br /&gt;
Further, iGoat is designed and implemented modularly, similar conceptually to WebGoat's modular Java EE servlet model. It is intended to provide a foundational framework to build lessons on top of, starting with a core set of lessons provided in the first release.&lt;br /&gt;
&lt;br /&gt;
| project_license = [http://www.gnu.org/licenses/gpl-3.0.html GPL v3] &lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Kenneth R. van Wyk&lt;br /&gt;
| leader_email1 = ken@krvw.com&lt;br /&gt;
| leader_username1 = Ken van Wyk&lt;br /&gt;
&lt;br /&gt;
| leader_name[2-10] =&lt;br /&gt;
| leader_email[2-10] =&lt;br /&gt;
| leader_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| contributor_name1 = Sean Eidemiller (KRvW Associates)&lt;br /&gt;
| contributor_email1 = sean@krvw.com&lt;br /&gt;
| contributor_username1 = &lt;br /&gt;
&lt;br /&gt;
| contributor_name[2-10] = &lt;br /&gt;
| contributor_email[2-10] = &lt;br /&gt;
| contributor_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link = &lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-igoat-project&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/OWASP_iGoat_Project/Roadmap&lt;br /&gt;
| links_url[1-10] = &lt;br /&gt;
| links_name[1-10] = &lt;br /&gt;
&lt;br /&gt;
| release_1 = 1.0 released 15 June 2011, see http://code.google.com/p/owasp-igoat/&lt;br /&gt;
| release_2 = &lt;br /&gt;
| release_3 =&lt;br /&gt;
| release_4 =&lt;br /&gt;
&amp;lt;!--- The line below is for GPC usage only. Please do not edit it ---&amp;gt;&lt;br /&gt;
| project_about_page = Projects/OWASP_iGoat_Project&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=112222</id>
		<title>OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=112222"/>
				<updated>2011-06-16T05:54:05Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
Welcome to the iGoat OWASP project home page.&lt;br /&gt;
&lt;br /&gt;
iGoat is a learning tool for iOS developers (iPhone, iPad, etc.). It was inspired by the WebGoat project, and has a similar conceptual flow to it.&lt;br /&gt;
&lt;br /&gt;
As such, iGoat is a safe environment where iOS developers can learn about the major security pitfalls they face as well as how to avoid them. It is made up of a series of lessons that each teach a single (but vital) security lesson.&lt;br /&gt;
&lt;br /&gt;
The lessons are laid out in the following steps:&lt;br /&gt;
&lt;br /&gt;
1 - Brief introduction to the problem.&lt;br /&gt;
&lt;br /&gt;
2 - Verify the problem by exploiting it.&lt;br /&gt;
&lt;br /&gt;
3 - Brief description of available remediations to the problem.&lt;br /&gt;
&lt;br /&gt;
4 - Fix the problem by correcting and rebuilding the iGoat program.&lt;br /&gt;
&lt;br /&gt;
Step 4 is optional, but highly recommended for all iOS developers. Assistance is available within iGoat if you don't know how to fix a specific problem.&lt;br /&gt;
&lt;br /&gt;
iGoat is free software, released under the GPLv3 license.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Framework&lt;br /&gt;
&lt;br /&gt;
iGoat has been designed and built to be a foundation on which to build a series of iOS security lessons. The initial iGoat release will include a handful of lessons to work through, but one of the aims of the project is to build a community of developers to help build out additional lessons over time -- much as WebGoat has before it.&lt;br /&gt;
&lt;br /&gt;
Interested contributors are encouraged to contact the project leader (Ken van Wyk, ken@krvw.com) to find out how they can contribute to future releases of iGoat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Status&lt;br /&gt;
&lt;br /&gt;
The iGoat project was launched in May 2011. Version 1.0 released on 15 June 2011. Source repository and download site:&lt;br /&gt;
&lt;br /&gt;
http://code.google.com/p/owasp-igoat/&lt;br /&gt;
&lt;br /&gt;
==== Project About ====&lt;br /&gt;
{{:Projects/OWASP iGoat Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|iGoat Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=110304</id>
		<title>OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=110304"/>
				<updated>2011-05-12T18:26:02Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
Welcome to the iGoat OWASP project home page.&lt;br /&gt;
&lt;br /&gt;
iGoat is a learning tool for iOS developers (iPhone, iPad, etc.). It was inspired by the WebGoat project, and has a similar conceptual flow to it.&lt;br /&gt;
&lt;br /&gt;
As such, iGoat is a safe environment where iOS developers can learn about the major security pitfalls they face as well as how to avoid them. It is made up of a series of lessons that each teach a single (but vital) security lesson.&lt;br /&gt;
&lt;br /&gt;
The lessons are laid out in the following steps:&lt;br /&gt;
&lt;br /&gt;
1 - Brief introduction to the problem.&lt;br /&gt;
&lt;br /&gt;
2 - Verify the problem by exploiting it.&lt;br /&gt;
&lt;br /&gt;
3 - Brief description of available remediations to the problem.&lt;br /&gt;
&lt;br /&gt;
4 - Fix the problem by correcting and rebuilding the iGoat program.&lt;br /&gt;
&lt;br /&gt;
Step 4 is optional, but highly recommended for all iOS developers. Assistance is available within iGoat if you don't know how to fix a specific problem.&lt;br /&gt;
&lt;br /&gt;
iGoat is free software, released under the GPLv3 license.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Framework&lt;br /&gt;
&lt;br /&gt;
iGoat has been designed and built to be a foundation on which to build a series of iOS security lessons. The initial iGoat release will include a handful of lessons to work through, but one of the aims of the project is to build a community of developers to help build out additional lessons over time -- much as WebGoat has before it.&lt;br /&gt;
&lt;br /&gt;
Interested contributors are encouraged to contact the project leader (Ken van Wyk, ken@krvw.com) to find out how they can contribute to future releases of iGoat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Status&lt;br /&gt;
&lt;br /&gt;
The iGoat project was launched in May 2011. As of this writing (12 May 2011), we're expecting a first release in June 2011.&lt;br /&gt;
&lt;br /&gt;
==== Project About ====&lt;br /&gt;
{{:Projects/OWASP iGoat Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|iGoat Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=110301</id>
		<title>OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=110301"/>
				<updated>2011-05-12T18:18:59Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
Welcome to the iGoat OWASP project home page.&lt;br /&gt;
&lt;br /&gt;
iGoat is a learning tool for iOS developers (iPhone, iPad, etc.). It was inspired by the WebGoat project, and has a similar conceptual flow to it.&lt;br /&gt;
&lt;br /&gt;
As such, iGoat is a safe environment where iOS developers can learn about the major security pitfalls they face as well as how to avoid them. It is made up of a series of lessons that each teach a single (but vital) security lesson.&lt;br /&gt;
&lt;br /&gt;
The lessons are laid out in the following steps:&lt;br /&gt;
&lt;br /&gt;
1 - Brief introduction to the problem.&lt;br /&gt;
&lt;br /&gt;
2 - Verify the problem by exploiting it.&lt;br /&gt;
&lt;br /&gt;
3 - Brief description of available remediations to the problem.&lt;br /&gt;
&lt;br /&gt;
4 - Fix the problem by correcting and rebuilding the iGoat program.&lt;br /&gt;
&lt;br /&gt;
Step 4 is optional, but highly recommended for all iOS developers. Assistance is available within iGoat if you don't know how to fix a specific problem.&lt;br /&gt;
&lt;br /&gt;
iGoat is free software, released under the GPLv3 license.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Framework&lt;br /&gt;
&lt;br /&gt;
iGoat has been designed and built to be a foundation on which to build a series of iOS security lessons. The initial iGoat release will include a handful of lessons to work through, but one of the aims of the project is to build a community of developers to help build out additional lessons over time -- much as WebGoat has before it.&lt;br /&gt;
&lt;br /&gt;
Interested contributors are encouraged to contact the project leader to find out how they can contribute to future releases of iGoat.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Status&lt;br /&gt;
&lt;br /&gt;
The iGoat project was launched in May 2011. As of this writing (12 May 2011), we're expecting a first release in June 2011.&lt;br /&gt;
&lt;br /&gt;
==== Project About ====&lt;br /&gt;
{{:Projects/OWASP iGoat Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|iGoat Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=110300</id>
		<title>OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_iGoat_Project&amp;diff=110300"/>
				<updated>2011-05-12T18:11:07Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
Welcome to the iGoat OWASP project home page.&lt;br /&gt;
&lt;br /&gt;
iGoat is a learning tool for iOS developers (iPhone, iPad, etc.). It was inspired by the WebGoat project, and has a similar conceptual flow to it.&lt;br /&gt;
&lt;br /&gt;
==== Project About ====&lt;br /&gt;
{{:Projects/OWASP iGoat Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|iGoat Project]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:OWASP_Alpha_Quality_Tool]]&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=110243</id>
		<title>Projects/OWASP iGoat Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_iGoat_Project&amp;diff=110243"/>
				<updated>2011-05-11T19:35:19Z</updated>
		
		<summary type="html">&lt;p&gt;Ken van Wyk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Project About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| project_name = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_home_page = OWASP iGoat Project&lt;br /&gt;
&lt;br /&gt;
| project_description = The iGoat project aims to be a developer learning environment for iOS app developers. It was inspired by the OWASP WebGoat project in particular the developer edition of WebGoat.&lt;br /&gt;
&lt;br /&gt;
Similar to WebGoat (developer), the user is presented with a series of lessons surrounding numerous vulnerabilities associated with iOS apps. The student exploits each vulnerability to validate its existence, and then he implements a remediation in the lesson's source code.&lt;br /&gt;
&lt;br /&gt;
Further, iGoat is designed and implemented modularly, similar conceptually to WebGoat's modular Java EE servlet model. It is intended to provide a foundational framework to build lessons on top of, starting with a core set of lessons provided in the first release.&lt;br /&gt;
&lt;br /&gt;
| project_license = [http://www.gnu.org/licenses/gpl-3.0.html GPL v3] &lt;br /&gt;
&lt;br /&gt;
| leader_name1 = Kenneth R. van Wyk&lt;br /&gt;
| leader_email1 = ken@krvw.com&lt;br /&gt;
| leader_username1 = Ken van Wyk&lt;br /&gt;
&lt;br /&gt;
| leader_name[2-10] =&lt;br /&gt;
| leader_email[2-10] =&lt;br /&gt;
| leader_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| contributor_name1 = Sean Eidemiller (KRvW Associates)&lt;br /&gt;
| contributor_email1 = sean@krvw.com&lt;br /&gt;
| contributor_username1 = &lt;br /&gt;
&lt;br /&gt;
| contributor_name[2-10] = &lt;br /&gt;
| contributor_email[2-10] = &lt;br /&gt;
| contributor_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link = &lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-igoat-project&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/OWASP_iGoat_Project/Roadmap&lt;br /&gt;
| links_url[1-10] = &lt;br /&gt;
| links_name[1-10] = &lt;br /&gt;
&lt;br /&gt;
| release_1 = June 2011 (expected)&lt;br /&gt;
| release_2 = &lt;br /&gt;
| release_3 =&lt;br /&gt;
| release_4 =&lt;br /&gt;
&amp;lt;!--- The line below is for GPC usage only. Please do not edit it ---&amp;gt;&lt;br /&gt;
| project_about_page = Projects/OWASP_iGoat_Project&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Ken van Wyk</name></author>	</entry>

	</feed>