<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Leocavallari</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Leocavallari"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Leocavallari"/>
		<updated>2026-04-20T18:10:39Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Leocavallari&amp;diff=88130</id>
		<title>User:Leocavallari</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Leocavallari&amp;diff=88130"/>
				<updated>2010-08-27T22:50:25Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* Leonardo Cavallari Militelli's [http://www.linkedin.com/in/leocavallari Profile], [mailto:leo.cavallari@owasp.org Mail Contact] and [[:Special:Contributions/Leocavallari|Wiki Contributions]].&lt;br /&gt;
&lt;br /&gt;
'''Short Bio:'''&lt;br /&gt;
&lt;br /&gt;
Leonardo Cavallari has a Msc. degree on Network Security from University of Sao Paulo, SANS GIAC, specialist on IT security and member of the GPC - Global Committee Projects. He develop projects on information security for more than 10 years, focused on pentest, review of application security controls, IT infraestructure review and implementation consulting.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In his journey, he did network and application pen-tests for major financial institutions in Brazil, including Unibanco, Itaú, Santander, CIP/CETIP, among others.&amp;lt;br&amp;gt;&lt;br /&gt;
He is founder of [http://www.ibliss.com.br | iBLISS Security &amp;amp; Intelligence]&lt;br /&gt;
&lt;br /&gt;
'''Resumo:'''&lt;br /&gt;
&lt;br /&gt;
Leonardo Cavallari, mestre em engenharia pela USP, certificado SANS GIAC, especialista em segurança da informação e membro do Comitê Global de Projetos da OWASP, realiza projetos em segurança da informação há mais de 10 anos, focado em testes de invasão, revisão de controles de aplicação, revisão de TI e consultoria de implementação.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Em sua trajetório, realizou projetos de teste de invasão de rede e aplicações junto às maiores instituições financeiras do país, como Unibanco, Itaú, Santander, CIP/CETIP, entre outras.&amp;lt;br&amp;gt;&lt;br /&gt;
É sócio-fundador da [http://www.ibliss.com.br | iBLISS Segurança &amp;amp; Inteligência], consultoria focada em Segurança de TI.&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Leocavallari&amp;diff=88129</id>
		<title>User:Leocavallari</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Leocavallari&amp;diff=88129"/>
				<updated>2010-08-27T22:50:02Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* Leonardo Cavallari Militelli's [http://www.linkedin.com/in/leocavallari Profile], [mailto:leo.cavallari@owasp.org Mail Contact] and [[:Special:Contributions/Leocavallari|Wiki Contributions]].&lt;br /&gt;
&lt;br /&gt;
'''Short Bio:'''&lt;br /&gt;
&lt;br /&gt;
Leonardo Cavallari has a Msc. degree on Network Security from University of Sao Paulo, SANS GIAC, specialist on IT security and member of the GPC - Global Committee Projects. He develop projects on information security for more than 10 years, focused on pentest, review of application security controls, IT infraestructure review and implementation consulting.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In his journey, he did network and application pen-tests for major financial institutions in Brazil, including Unibanco, Itaú, Santander, CIP/CETIP, among others.&amp;lt;br&amp;gt;&lt;br /&gt;
He is founder of [http://www.ibliss.com.br | iBLISS Security &amp;amp; Intelligence]&lt;br /&gt;
&lt;br /&gt;
'''Resumo:'''&lt;br /&gt;
Leonardo Cavallari, mestre em engenharia pela USP, certificado SANS GIAC, especialista em segurança da informação e membro do Comitê Global de Projetos da OWASP, realiza projetos em segurança da informação há mais de 10 anos, focado em testes de invasão, revisão de controles de aplicação, revisão de TI e consultoria de implementação.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Em sua trajetório, realizou projetos de teste de invasão de rede e aplicações junto às maiores instituições financeiras do país, como Unibanco, Itaú, Santander, CIP/CETIP, entre outras.&amp;lt;br&amp;gt;&lt;br /&gt;
É sócio-fundador da [http://www.ibliss.com.br | iBLISS Segurança &amp;amp; Inteligência], consultoria focada em Segurança de TI.&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Leocavallari&amp;diff=88128</id>
		<title>User:Leocavallari</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Leocavallari&amp;diff=88128"/>
				<updated>2010-08-27T22:49:10Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* Leonardo Cavallari Militelli's [http://www.linkedin.com/in/leocavallari Profile], [mailto:leo.cavallari@owasp.org Mail Contact] and [[:Special:Contributions/Leocavallari|Wiki Contributions]].&lt;br /&gt;
&lt;br /&gt;
Short Bio:&lt;br /&gt;
Leonardo Cavallari has a Msc. degree on Network Security from University of Sao Paulo, SANS GIAC, specialist on IT security and member of the GPC - Global Committee Projects. He develop projects on information security for more than 10 years, focused on pentest, review of application security controls, IT infraestructure review and implementation consulting.&lt;br /&gt;
&lt;br /&gt;
In his journey, he did network and application pen-tests for major financial institutions in Brazil, including Unibanco, Itaú, Santander, CIP/CETIP, among others.&lt;br /&gt;
He is founder of [http://www.ibliss.com.br | iBLISS Security &amp;amp; Intelligence]&lt;br /&gt;
&lt;br /&gt;
Resumo:&lt;br /&gt;
Leonardo Cavallari, mestre em engenharia pela USP, certificado SANS GIAC, especialista em segurança da informação e membro do Comitê Global de Projetos da OWASP, realiza projetos em segurança da informação há mais de 10 anos, focado em testes de invasão, revisão de controles de aplicação, revisão de TI e consultoria de implementação.&lt;br /&gt;
&lt;br /&gt;
Em sua trajetório, realizou projetos de teste de invasão de rede e aplicações junto às maiores instituições financeiras do país, como Unibanco, Itaú, Santander, CIP/CETIP, entre outras.&lt;br /&gt;
É sócio-fundador da [http://www.ibliss.com.br | iBLISS Segurança &amp;amp; Inteligência], consultoria focada em Segurança de TI.&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_ASDR_Project&amp;diff=88127</id>
		<title>Project Information:template ASDR Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_ASDR_Project&amp;diff=88127"/>
				<updated>2010-08-27T22:36:32Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Application Security Desk Reference (ASDR) Project''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|This project is helpful as basic reference material when performing such activities as threat modeling, security architecture review, security testing, code review, and metrics. We intend to encourage understanding and consistency when discussing these basic foundational elements of application security. Security only works if people can make informed decisions about risk. The ASDR provides that basic information to help ensure all stakeholders are involved.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project key Information'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[[User:Leocavallari|'''Leonardo Cavallari Militelli''']]   &lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if any)&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Mailing List&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp-asdr-project '''Subscribe here''']&lt;br /&gt;
| style=&amp;quot;width:17%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|License&amp;lt;br&amp;gt;[http://creativecommons.org/licenses/by-sa/3.0/ '''Creative Commons Attribution Share Alike 3.0''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Type&amp;lt;br&amp;gt;[[:Category:OWASP_Project#Alpha Status Projects|'''Documentation''']]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Sponsors&amp;lt;br&amp;gt;[[OWASP Summer of Code 2008|'''OWASP SoC 08''']]&amp;lt;br&amp;gt;[http://www.ibliss.com.br  '''iBLISS Segurança&amp;amp;Inteligência''']  &lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Release Status''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Main Links'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Related Projects''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
'''[[:Category:OWASP_Project_Assessment#Alpha_Quality_Documentation_Criteria|Alpha Quality]]'''&amp;lt;br&amp;gt;[[:OWASP ASDR Project - Assessment Frame|Please see here for complete information.]]&lt;br /&gt;
 | style=&amp;quot;width:42%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
[[:OWASP ASDR Workplan|OWASP ASDR Workplan]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[:OWASP Honeycomb Project Roadmap|Old Honeycomb Roadmap]]&amp;lt;br&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Honeycomb Project|OWASP Honeycomb Project]]&amp;lt;br&amp;gt;[http://cve.mitre.org/cwe/about/index.html Common Weakness Enumeration (CWE)]&amp;lt;br&amp;gt;[http://samate.nist.gov/index.php/Main_Page Software Assurance Metrics and Tool Evaluation (SAMATE)]  &lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project_-_ModSecurity_2.0.6_-_Assessment&amp;diff=87947</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project - ModSecurity 2.0.6 - Assessment</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project_-_ModSecurity_2.0.6_-_Assessment&amp;diff=87947"/>
				<updated>2010-08-25T00:57:09Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: /* Stable Release Review of the OWASP ModSecurity Core Rule Set Project - Release ModSecurity 2.0.6 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;small&amp;gt;[[:Category:OWASP ModSecurity Core Rule Set Project|Click here to return to project's main page]]&amp;lt;/small&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Stable Release Review of the OWASP ModSecurity Core Rule Set Project - Release ModSecurity 2.0.6 ==&lt;br /&gt;
&lt;br /&gt;
==== Project Leader for this Release ====&lt;br /&gt;
'''''[[User:Rcbarnett|Ryan Barnett]]'s Pre-Assessment Checklist:'''''&lt;br /&gt;
&lt;br /&gt;
{{ Pre-Assessment Questions - Tools&lt;br /&gt;
| 1. Is this release associated with a project containing at least the [[Assessing_Project_Health#Project_Wiki_Page_Minimal_Content|Project Wiki Page Minimum Content]]  information?&lt;br /&gt;
= (answer #1) &lt;br /&gt;
   1. have an up to date project template with current project information? - YES&lt;br /&gt;
   2. have a conference style presentation that describes the tool/document in at least 3 slides? - YES&lt;br /&gt;
   3. have a one sheet overview document about the project? - NO&lt;br /&gt;
   4. have a link to a working mail list? - YES&lt;br /&gt;
   5. have a statement of the application security issue the project addresses? - YES&lt;br /&gt;
   6. have a project roadmap? - YES&lt;br /&gt;
   7. project leaders and main contributors have a wiki account (with its user page containing contact details about the user and if possible his CV) - YES&lt;br /&gt;
&lt;br /&gt;
| 2. Is your tool licensed under an open source license? &lt;br /&gt;
= (answer #2) &lt;br /&gt;
 http://www.gnu.org/licenses/old-licenses/gpl-2.0.html&lt;br /&gt;
&lt;br /&gt;
| 3. Is the source code and any documentation available in an online project repository? &lt;br /&gt;
= (answer #3)&lt;br /&gt;
 http://mod-security.svn.sourceforge.net/viewvc/mod-security/crs/&lt;br /&gt;
&lt;br /&gt;
| 4. Is there working code? &lt;br /&gt;
= (answer #4)&lt;br /&gt;
 http://sourceforge.net/projects/mod-security/files/modsecurity-crs/&lt;br /&gt;
&lt;br /&gt;
| 5. Is there a roadmap for this project release which will take it from Alpha to Stable release? &lt;br /&gt;
= (answer #5)&lt;br /&gt;
 http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project_-_Roadmap&lt;br /&gt;
&lt;br /&gt;
| 6. Are the Alpha pre-assessment items complete?&lt;br /&gt;
= (answer #6)&lt;br /&gt;
 YES&lt;br /&gt;
&lt;br /&gt;
| 7. Is there an installer or stand-alone executable? &lt;br /&gt;
= (answer #7)&lt;br /&gt;
 Not applicable. CRS is not a standalone project that can be installed with an installer.&lt;br /&gt;
&lt;br /&gt;
| 8. Is there user documentation on the OWASP project wiki page? &lt;br /&gt;
= (answer #8)&lt;br /&gt;
 YES&lt;br /&gt;
 http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Installation&lt;br /&gt;
 http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Documentation&lt;br /&gt;
&lt;br /&gt;
| 9. Is there an &amp;quot;About box&amp;quot; or similar help item which lists the following? &lt;br /&gt;
= (answer #9)&lt;br /&gt;
 YES - http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Project_Details&lt;br /&gt;
&lt;br /&gt;
 # Project Name - ModSecurity Core Rule Set (CRS)&lt;br /&gt;
 # Short Description - The Core Rule Set (CRS) provides critical protections against web attacks.  Unlike intrusion detection and prevention systems, which rely on signatures specific to known vulnerabilities, &lt;br /&gt;
                       the CRS is based on generic rules which focus on attack payload identification in order to provide protection from zero day and unknown vulnerabilities often found in web applications, &lt;br /&gt;
                       which are in most cases custom coded. &lt;br /&gt;
 # Project Release Lead and contact information (e.g. email address) - Ryan Barnett ryan.barnett@breach.com&lt;br /&gt;
 # Project Release Contributors (if any) - Brian Rectanus&lt;br /&gt;
 # Project Release License - GNU General Public License - Version 2.0&lt;br /&gt;
 # Project Release Sponsors (if any) - Breach Security Labs&lt;br /&gt;
 # Release status and date assessed as Month-Year (e.g. March 2009) - Not Yet Reviewed by OWASP.  An important point to consider is that the CRS is not the typical OWASP project.  Most projects start out as ideas, then move to documentation&lt;br /&gt;
                                                                      and eventually working code.  The CRS is in the opposite position in that Breach Security Labs developed these rules over the past 3-4 years.  So, we brought a project with&lt;br /&gt;
                                                                      fully working code that is running on thousands of web servers.  The code itself is well tested.  What was lacking was documentation which as since been updated.&lt;br /&gt;
 # Link to OWASP Project Page - http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project&lt;br /&gt;
&lt;br /&gt;
| 10. Is there documentation on how to build the tool from source including obtaining the source from the code repository? &lt;br /&gt;
= (answer #10)&lt;br /&gt;
 Not applicable, as no building is needed.&lt;br /&gt;
&lt;br /&gt;
| 11. Is the tool documentation stored in the same repository as the source code?&lt;br /&gt;
= (answer #11)&lt;br /&gt;
 YES - there is also extensive new documentation/comments inside the files themselves describing the Rule Logic and Reference links.&lt;br /&gt;
&lt;br /&gt;
| 12. Are the Alpha and Beta pre-assessment items complete? &lt;br /&gt;
= (answer #12)&lt;br /&gt;
 YES&lt;br /&gt;
&lt;br /&gt;
| 13. Does the tool include documentation built into the tool? &lt;br /&gt;
= (answer #13) &lt;br /&gt;
 YES - there is also extensive new documentation/comments inside the files themselves describing the Rule Logic and Reference links.&lt;br /&gt;
&lt;br /&gt;
| 14. Does the tool include build scripts to automate builds? &lt;br /&gt;
= (answer #14)&lt;br /&gt;
 Not applicable, as no building is needed.&lt;br /&gt;
&lt;br /&gt;
| 15. Is there a publicly accessible bug tracking system? &lt;br /&gt;
= (answer #15)&lt;br /&gt;
 YES - JIRA Ticket System:&lt;br /&gt;
 https://www.modsecurity.org/tracker/browse/CORERULES &lt;br /&gt;
&lt;br /&gt;
| 16. Have any existing limitations of the tool been documented? &lt;br /&gt;
= (answer #15)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== First Reviewer ====&lt;br /&gt;
'''''[[User:Ivanr|Ivan Ristic]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;Ideally, reviewers should be an existing OWASP project leader or chapter leader.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = Not applicable. ModSecurity rules cannot be installed with an installer.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= Not applicable. The rules do use the SecComponentSignature to identify themselves, which is the closest thing to having an “About box” in these circumstances.&lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= Not applicable. Building is not necessary as the rules are evaluated at runtime.&lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= Not applicable. No building is necessary.&lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= The bug tracking system is very much usable. JIRA is pretty much the best tracking system available. It is hosted elsewhere, but that’s a big plus in this case (because the code is hosted at SourceForge, and its tracking systems are all bad.)&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= Yes. The Core Rules are a substantial piece of work that provides significant security qualities. Nothing similar is available elsewhere. It’s easily the best rule set there is.&lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= I don’t believe anything else is required for a stable release. Of course, the rules can be improved, but that’s a matter of new research.&lt;br /&gt;
There are two areas in which I would like to see improvement:&lt;br /&gt;
• More involvement from the community. For the rules to flourish, there must be a sustained community involvement. Ryan is already very clear about leading the project into this direction (as demonstrated by his messages on the mailing list).&lt;br /&gt;
• Transparency. This is always a difficult goal to achieve with WAF rules. I would like to see clear justification of every rule in the set, explanation of the attack it was designed to handle, and explanation of the way in which it works.&lt;br /&gt;
In talking to Ryan, it is clear that there already are activities under way to address both of the above points.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== Second Reviewer ====&lt;br /&gt;
'''''[[User:Leocavallari|Leonardo Cavallari]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;It is recommended that an OWASP board member or Global Projects Committee member be the second reviewer on Quality releases. The board has the initial option to review the project, followed by the Global Projects Committee.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = There's no need for an installer, just to unpack the package in proper directory. It could have a more detailed explanation about this process on Installation page.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= Yes, except by installation procedure. Although the project is about a rule set that only needs to be unpacked, I missed Mod Security installation and basic configuration procedures or, at least, relevant links that point to it, since the project by itself makes no sense without a running Mod Security installation.&lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= Yes. Users can find latest improvements into CHANGELOG and README files.&lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= There`s no need for this information. &lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= Yes. &lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= Yes, there's no need to operate it, since it runs as an Apache module. The logs are reported in a format that could be more comprehensive and easy to parse/read without a proprietary solution.&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= Yes. The process is based on extract and copy files to proper directory.&lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= Yes. It uses the well know JIRA.&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= Yes, not related to CRS by itself, but to Mod Security. It was impossible to coexist Mod Security with 2 of 5 real world applications I tested during my review, even with specific configurations.&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= Yes, it a very comprehensive rules set to detect/block webapp attacks.&lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= No, nothing is missing. The Core Rules Set is very mature and easy to use.&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project_-_ModSecurity_2.0.6_-_Assessment&amp;diff=87946</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project - ModSecurity 2.0.6 - Assessment</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project_-_ModSecurity_2.0.6_-_Assessment&amp;diff=87946"/>
				<updated>2010-08-25T00:50:09Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: /* Stable Release Review of the OWASP ModSecurity Core Rule Set Project - Release ModSecurity 2.0.6 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;small&amp;gt;[[:Category:OWASP ModSecurity Core Rule Set Project|Click here to return to project's main page]]&amp;lt;/small&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Stable Release Review of the OWASP ModSecurity Core Rule Set Project - Release ModSecurity 2.0.6 ==&lt;br /&gt;
&lt;br /&gt;
==== Project Leader for this Release ====&lt;br /&gt;
'''''[[User:Rcbarnett|Ryan Barnett]]'s Pre-Assessment Checklist:'''''&lt;br /&gt;
&lt;br /&gt;
{{ Pre-Assessment Questions - Tools&lt;br /&gt;
| 1. Is this release associated with a project containing at least the [[Assessing_Project_Health#Project_Wiki_Page_Minimal_Content|Project Wiki Page Minimum Content]]  information?&lt;br /&gt;
= (answer #1) &lt;br /&gt;
   1. have an up to date project template with current project information? - YES&lt;br /&gt;
   2. have a conference style presentation that describes the tool/document in at least 3 slides? - YES&lt;br /&gt;
   3. have a one sheet overview document about the project? - NO&lt;br /&gt;
   4. have a link to a working mail list? - YES&lt;br /&gt;
   5. have a statement of the application security issue the project addresses? - YES&lt;br /&gt;
   6. have a project roadmap? - YES&lt;br /&gt;
   7. project leaders and main contributors have a wiki account (with its user page containing contact details about the user and if possible his CV) - YES&lt;br /&gt;
&lt;br /&gt;
| 2. Is your tool licensed under an open source license? &lt;br /&gt;
= (answer #2) &lt;br /&gt;
 http://www.gnu.org/licenses/old-licenses/gpl-2.0.html&lt;br /&gt;
&lt;br /&gt;
| 3. Is the source code and any documentation available in an online project repository? &lt;br /&gt;
= (answer #3)&lt;br /&gt;
 http://mod-security.svn.sourceforge.net/viewvc/mod-security/crs/&lt;br /&gt;
&lt;br /&gt;
| 4. Is there working code? &lt;br /&gt;
= (answer #4)&lt;br /&gt;
 http://sourceforge.net/projects/mod-security/files/modsecurity-crs/&lt;br /&gt;
&lt;br /&gt;
| 5. Is there a roadmap for this project release which will take it from Alpha to Stable release? &lt;br /&gt;
= (answer #5)&lt;br /&gt;
 http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project_-_Roadmap&lt;br /&gt;
&lt;br /&gt;
| 6. Are the Alpha pre-assessment items complete?&lt;br /&gt;
= (answer #6)&lt;br /&gt;
 YES&lt;br /&gt;
&lt;br /&gt;
| 7. Is there an installer or stand-alone executable? &lt;br /&gt;
= (answer #7)&lt;br /&gt;
 Not applicable. CRS is not a standalone project that can be installed with an installer.&lt;br /&gt;
&lt;br /&gt;
| 8. Is there user documentation on the OWASP project wiki page? &lt;br /&gt;
= (answer #8)&lt;br /&gt;
 YES&lt;br /&gt;
 http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Installation&lt;br /&gt;
 http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Documentation&lt;br /&gt;
&lt;br /&gt;
| 9. Is there an &amp;quot;About box&amp;quot; or similar help item which lists the following? &lt;br /&gt;
= (answer #9)&lt;br /&gt;
 YES - http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Project_Details&lt;br /&gt;
&lt;br /&gt;
 # Project Name - ModSecurity Core Rule Set (CRS)&lt;br /&gt;
 # Short Description - The Core Rule Set (CRS) provides critical protections against web attacks.  Unlike intrusion detection and prevention systems, which rely on signatures specific to known vulnerabilities, &lt;br /&gt;
                       the CRS is based on generic rules which focus on attack payload identification in order to provide protection from zero day and unknown vulnerabilities often found in web applications, &lt;br /&gt;
                       which are in most cases custom coded. &lt;br /&gt;
 # Project Release Lead and contact information (e.g. email address) - Ryan Barnett ryan.barnett@breach.com&lt;br /&gt;
 # Project Release Contributors (if any) - Brian Rectanus&lt;br /&gt;
 # Project Release License - GNU General Public License - Version 2.0&lt;br /&gt;
 # Project Release Sponsors (if any) - Breach Security Labs&lt;br /&gt;
 # Release status and date assessed as Month-Year (e.g. March 2009) - Not Yet Reviewed by OWASP.  An important point to consider is that the CRS is not the typical OWASP project.  Most projects start out as ideas, then move to documentation&lt;br /&gt;
                                                                      and eventually working code.  The CRS is in the opposite position in that Breach Security Labs developed these rules over the past 3-4 years.  So, we brought a project with&lt;br /&gt;
                                                                      fully working code that is running on thousands of web servers.  The code itself is well tested.  What was lacking was documentation which as since been updated.&lt;br /&gt;
 # Link to OWASP Project Page - http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project&lt;br /&gt;
&lt;br /&gt;
| 10. Is there documentation on how to build the tool from source including obtaining the source from the code repository? &lt;br /&gt;
= (answer #10)&lt;br /&gt;
 Not applicable, as no building is needed.&lt;br /&gt;
&lt;br /&gt;
| 11. Is the tool documentation stored in the same repository as the source code?&lt;br /&gt;
= (answer #11)&lt;br /&gt;
 YES - there is also extensive new documentation/comments inside the files themselves describing the Rule Logic and Reference links.&lt;br /&gt;
&lt;br /&gt;
| 12. Are the Alpha and Beta pre-assessment items complete? &lt;br /&gt;
= (answer #12)&lt;br /&gt;
 YES&lt;br /&gt;
&lt;br /&gt;
| 13. Does the tool include documentation built into the tool? &lt;br /&gt;
= (answer #13) &lt;br /&gt;
 YES - there is also extensive new documentation/comments inside the files themselves describing the Rule Logic and Reference links.&lt;br /&gt;
&lt;br /&gt;
| 14. Does the tool include build scripts to automate builds? &lt;br /&gt;
= (answer #14)&lt;br /&gt;
 Not applicable, as no building is needed.&lt;br /&gt;
&lt;br /&gt;
| 15. Is there a publicly accessible bug tracking system? &lt;br /&gt;
= (answer #15)&lt;br /&gt;
 YES - JIRA Ticket System:&lt;br /&gt;
 https://www.modsecurity.org/tracker/browse/CORERULES &lt;br /&gt;
&lt;br /&gt;
| 16. Have any existing limitations of the tool been documented? &lt;br /&gt;
= (answer #15)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== First Reviewer ====&lt;br /&gt;
'''''[[User:Ivanr|Ivan Ristic]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;Ideally, reviewers should be an existing OWASP project leader or chapter leader.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = Not applicable. ModSecurity rules cannot be installed with an installer.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= Not applicable. The rules do use the SecComponentSignature to identify themselves, which is the closest thing to having an “About box” in these circumstances.&lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= Not applicable. Building is not necessary as the rules are evaluated at runtime.&lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= Not applicable. No building is necessary.&lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= The bug tracking system is very much usable. JIRA is pretty much the best tracking system available. It is hosted elsewhere, but that’s a big plus in this case (because the code is hosted at SourceForge, and its tracking systems are all bad.)&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= Yes. The Core Rules are a substantial piece of work that provides significant security qualities. Nothing similar is available elsewhere. It’s easily the best rule set there is.&lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= I don’t believe anything else is required for a stable release. Of course, the rules can be improved, but that’s a matter of new research.&lt;br /&gt;
There are two areas in which I would like to see improvement:&lt;br /&gt;
• More involvement from the community. For the rules to flourish, there must be a sustained community involvement. Ryan is already very clear about leading the project into this direction (as demonstrated by his messages on the mailing list).&lt;br /&gt;
• Transparency. This is always a difficult goal to achieve with WAF rules. I would like to see clear justification of every rule in the set, explanation of the attack it was designed to handle, and explanation of the way in which it works.&lt;br /&gt;
In talking to Ryan, it is clear that there already are activities under way to address both of the above points.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== Second Reviewer ====&lt;br /&gt;
'''''[[User:Leocavallari|Leonardo Cavallari]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;It is recommended that an OWASP board member or Global Projects Committee member be the second reviewer on Quality releases. The board has the initial option to review the project, followed by the Global Projects Committee.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = There's no need for an installer, just to unpack the package in proper directory. It could have a more detailed explanation about this process on Installation page.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= Yes, except by installation procedure. Although the project is about a rule set that only needs to be unpacked, I missed Mod Security installation and basic configuration procedures or, at least, relevant links that point to it, since the project by itself makes no sense without a running Mod Security installation.&lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= Yes. Users can find latest improvements into CHANGELOG and README files.&lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= There`s no need for this information. &lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= Yes. &lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= Yes, there's no need to operate it, since it runs as an Apache module. The logs are reported in a format that could be more comprehensive and easy to parse/read.&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= Yes. The process is based on extract and copy files to proper directory.&lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= Yes. It uses the well know JIRA.&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= Yes, not related to CRS by itself, but to Mod Security. It was impossible to coexist Mod Security with 2 of 5 real world applications I tested during my review.&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= Yes, it a very comprehensive rules set to detect/block webapp attacks.&lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= No, nothing is missing. The Core Rules Set is very mature and easy to use.&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project_-_ModSecurity_2.0.6_-_Assessment&amp;diff=87945</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project - ModSecurity 2.0.6 - Assessment</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project_-_ModSecurity_2.0.6_-_Assessment&amp;diff=87945"/>
				<updated>2010-08-25T00:44:11Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;small&amp;gt;[[:Category:OWASP ModSecurity Core Rule Set Project|Click here to return to project's main page]]&amp;lt;/small&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Stable Release Review of the OWASP ModSecurity Core Rule Set Project - Release ModSecurity 2.0.6 ==&lt;br /&gt;
&lt;br /&gt;
==== Project Leader for this Release ====&lt;br /&gt;
'''''[[User:Rcbarnett|Ryan Barnett]]'s Pre-Assessment Checklist:'''''&lt;br /&gt;
&lt;br /&gt;
{{ Pre-Assessment Questions - Tools&lt;br /&gt;
| 1. Is this release associated with a project containing at least the [[Assessing_Project_Health#Project_Wiki_Page_Minimal_Content|Project Wiki Page Minimum Content]]  information?&lt;br /&gt;
= (answer #1) &lt;br /&gt;
   1. have an up to date project template with current project information? - YES&lt;br /&gt;
   2. have a conference style presentation that describes the tool/document in at least 3 slides? - YES&lt;br /&gt;
   3. have a one sheet overview document about the project? - NO&lt;br /&gt;
   4. have a link to a working mail list? - YES&lt;br /&gt;
   5. have a statement of the application security issue the project addresses? - YES&lt;br /&gt;
   6. have a project roadmap? - YES&lt;br /&gt;
   7. project leaders and main contributors have a wiki account (with its user page containing contact details about the user and if possible his CV) - YES&lt;br /&gt;
&lt;br /&gt;
| 2. Is your tool licensed under an open source license? &lt;br /&gt;
= (answer #2) &lt;br /&gt;
 http://www.gnu.org/licenses/old-licenses/gpl-2.0.html&lt;br /&gt;
&lt;br /&gt;
| 3. Is the source code and any documentation available in an online project repository? &lt;br /&gt;
= (answer #3)&lt;br /&gt;
 http://mod-security.svn.sourceforge.net/viewvc/mod-security/crs/&lt;br /&gt;
&lt;br /&gt;
| 4. Is there working code? &lt;br /&gt;
= (answer #4)&lt;br /&gt;
 http://sourceforge.net/projects/mod-security/files/modsecurity-crs/&lt;br /&gt;
&lt;br /&gt;
| 5. Is there a roadmap for this project release which will take it from Alpha to Stable release? &lt;br /&gt;
= (answer #5)&lt;br /&gt;
 http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project_-_Roadmap&lt;br /&gt;
&lt;br /&gt;
| 6. Are the Alpha pre-assessment items complete?&lt;br /&gt;
= (answer #6)&lt;br /&gt;
 YES&lt;br /&gt;
&lt;br /&gt;
| 7. Is there an installer or stand-alone executable? &lt;br /&gt;
= (answer #7)&lt;br /&gt;
 Not applicable. CRS is not a standalone project that can be installed with an installer.&lt;br /&gt;
&lt;br /&gt;
| 8. Is there user documentation on the OWASP project wiki page? &lt;br /&gt;
= (answer #8)&lt;br /&gt;
 YES&lt;br /&gt;
 http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Installation&lt;br /&gt;
 http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Documentation&lt;br /&gt;
&lt;br /&gt;
| 9. Is there an &amp;quot;About box&amp;quot; or similar help item which lists the following? &lt;br /&gt;
= (answer #9)&lt;br /&gt;
 YES - http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Project_Details&lt;br /&gt;
&lt;br /&gt;
 # Project Name - ModSecurity Core Rule Set (CRS)&lt;br /&gt;
 # Short Description - The Core Rule Set (CRS) provides critical protections against web attacks.  Unlike intrusion detection and prevention systems, which rely on signatures specific to known vulnerabilities, &lt;br /&gt;
                       the CRS is based on generic rules which focus on attack payload identification in order to provide protection from zero day and unknown vulnerabilities often found in web applications, &lt;br /&gt;
                       which are in most cases custom coded. &lt;br /&gt;
 # Project Release Lead and contact information (e.g. email address) - Ryan Barnett ryan.barnett@breach.com&lt;br /&gt;
 # Project Release Contributors (if any) - Brian Rectanus&lt;br /&gt;
 # Project Release License - GNU General Public License - Version 2.0&lt;br /&gt;
 # Project Release Sponsors (if any) - Breach Security Labs&lt;br /&gt;
 # Release status and date assessed as Month-Year (e.g. March 2009) - Not Yet Reviewed by OWASP.  An important point to consider is that the CRS is not the typical OWASP project.  Most projects start out as ideas, then move to documentation&lt;br /&gt;
                                                                      and eventually working code.  The CRS is in the opposite position in that Breach Security Labs developed these rules over the past 3-4 years.  So, we brought a project with&lt;br /&gt;
                                                                      fully working code that is running on thousands of web servers.  The code itself is well tested.  What was lacking was documentation which as since been updated.&lt;br /&gt;
 # Link to OWASP Project Page - http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project&lt;br /&gt;
&lt;br /&gt;
| 10. Is there documentation on how to build the tool from source including obtaining the source from the code repository? &lt;br /&gt;
= (answer #10)&lt;br /&gt;
 Not applicable, as no building is needed.&lt;br /&gt;
&lt;br /&gt;
| 11. Is the tool documentation stored in the same repository as the source code?&lt;br /&gt;
= (answer #11)&lt;br /&gt;
 YES - there is also extensive new documentation/comments inside the files themselves describing the Rule Logic and Reference links.&lt;br /&gt;
&lt;br /&gt;
| 12. Are the Alpha and Beta pre-assessment items complete? &lt;br /&gt;
= (answer #12)&lt;br /&gt;
 YES&lt;br /&gt;
&lt;br /&gt;
| 13. Does the tool include documentation built into the tool? &lt;br /&gt;
= (answer #13) &lt;br /&gt;
 YES - there is also extensive new documentation/comments inside the files themselves describing the Rule Logic and Reference links.&lt;br /&gt;
&lt;br /&gt;
| 14. Does the tool include build scripts to automate builds? &lt;br /&gt;
= (answer #14)&lt;br /&gt;
 Not applicable, as no building is needed.&lt;br /&gt;
&lt;br /&gt;
| 15. Is there a publicly accessible bug tracking system? &lt;br /&gt;
= (answer #15)&lt;br /&gt;
 YES - JIRA Ticket System:&lt;br /&gt;
 https://www.modsecurity.org/tracker/browse/CORERULES &lt;br /&gt;
&lt;br /&gt;
| 16. Have any existing limitations of the tool been documented? &lt;br /&gt;
= (answer #15)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== First Reviewer ====&lt;br /&gt;
'''''[[User:Ivanr|Ivan Ristic]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;Ideally, reviewers should be an existing OWASP project leader or chapter leader.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = Not applicable. ModSecurity rules cannot be installed with an installer.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= Not applicable. The rules do use the SecComponentSignature to identify themselves, which is the closest thing to having an “About box” in these circumstances.&lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= Not applicable. Building is not necessary as the rules are evaluated at runtime.&lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= Not applicable. No building is necessary.&lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= The bug tracking system is very much usable. JIRA is pretty much the best tracking system available. It is hosted elsewhere, but that’s a big plus in this case (because the code is hosted at SourceForge, and its tracking systems are all bad.)&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= Yes. The Core Rules are a substantial piece of work that provides significant security qualities. Nothing similar is available elsewhere. It’s easily the best rule set there is.&lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= I don’t believe anything else is required for a stable release. Of course, the rules can be improved, but that’s a matter of new research.&lt;br /&gt;
There are two areas in which I would like to see improvement:&lt;br /&gt;
• More involvement from the community. For the rules to flourish, there must be a sustained community involvement. Ryan is already very clear about leading the project into this direction (as demonstrated by his messages on the mailing list).&lt;br /&gt;
• Transparency. This is always a difficult goal to achieve with WAF rules. I would like to see clear justification of every rule in the set, explanation of the attack it was designed to handle, and explanation of the way in which it works.&lt;br /&gt;
In talking to Ryan, it is clear that there already are activities under way to address both of the above points.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== Second Reviewer ====&lt;br /&gt;
'''''[[User:Leocavallari|Leonardo Cavallari]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;It is recommended that an OWASP board member or Global Projects Committee member be the second reviewer on Quality releases. The board has the initial option to review the project, followed by the Global Projects Committee.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = There's no need for an installer, just to unpack the package in proper directory. It could have a more detailed explanation about this process on Installation page.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= Yes, except by installation procedure. Although the project is about a rule set that only needs to be unpacked, I missed Mod Security installation and basic configuration procedures or, at least, relevant links that point to it, since the project by itself makes no sense without a running Mod Security installation.&lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= Yes. Users can find latest improvements into CHANGELOG and README files.&lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= There`s no need for this information. &lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= Yes. &lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= Yes, there's no need to operate it, since it runs as an Apache module. The logs are reported in a format that could be more comprehensive and easy to parse/read.&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= Yes. The process is based on extract and copy files to proper directory.&lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= Yes. It uses the well know JIRA.&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= Yes, it a very comprehensive rules set to detect/block webapp attacks.&lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= No, nothing is missing. The Core Rules Set is very mature and easy to use. &lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_Brasil_2010_(pt-br)&amp;diff=87869</id>
		<title>AppSec Brasil 2010 (pt-br)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_Brasil_2010_(pt-br)&amp;diff=87869"/>
				<updated>2010-08-23T13:04:46Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:LogoAppSecBrazil.002.jpg|center]] &lt;br /&gt;
&lt;br /&gt;
'''The English version is [[AppSec Brasil 2010|here]]''' &lt;br /&gt;
&lt;br /&gt;
= OWASP AppSec Brasil 2010  =&lt;br /&gt;
&lt;br /&gt;
A segunda edição da versão brasileira da série de conferências mais importante da OWASP ocorrerá em Campinas, SP. A conferência terá dois dias de treinamentos, seguidos de dois dias de conferência em trilha única. &lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:AppSec Brasil 2010 Campinas.jpg|500px]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
== Datas Importantes  ==&lt;br /&gt;
&lt;br /&gt;
A Conferência ocorrerá entre 16 e 19 de novembro de 2010. Os primeiros dois dias serão dedicados aos treinamentos. As plenárias ocorrerão em 18 e 19 de novembro de 2010. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;'''&amp;lt;span style=&amp;quot;color: rgb(255, 0, 0); font-size: 14pt&amp;quot;&amp;gt; A data final de apresentação de propostas foi adiada para 23/09 &amp;lt;/span&amp;gt;''' &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sobre ====&lt;br /&gt;
&lt;br /&gt;
== Sobre a Conferência ==&lt;br /&gt;
&lt;br /&gt;
Dando prosseguimento ao sucesso da primeira AppSec Brasil, que ocorreu em Brasília em 2009, o Capítulo brasileiro do OWASP irá promover a segunda edição em 2010, na cidade de Campinas, a cerca de 90 km de São Paulo &lt;br /&gt;
&lt;br /&gt;
Campinas é a terceira maior cidade do estado de São Paulo (e a maior fora da área metropolitana da Capital) e é um importante polo econômico, abrigando universidades e centros de pesquisa de renome internacional. A cidade também concentra muitas indústrias de alta tecnologia, incluindo multi-nacionais dos ramos de eletrônicos, telecomunicações e quimicos. &lt;br /&gt;
&lt;br /&gt;
Este ano, esperamos reunir um número expressivo de profissionais e pesquisadores brasileiros e latino-americanos para compartilharem informações sobre o estado-da-arte da segurança de aplicações. &lt;br /&gt;
&lt;br /&gt;
==== Chamadas de trabalhos ====&lt;br /&gt;
&amp;lt;pre&amp;gt;**PRORROGAÇÃO DE PRAZO PARA SUBMISSÕES - 23 de agosto**&lt;br /&gt;
**APPSEC BRASIL 2010**&lt;br /&gt;
**CHAMADA DE TRABALHOS**&lt;br /&gt;
&lt;br /&gt;
O OWASP (Open Web Application Security Project) solicita propostas de apresentações para a conferência AppSec Brasil 2010,&lt;br /&gt;
que ocorrerá na Fundação CPqD em Campinas, SP, de 16 a 19 de novembro de 2010. Haverá mini-cursos nos dias 16 e 17, seguidos&lt;br /&gt;
de sessões plenárias detrilha única nos dias 18 e 19 de novembro de 2010.&lt;br /&gt;
&lt;br /&gt;
Buscamos pessoas e organizações que queiram ministrar palestras sobre segurança de aplicações. Em particular destacamos os seguintes&lt;br /&gt;
tópicos de interesse:&lt;br /&gt;
 - Modelagem de ameaças em aplicações&lt;br /&gt;
 - Riscos de Negócio em Segurança de aplicações&lt;br /&gt;
 - Aplicações de Revisões de Código&lt;br /&gt;
 - Métricas Aplicadas a Segurança de Aplicações&lt;br /&gt;
 - Ferramentas e Projetos do OWASP&lt;br /&gt;
 - Tópicos de Privacidade em Aplicações e Armazenamento de Dados&lt;br /&gt;
 - Práticas de Programação Segura&lt;br /&gt;
 - Programas de Segurança para todo o Ciclo de Vida de aplicações&lt;br /&gt;
 - Tópicos de Segurança para tecnologias específicas (AJAX, XML, Flash, etc)&lt;br /&gt;
 - Controles de Segurança para aplicações Web&lt;br /&gt;
 - Testes de Segurança de aplicações Web&lt;br /&gt;
 - Segurança de Web Services ou XML&lt;br /&gt;
&lt;br /&gt;
A lista de tópicos não é exaustiva; outros tópicos podem ser abordados, desde que em consonância com o tema central do evento.&lt;br /&gt;
&lt;br /&gt;
Para submeter uma proposta, preencha o formulário disponível em http://www.owasp.org/images/6/68/OWASP_AppSec_Brasil_2010_CFP%28pt-br%29.rtf.zip,&lt;br /&gt;
que deve ser enviado através da página da conferência no site Easychair: http://www.easychair.org/conferences/?conf=appsecbr2010&lt;br /&gt;
&lt;br /&gt;
Cada apresentação terá 45 minutos de duração, seguidos de 10 minutos para perguntas da platéia. Todas as apresentações deverão estar&lt;br /&gt;
em conformidade com as regras definidas pelo OWASP em seu &amp;quot;Speaker Agreement&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
**Datas importantes:**&lt;br /&gt;
 A data limite para apresentação de propostas é 23 de agosto de 2010 às 23:59, horário de Brasília.&lt;br /&gt;
 A notificação de aceitação ocorrerá até o dia 8 de setembro de 2010.&lt;br /&gt;
 A versão final das apresentações deverá ser enviada até o dia 30 de setembro de 2010.&lt;br /&gt;
&lt;br /&gt;
A comissão organizadora da conferência pode ser contatada pelo e-mail: organizacao2010@appsecbrasil.org&lt;br /&gt;
&lt;br /&gt;
Para mais informações, favor consultar as seguintes páginas:&lt;br /&gt;
 Página da conferência:&lt;br /&gt;
   http://www.owasp.org/index.php/AppSec_Brasil_2010_(pt-br)&lt;br /&gt;
&lt;br /&gt;
 OWASP Speaker Agreement (em inglês):&lt;br /&gt;
   http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
&lt;br /&gt;
 Página do OWASP:&lt;br /&gt;
   http://www.owasp.org&lt;br /&gt;
&lt;br /&gt;
 Página da conferência no Easychair:&lt;br /&gt;
   http://www.easychair.org/conferences/?conf=appsecbr2010&lt;br /&gt;
&lt;br /&gt;
 Formulário para apresentação de propostas:&lt;br /&gt;
&lt;br /&gt;
http://www.owasp.org/images/6/68/OWASP_AppSec_Brasil_2010_CFP%28pt-br%29.rtf.zip&lt;br /&gt;
&lt;br /&gt;
********* ATENÇÃO: Não serão aceitas propostas sem TODAS as informações solicitadas no formulário *********&lt;br /&gt;
&lt;br /&gt;
Favor divulgar a todos os possíveis interessados.&lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
== Chamada de mini-cursos ==&lt;br /&gt;
&amp;lt;pre&amp;gt;**APPSEC BRASIL 2010**&lt;br /&gt;
**CHAMADA DE MINI-CURSOS**&lt;br /&gt;
&lt;br /&gt;
O OWASP (Open Web Application Security Project) solicita propostas de apresentações para a conferência AppSec Brasil 2010, &lt;br /&gt;
que ocorrerá na Fundação CPqD em Campinas, SP, de 16 a 19 de novembro de 2010. Haverá mini-cursos nos dias 16 e 17, &lt;br /&gt;
seguidos de sessões plenárias de trilha única nos dias 18 e 19 de novembro de 2010.&lt;br /&gt;
&lt;br /&gt;
Buscamos pessoas e organizações que queiram ministrar mini-cursos sobre segurança de aplicações. &lt;br /&gt;
Destacamos os seguintes tópicos de interesse:&lt;br /&gt;
  - Modelagem de ameaças em aplicações (Application Threat Modeling)&lt;br /&gt;
  - Riscos de Negócio em Segurança de aplicações (Business Risks with Application Security)&lt;br /&gt;
  - Aplicações de Revisões de Código (Hands-on Source Code Review)&lt;br /&gt;
  - Métricas Aplicadas a Segurança de Aplicações (Metrics for Application Security)&lt;br /&gt;
  - Ferramentas e Projetos do OWASP (OWASP Tools and Projects)&lt;br /&gt;
  - Tópicos de Privacidade em Aplicações e Armazenamento de Dados (Privacy Concerns with &lt;br /&gt;
     Applications and Data Storage)&lt;br /&gt;
  - Práticas de Programação Segura (Secure Coding Practices)&lt;br /&gt;
  - Programas de Segurança para todo o Ciclo de Vida de aplicações (Secure Development Lifecycle Programs)&lt;br /&gt;
  - Tópicos de Segurança para tecnologias específicas (AJAX, XML, Flash, etc) (Technology specific presentations on &lt;br /&gt;
     security such as AJAX, XML, etc)&lt;br /&gt;
  - Controles de Segurança para aplicações Web (Web Application Security countermeasures)&lt;br /&gt;
  - Testes de Segurança de aplicações Web (Web Application Security Testing)&lt;br /&gt;
  - Segurança de Web Services ou XML (Web Services, XML and Application Security)&lt;br /&gt;
&lt;br /&gt;
A lista de tópicos não é exaustiva; outros tópicos podem ser abordados, desde que em consonância com o tema central do evento.&lt;br /&gt;
&lt;br /&gt;
Para submeter uma proposta, preencha o formulário disponível em &lt;br /&gt;
http://www.owasp.org/images/4/43/OWASP_AppSec_Brasil_2010_CFT%28pt-br%29.rtf.zip, que deve ser enviado por email &lt;br /&gt;
para organizacao2010@appsecbrasil.org.&lt;br /&gt;
&lt;br /&gt;
Cada mini-curso poderá ter 1 ou 2 dias (8 horas por dia) de duração e deverão estar em conformidade com as regras definidas &lt;br /&gt;
pelo OWASP em seu &amp;quot;Speaker Agreement&amp;quot;. A conferência pagará aos instrutores pelo menos 30% do fatuamente de seus mini-cursos. &lt;br /&gt;
Cursos que consigam atrair mais que o número mínimo de alunos poderão receber percentagens maiores (mais detalhes abaixo). &lt;br /&gt;
Não haverá qualquer outro tipo de remuneração (passagens, hospedagem, etc) para os apresentadores ou autores dos mini-cursos. &lt;br /&gt;
Caso seja necessário um arranjo diferente, favor entrar em contacto com o comitê organizador pelo email abaixo.&lt;br /&gt;
&lt;br /&gt;
**Remuneração**&lt;br /&gt;
  Os instrutores e autores dos cursos serão remunerados conforme a quantidade de alunos. Se o curso atrair apenas o número &lt;br /&gt;
mínimo de alunos, a remuneração será 30% do faturamento. Para cada 10 alunos a mais, a remuneração será acrescida de 5% do &lt;br /&gt;
faturamento, até um máximo de 45% do faturamento do curso. Por exemplo, para um curso de 1 dia para uma turma de 10 a &lt;br /&gt;
19 alunos, os instrutores e autores receberão 30% do faturamento do curso. Para turmas entre 20 e 29 alunos, a remuneração &lt;br /&gt;
sobe para 35% do faturamento e assim sucessivamente.&lt;br /&gt;
&lt;br /&gt;
Em casos excepcionais, poderá ser acordado um esquema diferente para remuneração dos instrutores. Possíveis interessados &lt;br /&gt;
devem entrar em contato com a comissão organizadora pelo email organizacao2010@appsecbrasil.org&lt;br /&gt;
&lt;br /&gt;
**Valores das inscrições**&lt;br /&gt;
  Cursos de 1 dia:  R$ 450 por aluno&lt;br /&gt;
  Cursos de 2 días: R$ 900 por aluno &lt;br /&gt;
&lt;br /&gt;
**Mínimo de alunos**&lt;br /&gt;
  10 alunos para cursos de 1 dia&lt;br /&gt;
  20 alunos para cursos de 2 dias&lt;br /&gt;
&lt;br /&gt;
**Datas importantes:**&lt;br /&gt;
  A data limite para apresentação de propostas é 26 de julho de 2010 às 23:59, horário de Brasília.&lt;br /&gt;
  A notificação de aceitação ocorrerá até o dia 16 de agosto de 2010.&lt;br /&gt;
  A versão final do material dos mini-cursos deverá ser enviada até o dia 15 de setembro de 2010.&lt;br /&gt;
&lt;br /&gt;
A comissão organizadora da conferência pode ser contactada pelo e-mail: organizacao2010@appsecbrasil.org&lt;br /&gt;
&lt;br /&gt;
Para mais informações, favor consultar as seguintes páginas:&lt;br /&gt;
 Página da conferência: http://www.owasp.org/index.php/AppSec_Brasil_2010_(pt-br)&lt;br /&gt;
 OWASP Speaker Agreement (em inglês): http://www.owasp.org/index.php/Speaker_Agreement&lt;br /&gt;
 Página do OWASP: http://www.owasp.org&lt;br /&gt;
 Página da conferência no Easychair: http://www.easychair.org/conferences/?conf=appsecbr2010&lt;br /&gt;
 Formulário para apresentação de propostas: http://www.owasp.org/images/4/43/OWASP_AppSec_Brasil_2010_CFT%28pt-br%29.rtf.zip&lt;br /&gt;
&lt;br /&gt;
********* ATENÇÃO: Não serão aceitas propostas sem TODAS as informações solicitadas no formulário *********&lt;br /&gt;
&lt;br /&gt;
Favor divulgar a todos os possíveis interessados.&lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
==== Patrocínio  ====&lt;br /&gt;
&lt;br /&gt;
Estamos atualmente buscado patrocinadores para a edição 2010 da AppSec Brasil. Veja mais detalhes sobre as [[Media:OWASP_AppSec_Brasil_2010-Oportunidade_de_Patroc%C3%ADnio.pdf|oportunidades de patrocínio]]. &lt;br /&gt;
&lt;br /&gt;
Se estiver interessado em patrocinar o AppSec Brasil 2010, por favor entre em contato com a equipe organizadora da conferência pelo email organizacao2010@appsecbrasil.org. &lt;br /&gt;
&lt;br /&gt;
== Patrocinadores ==&lt;br /&gt;
&lt;br /&gt;
== Patrocinadores Platinum  ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:AppSec Brasil 2010 CPQD.jpg|200px|link=http://www.cpqd.com.br]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Patrocinadores Gold  ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:LeadComm Logo Screen.jpg|150px|link=http://www.leadcomm.com.br]]&lt;br /&gt;
| width=&amp;quot;50&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:Logo PagSeguro-Uma empresa-UOL.jpg|150px|link=http://www.pagseguro.uol.com.br]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Patrocinadores Silver  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Patrocinadores do kit da conferência  ===&lt;br /&gt;
{|&lt;br /&gt;
| [[Image:Logotipo_Conviso_2009_Cor.png|150px]]&lt;br /&gt;
| width=&amp;quot;50&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| [[Image:lgClavis.png|100px|link=http://www.clavis.com.br]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Promoção ==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:Appsec Brasil 2010 InstitutoTuring.png]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
==== Keynotes  ====&lt;br /&gt;
&lt;br /&gt;
==Robert 'Rsnake' Hansen ==&lt;br /&gt;
&lt;br /&gt;
[http://www.sectheory.com/ SecTheory]&lt;br /&gt;
&lt;br /&gt;
''Title:'' '''TBD.'''&lt;br /&gt;
&lt;br /&gt;
''Bio:'' Robert Hansen, também conhecido como RSnake, é o fundador e CEO da empresa SecTheory. Trabalhou para empresas como Digital Island, Exodus Communications e Cable &amp;amp; Wireless ocupando diversos cargos desde Arquiteto de Segurança Sênior e eventualmente como gerente de produtos de diversos serviços da linha de serviços gerenciados de segurança. Também trabalhou no eBay como Gerente Global Sênior para Confiança e Segurança, focando em anti-phishing, anti-malware de DHTML e estratégias de anti-vírus. Posteriormente ele trabalhou como Diretor de Gerenciamento de Produtos para o site Realtor.com. Robert é membro do conselho consultivo para o Grupo Intrepidus, e anteriormente era membro do conselho consultivo técnico da ClickForensics e atualmente contribui para a estratégia de segurança de diversas companhias ''startup''.&lt;br /&gt;
&lt;br /&gt;
O Sr. Hansen escreveu o livro ''Detecting Malice'', publica conteúdo para a O'Reilly e é co-autor do livro ''XSS Exploits'' da editora Syngress. Ele é membro do grupo do NIST.gov para Métricas de Garantia de Software e Avaliação de Ferramentas com foco em ''scanners'' de segurança de aplicações e membro do grupo de Critérios de Avaliação de ''Scanners'' para Segurança de Aplicações (WASC-WASSEC). Passou instruções ao Departamento de Defesa no Pentágono e é palestrante em conferências como SourceBoston, Secure360, GFIRST/US-CERT, CSI, Toorcon, APWG, ISSA, TRISC, conferências mundias da OWASP/WASC, SANS, Microsoft Bluehat, Blackhat, DefCon, SecTor, BSides, Networld+Interop e foi um ''keynote speaker'' na Conferência de ''Cyber''Segurança de Nova York, NITES e OWASP AppSec Asia. O Sr. Hansens é um membro da Ingragard, West Austin Rotary, WASC, IACSP, APWG, contribui para o guia OWASP 2.0 e está no Comitê de Conexões da OWASP.&lt;br /&gt;
&lt;br /&gt;
Robert também mantém o site http://ha.ckers.org onde discute sobre segurança de aplicações web e provê muitas informações úteis que podem ser usadas contra ataques de aplicações web.&lt;br /&gt;
&lt;br /&gt;
== Jeremiah Grossman ==&lt;br /&gt;
&lt;br /&gt;
[http://www.whitehatsec.com/ WhiteHat Security] &lt;br /&gt;
&lt;br /&gt;
''Título:'' '''A definir.''' &lt;br /&gt;
&lt;br /&gt;
''Bio:'' Jeremiah Grossman, fundador e CTO da WhiteHat Security, é um especialista em segurança web. É co-fundador do Web Application Security Consortium (WASC), foi escolhido pela InfoWorld um dos Top 25 CTOs em 2007 e é frequentemente citado em publicações técnicas ou de negócios. Publicou dezenas de artigos, foi o descobridor de várias técnicas avançadas de ataque e defesa e é co-autor do livro &amp;quot;XSS Attacks: Cross Site Scripting Exploits and Defense.&amp;quot; Grossman é também um blogueiro influente que oferece idéias e encoraja um dálogo franco sobre pesquisas e tedências da segurança na web. Antes da WhiteHat, Grossman foi um &amp;quot;information security officer&amp;quot; no Yahoo! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Palestras Convidadas ====&lt;br /&gt;
&lt;br /&gt;
== Samy Kamkar==&lt;br /&gt;
&lt;br /&gt;
''Title:'' '''How I Met Your Girlfriend: The discovery and execution of entirely new classes of Web attacks in order to meet your girlfriend.'''&lt;br /&gt;
&lt;br /&gt;
''Summary:'' &lt;br /&gt;
This includes entertaining and newly discovered attacks including PHP session&lt;br /&gt;
prediction and random numbers (accurately guessing PHP session cookies),&lt;br /&gt;
browser protocol confusion (turning a browser into an SMTP server), firewall and&lt;br /&gt;
NAT penetration via Javascript (turning your router against you), remote iPhone&lt;br /&gt;
Google Maps hijacking (iPhone penetration combined with HTTP man-in-themiddle),&lt;br /&gt;
extracting extremely accurate geolocation information from a Web browser&lt;br /&gt;
(not using IP geolocation), and more.&lt;br /&gt;
&lt;br /&gt;
''Bio:''&lt;br /&gt;
Samy Kamkar is best known for the Samy worm, the first XSS worm,&lt;br /&gt;
infecting over one million users on MySpace in less than 24 hours. A cofounder&lt;br /&gt;
of Fonality, Inc., an IP PBX company, Samy previously led the&lt;br /&gt;
development of all top-level domain name server software and systems for&lt;br /&gt;
Global Domains International (.ws).&lt;br /&gt;
&lt;br /&gt;
In the past 10 years, Samy has focused on evolutionary and genetic&lt;br /&gt;
algorithmic software development, Voice over IP software development,&lt;br /&gt;
automated security and vulnerability research in network security, reverse&lt;br /&gt;
engineering, and network gaming. When not strapped behind the Matrix,&lt;br /&gt;
Samy can be found stunt driving and getting involved in local community&lt;br /&gt;
service projects.&lt;br /&gt;
&lt;br /&gt;
== Mano Paul ==&lt;br /&gt;
&lt;br /&gt;
''Title:'' '''TBD.''' &lt;br /&gt;
&lt;br /&gt;
''Bio:''&lt;br /&gt;
Manoranjan (Mano) Paul is the Software Assurance Advisor for (ISC)2. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. He founded and serves as the CEO &amp;amp; President of Express Certifications. He also founded SecuRisk Solutions, a company that specializes in security product development and consulting. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Agenda  ====&lt;br /&gt;
&lt;br /&gt;
== Programa da Conferência - Dia 1 - 18 de novembro de 2010 ==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:30 - 09:00 &lt;br /&gt;
| bgcolor=&amp;quot;#8595c2&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Recepção'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 - 09:20 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Cerimônia de Abertura'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 09:20 - 10:30 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Dinis Cruz'''&amp;lt;br&amp;gt; Sobre o OWASP&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 - 10:50 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Intervalo'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;49&amp;quot; align=&amp;quot;right&amp;quot; | 10:50 - 12:20 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Robert 'RSnake' Hansen'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:20 - 14:00 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Almoço'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;47&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 - 14:50 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD&amp;lt;br&amp;gt;''' TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;32&amp;quot; align=&amp;quot;right&amp;quot; | 14:50 - 15:40 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD&amp;lt;br&amp;gt;''' TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 15:40 - 16:00 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Intervalo'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;47&amp;quot; align=&amp;quot;right&amp;quot; | 16:00 - 16:50 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD&amp;lt;br&amp;gt;''' TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;32&amp;quot; align=&amp;quot;right&amp;quot; | 16:50 - 17:40 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD&amp;lt;br&amp;gt;''' TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;47&amp;quot; align=&amp;quot;right&amp;quot; | 17:40 - 18:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Convidado'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 18:30 - 18:35 &lt;br /&gt;
| bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Encerramento do primeiro dia'''&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Programa da Conferência - Dia 2 - 19 de novembro de 2010 ==&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| width=&amp;quot;80%&amp;quot; class=&amp;quot;t&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 08:30 - 09:00 &lt;br /&gt;
| bgcolor=&amp;quot;#8595c2&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Recepção'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;32&amp;quot; align=&amp;quot;right&amp;quot; | 09:00 - 10:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Jeremiah Grossman'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 - 10:50 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Intervalo'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;47&amp;quot; align=&amp;quot;right&amp;quot; | 10:30 - 11:40 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;32&amp;quot; align=&amp;quot;right&amp;quot; | 11:40 - 12:30 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 12:30 - 14:00 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Almoço'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;32&amp;quot; align=&amp;quot;right&amp;quot; | 14:00 - 14:50 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Convidado'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;32&amp;quot; align=&amp;quot;right&amp;quot; | 14:50 - 15:40 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;32&amp;quot; align=&amp;quot;right&amp;quot; | 15:40 - 16:10 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Cel. Monclaro'''&amp;lt;br&amp;gt; Apresentação da RENASIC&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 16:10 - 16:30 &lt;br /&gt;
| bgcolor=&amp;quot;#d98b66&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Intervalo'''&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;32&amp;quot; align=&amp;quot;right&amp;quot; | 16:30 - 17:20 &lt;br /&gt;
| bgcolor=&amp;quot;#b9c2dc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;32&amp;quot; align=&amp;quot;right&amp;quot; | 15:40 - 16:10 &lt;br /&gt;
| bgcolor=&amp;quot;#eeeeee&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''TBD'''&amp;lt;br&amp;gt; TBD&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;14%&amp;quot; height=&amp;quot;17&amp;quot; align=&amp;quot;right&amp;quot; | 18:10 - 18:30 &lt;br /&gt;
| bgcolor=&amp;quot;#cccccc&amp;quot; align=&amp;quot;CENTER&amp;quot; | '''Encerramento'''&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Treinamentos ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Aspect logo.png]]&lt;br /&gt;
&lt;br /&gt;
== '''Codificação Segura em Aplicações J2EE''' ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Jasonli appsecBR2010.jpg|frame]] &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;color: rgb(255, 0, 0);&amp;quot;&amp;gt; Atenção: Este treinamento será ministrado em inglês SEM tradução simultânea. &amp;lt;/span&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
'''Data e horário: 16 e 17 de Novembro (9 às 18 horas)'''&amp;lt;br&amp;gt; '''Instrutor: Jason Li'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Resumo'''&amp;lt;br&amp;gt; A capacitação de desenvolvedores nas práticas de programação segura oferece o mais alto retorno de investimento em meio a todo o orçamento de segurança, através da eliminação de vulnerabilidades diretamente no código. O curso Aspectos de Programação Segura JAVA EE faz crescer a noção de questões relativas segurança de aplicações em meio aos desenvolvedores e fornece exemplos de “o que fazer” e “o que não fazer”. O curso é ministrado por um desenvolvedor experiente e apresentado de maneira bastante interativa. Este curso inclui exercícios “mão-na-massa” onde os alunos são chamados a executar análises e testes de segurança em uma aplicação Web Java EE real. Este ambiente especialmente planejado inclui falhas intencionais as quais os alunos deverão encontrar, diagnosticar e corrigir. O curso também faz uso de exercícios de programação Java EE, de forma a fornecer aos alunos uma experiência realista e “mão-na-massa” de desenvolvimento seguro. Os alunos obtêm essa experiência “mão-na-massa” usando ferramentas de teste de segurança de aplicações Web, disponíveis gratuitamente, de forma a buscar e diagnosticar falhas e aprender a evitá-las em seu próprio código.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Público Alvo'''&amp;lt;br&amp;gt; O publico esperado para este curso é composto por desenvolvedores de aplicações JAVA EE e por testadores que possuam conhecimentos de programação. &lt;br /&gt;
&lt;br /&gt;
'''Objetivos de Aprendizado'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
O objetivo maior do curso é assegurar que os desenvolvedores são capazes de projetar, construir e testar aplicações seguras Java EE e compreender a importância da segurança no processo.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Tópicos'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*'''Aprendendo os Fundamentos Objetivos do HTTP'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Compreender e ser capaz de empregar as características de segurança&lt;br /&gt;
&lt;br /&gt;
envolvidas no uso do HTTP (e.g., cabeçalhos, cookies, SSL).&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*'''Princípios e Padrões de Projeto'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Compreender e ser capaz de aplicar os princípios de projeto de&lt;br /&gt;
&lt;br /&gt;
segurança de aplicação.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*'''Ameaças'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Ser capaz de identificar e explicar as ameaças comuns à segurança de&lt;br /&gt;
&lt;br /&gt;
aplicações Web (cross-site scripting, SQL injection, ataques de “denial of service”, ataques de &amp;quot;Man-in-the-middle&amp;quot;, etc.) e implementar técnicas para mitigar o risco.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*'''Autenticação e Gerência de Sessão'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Ser capaz de tratar credenciais de forma segura, ao fornecer um leque&lt;br /&gt;
&lt;br /&gt;
completo de suporte a funções de autenticação, incluindo login, troca, esquecimento e recuperação de senha, logout, re-autenticação e expiração de sessão.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*'''Controle de Acesso'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Ser capaz de implementar regras de controle de acesso à interface de&lt;br /&gt;
&lt;br /&gt;
usuário, lógica de negócio e camada de dados.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*'''Validação de Campos'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Ser capaz de reconhecer problemas potenciais na validação de campos,&lt;br /&gt;
&lt;br /&gt;
particularmente problemas de injection e Cross-site Scripting (XSS), e implementar os mecanismos apropriados de validação de campos informados pelo usuário ou obtidos a partir de outras fontes de entrada.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*'''Injeção de Comandos'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Compreender os perigos da injeção de comandos e as técnicas para&lt;br /&gt;
&lt;br /&gt;
evitar a introdução deste tipo de vulnerabilidade.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*'''Tratamento de Erros'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Ser capaz de implementar um tratamento consistente de erros (exceções)&lt;br /&gt;
&lt;br /&gt;
e um esquema de log para a aplicação Web como um todo.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*'''Criptografia'''&amp;lt;br&amp;gt; &lt;br /&gt;
**Aprender em quais situações de deve aplicar técnicas de criptografia e&lt;br /&gt;
&lt;br /&gt;
ser capaz de escolher algoritmos, usar criptografia/decriptografia e funções de hash de forma segura.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''O Instrutor'''&amp;lt;br&amp;gt; Jason é um instrutor notável, tendo comandado cinco diferentes cursos no período de um ano para nossos principais e diversos clientes de longa data. A base de clientes inclui uma grande instituição financeira, diversas empresas líderes do ramo de encomendas e logística e um líder na integração de sistemas governamentais.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Jason também já ministrou os cursos Testando a Segurança de Aplicações Web Anvançado e Construindo Aplicações Web Seguras na conferência OWASP 2008, na Bélgica e Índia.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Elogios comuns encontrados nas avaliações dos cursos de Jason incluem '''“Este é provavelmente um dos''' cursos mais importantes aos quais já fui exposto aqui”'''e '''“Um dos melhores instrutores que já tive. Um conhecimento efetivo do assunto. Manteve a turma interessada através do compartilhamento de exemplos pessoais reais os quais descreveram bons cenários”'''.&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Utilizando a API de segurança OWASP ESAPI (Enterprise Security API) para prover segurança em aplicações Web ==&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;color: rgb(255, 0, 0);&amp;quot;&amp;gt; Treinamento em português. &amp;lt;/span&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
'''Data e horário: 16 de Novembro (9 às 18 horas)'''&amp;lt;br&amp;gt; '''Instrutor: Tarcizio Vieira Neto'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Resumo'''&lt;br /&gt;
&lt;br /&gt;
A evolução da tecnologia no desenvolvimento de aplicações WEB tem contribuído com o aumento significativo do uso dessa tecnologia para atender os mais diversificados propósitos. Porém, essa tecnologia está sujeita a vulnerabilidades de segurança críticas, principalmente quando pesquisas recentes apontam que a maioria das vulnerabilidades estão presentes na própria aplicação. A biblioteca ESAPI (Enterprise Security API), da OWASP, surge neste cenário como uma biblioteca de segurança open source disponível para diversas linguagens, como Java EE, PHP, .NET, ASP Clássico, Python, Ruby, entre outras. O minicurso abordada as vulnerabilidades causadas por erros comuns no desenvolvimento de aplicações e os mecanismos de controle de segurança providos pela biblioteca ESAPI com o foco na tecnologia Java. Os princípios &lt;br /&gt;
gerais aprendidos no curso podem ser aplicados no contexto das demais linguagens de programação.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Público Alvo'''&lt;br /&gt;
&lt;br /&gt;
O perfil desejado de audiência são pessoas ligadas à área de desenvolvimento e segurança de &lt;br /&gt;
aplicações   Web,   tendo   como   pré-requisito   conhecimentos   básicos   em   tecnologias   Web, &lt;br /&gt;
protocolos de comunicação HTTP e HTTPs, princípios básicos de segurança: criptografia, hash e assinatura digital, &lt;br /&gt;
programação Java para sistemas Web.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Objetivos de Aprendizado'''&lt;br /&gt;
&lt;br /&gt;
* Conhecer as principais vulnerabilidades de segurança comumente encontradas em aplicações Web.&lt;br /&gt;
* Apresentar a arquitetura da biblioteca ESAPI e o funcionamento de seus módulos com exemplos em código Java associados.&lt;br /&gt;
* Apresentar o componente Web Application Firewall da ESAPI.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Tópicos'''&lt;br /&gt;
&lt;br /&gt;
# Introdução&lt;br /&gt;
## Mitos relacionados à segurança em Aplicações Web&lt;br /&gt;
## Projeto OWASP&lt;br /&gt;
# OWASP Top 10&lt;br /&gt;
# Biblioteca OWASP ESAPI&lt;br /&gt;
## Módulo de Validação e Codificação&lt;br /&gt;
## Módulo de Autenticação&lt;br /&gt;
## Módulo de Controle de Acesso&lt;br /&gt;
## Módulo de utilitários HTTP&lt;br /&gt;
## Módulo de tratamento de referência de acesso&lt;br /&gt;
## Módulo de Criptografia&lt;br /&gt;
## Módulo de Log&lt;br /&gt;
## Módulo de Detecção de Intrusão&lt;br /&gt;
## Integrando o módulo AppSensor com a ESAPI&lt;br /&gt;
## Utilizando Filtros&lt;br /&gt;
## Configurando a ESAPI&lt;br /&gt;
## Módulo Web Application Firewall da ESAPI&lt;br /&gt;
# Vantagens do Uso da Biblioteca ESAPI&lt;br /&gt;
# Conclusões&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''O Instrutor'''&lt;br /&gt;
&lt;br /&gt;
Tarcizio Vieira Neto é graduado em Ciência da Computação pela Universidade Federal de &lt;br /&gt;
Goiás (UFG), em Goiânia. Começou a carreira de desenvolvedor como estagiário em   um projeto de iniciação tecnológica financiado pelo CNPq na empresa Estratégia, em Goiânia. Após concluir a graduação trabalhou por seis meses na empresa Fibonacci  Soluções Ageis, na mesma cidade, no cargo de analista de desenvolvimento. Em seguida trabalhou por dois anos e oito meses na Força Aérea Brasileira como oficial &lt;br /&gt;
analista de sistemas do quadro complementar no Centro de Computação da Aeronáutica &lt;br /&gt;
de Brasília, onde adquiriu experiência com a tecnologias de certificação digital e colaborou no &lt;br /&gt;
desenvolvimento de um sistema corporativo de gestão eletrônica de documentos. &lt;br /&gt;
&lt;br /&gt;
Atualmente trabalha no SERPRO desde novembro de 2009 como Analista de Desenvolvimento, na Coordenação Estratégica de Tecnologia – CETEC, desenvolvendo trabalhos sobre o tema segurança no desenvolvimento de software, desde novembro de 2009, onde dedica-se prioritariamente na elaboração de guias que padronizam técnicas e ferramentas que dão suporte à segurança no desenvolvimento de aplicações Web. &lt;br /&gt;
Está cursando o curso de especialização em segurança da informação pela Universidade &lt;br /&gt;
de Brasília (UnB) e possui ao todo &lt;br /&gt;
mais de 5 anos de experiência com programação em Java.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The Art and Science of Threat Modeling Web Applications==&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;color: rgb(255, 0, 0);&amp;quot;&amp;gt; Atenção: Este treinamento será ministrado em inglês SEM tradução simultânea. &amp;lt;/span&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
'''Data e horário: 17 de Novembro (9 às 18 horas)'''&amp;lt;br&amp;gt; '''Instrutor: Mano Paul'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Resumo'''&lt;br /&gt;
&lt;br /&gt;
To secure your home, you will first need to know how the thief could possibly enter and exit and where you should store your valuables. The same is true of your web applications. Unless you know what the vulnerabilities and threats of your web applications are, and what security measures you should take to protect them, ev1L h@x0rS or the enemy within (insider) could take advantage of the vulnerabilities. &lt;br /&gt;
Threat Modeling is a technique that you can use to identify ATVS (attacks, threats, vulnerabilities and safeguards) that could affect your web applications. Threat Modeling helps in designing your application securely from a confidentiality, integrity, availability, authentication, authorization and auditing perspective. It is an essential activity to be undertaken during the design stage of your SDLC and helps mitigate and minimize overall risk. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Público Alvo'''&lt;br /&gt;
&lt;br /&gt;
O público alvo é composto por pessoal técnico e gerencial de organizações de desenvolvimento de sistemas, sem requisitos de conhecimento de linguagens ou metodologias de propogamação especificos.&lt;br /&gt;
&lt;br /&gt;
'''Objetivos de Aprendizado'''&lt;br /&gt;
&lt;br /&gt;
# Understand Threat Modeling; when to threat model and when not too&lt;br /&gt;
# Translation of threats to risks for the organization&lt;br /&gt;
# Have fun learning complex concepts with exercises and interactive games&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Tópicos'''&lt;br /&gt;
&lt;br /&gt;
Introduction &lt;br /&gt;
# Why Threat Model? &lt;br /&gt;
# Is Threat Modeling Right for You? &lt;br /&gt;
# Challenges &lt;br /&gt;
# Precursors &lt;br /&gt;
# Data Classification and Threat Modeling &lt;br /&gt;
# Web Application Security Mechanisms &lt;br /&gt;
# Benefits of Threat Modeling &lt;br /&gt;
# Common Glossary of Terms &lt;br /&gt;
# Threat Agents &lt;br /&gt;
# OWASP Top 10 and common application attacks&lt;br /&gt;
# Threat Modeling Process &lt;br /&gt;
# Attack Trees &lt;br /&gt;
# Threat and Risk Frameworks e.g., STRIDE and DREAD &lt;br /&gt;
# Threat to Risk translation&lt;br /&gt;
# Threat Modeling (Hands-On Exercise)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''O Instrutor'''&lt;br /&gt;
&lt;br /&gt;
Manoranjan (Mano) Paul is the Software Assurance Advisor for (ISC)2. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. He founded and serves as the CEO &amp;amp; President of Express Certifications. He also founded SecuRisk Solutions, a company that specializes in security product development and consulting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Segurança em Arquitetura Orientada a Serviço==&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;color: rgb(255, 0, 0);&amp;quot;&amp;gt; Treinamento em português. &amp;lt;/span&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
'''Data e horário: 17 de Novembro (9 às 18 horas)'''&amp;lt;br&amp;gt; '''Instrutores: Douglas Rodrigues, Julio Cesar Estrella e Nuno Manuel dos Santos Antunes'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Resumo'''&lt;br /&gt;
&lt;br /&gt;
Web services são a pedra angular de Arquiteturas Orientadas a Serviços (SOA). Como&lt;br /&gt;
componentes críticos de negócios, Web Services devem apresentar alta segurança. No&lt;br /&gt;
entanto, a implantação de Web Services seguros é uma tarefa complexa. De fato, diversos&lt;br /&gt;
estudos mostram que um grande número de Web Services são implantados com falhas de&lt;br /&gt;
segurança que vão desde vulnerabilidades de código (por exemplo, vulnerabilidades que&lt;br /&gt;
permitem a injeção de código, incluindo SQL Injection e XPath Injection) até a utilização&lt;br /&gt;
incorreta das normas e protocolos de segurança. O objetivo desse minicurso é o de apresentar&lt;br /&gt;
de forma teórica e prática ferramentas que permitem a detecção de vulnerabilidades e&lt;br /&gt;
mecanismos e protocolos de segurança contra ataques.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Público Alvo'''&lt;br /&gt;
&lt;br /&gt;
O público alvo é composto por pessoal técnico e operacional de organizações de desenvolvimento de sistemas, com requisitos de conhecimento de linguagens ou metodologias de propogamação especificos em nível intermediário.&lt;br /&gt;
&lt;br /&gt;
'''Objetivos de Aprendizado'''&lt;br /&gt;
&lt;br /&gt;
O minicurso proposto contribui para agregar novas tendências tecnológicas. O tema é bastante&lt;br /&gt;
interessante no tocante aos grandes desafios da pesquisa em computação, uma vez que se&lt;br /&gt;
insere de forma natural dentro do desenvolvimento tecnológico de qualidade, englobando por&lt;br /&gt;
sua vez, sistemas disponíveis, corretos, seguros, escaláveis, persistentes e ubíquos, além de&lt;br /&gt;
notoriamente, observando-se as conferências da área, que SOA, Web Services e segurança&lt;br /&gt;
constituem tema de crescente investigação na área de computação, pois é atual e de interesse&lt;br /&gt;
da comunidade acadêmica, bem como de profissionais que atuam amplamente no mercado de&lt;br /&gt;
trabalho. O interesse por SOA tem crescido nos últimos anos por se tratar de uma abordagem&lt;br /&gt;
que ajuda os sistemas a permanecerem escaláveis e flexíveis enquanto crescem, e que&lt;br /&gt;
também pode auxiliar a resolver a lacuna negócio/TI. Os estudantes e profissionais da área&lt;br /&gt;
terão a oportunidade de compreender os princípios básicos de detecção de vulnerabilidade em&lt;br /&gt;
nível de código e também a detecção de ataques por meio de protocolos e mecanismos. A&lt;br /&gt;
idéia é que os participantes possam utilizar o breve conhecimento adquirido neste minicurso&lt;br /&gt;
para o desenvolvimento de aplicações distribuídas usando Web Services seguros e obterem&lt;br /&gt;
conhecimento necessário para diagnosticar e prevenir ataques a esse tipo de aplicação.&lt;br /&gt;
&lt;br /&gt;
'''Tópicos'''&lt;br /&gt;
&lt;br /&gt;
# PADRÕES E PROTOCOLOS DE SEGURANÇA PAR WEB SERVICES&lt;br /&gt;
# ATAQUES EM WEB SERVICES&lt;br /&gt;
## Ataques de Negação de Serviço (Denial of Service)&lt;br /&gt;
## Ataques de Força Bruta (Brute force)&lt;br /&gt;
## Ataques Spoofing&lt;br /&gt;
## Ataques de Inundação (Flooding)&lt;br /&gt;
## Ataques por Injeção&lt;br /&gt;
# AVALIANDO SEGURANÇA EM WEB SERVICES&lt;br /&gt;
## Estudo de campo sobre segurança em Web Services&lt;br /&gt;
## Análise “White-box”&lt;br /&gt;
## Teste “Black-box”&lt;br /&gt;
## Teste “Gray-box”&lt;br /&gt;
## Estudo de campo sobre a eficácia de ferramentas de avaliação de segurança&lt;br /&gt;
&lt;br /&gt;
'''O Instrutor'''&lt;br /&gt;
&lt;br /&gt;
Júlio Cesar Estrella - Cursou Mestrado em Ciência da Computação e Matemática&lt;br /&gt;
Computacional, na área de Sistemas Distribuídos (Instituto de Ciências Matemáticas e&lt;br /&gt;
de Computação ICMC / Universidade de São Paulo – USP). Durante o Mestrado,&lt;br /&gt;
trabalho com simulação de redes de filas em um projeto relacionado ao&lt;br /&gt;
desenvolvimento de técnicas de negociação em modelos de servidores web com&lt;br /&gt;
diferenciação de serviços. Doutor em Ciência da Computação e Matemática&lt;br /&gt;
Computacional (Instituto de Ciências Matemáticas e de Computação ICMC /&lt;br /&gt;
Universidade de São Paulo – USP). O tema do projeto de doutorado versou sobre&lt;br /&gt;
arquiteturas orientadas a serviços com suporte à QoS, bem como caracterização de&lt;br /&gt;
cargas de trabalho para Web Services e Composição de Serviços também com suporte&lt;br /&gt;
à Qualidade de Serviço. Atualmente é professor da Universidade Tecnológica Federal&lt;br /&gt;
do Paraná (UTFPR - Campo Mourão)&lt;br /&gt;
&lt;br /&gt;
Douglas Rodrigues - Mestrando em Ciências de Computação e Matemática&lt;br /&gt;
Computacional pelo Instituto de Ciências Matemáticas e de Computação da&lt;br /&gt;
Universidade de São Paulo - ICMC-USP/São Carlos. Bacharel em Ciência da&lt;br /&gt;
Computação pelo Centro Universitário Eurípides de Marília - UNIVEM - Marília/SP. Atua&lt;br /&gt;
principalmente nos seguintes temas: SOA, Web Services, avaliação de desempenho,&lt;br /&gt;
criptografia e segurança.&lt;br /&gt;
&lt;br /&gt;
Nuno Manuel dos Santos Antunes - frequentou, entre 2003 e 2007, a Licenciatura em&lt;br /&gt;
Engenharia Informática no Departamento de Engenharia Informática da Universidade de&lt;br /&gt;
Coimbra. Desde 2008 que exerce investigação científica no grupo de Software and&lt;br /&gt;
Systems Engineering (SSE) do Centro de Informática e Sistemas da Universidade de&lt;br /&gt;
Coimbra (CISUC), em tópicos relacionados com metodologias e ferramentas para o&lt;br /&gt;
desenvolvimento de Web Services sem vulnerabilidades. Concluiu em 2009 o Mestrado&lt;br /&gt;
em Engenharia Informática no Departamento de Engenharia Informática da&lt;br /&gt;
Universidade de Coimbra, com a classificação final de Muito Bom. Em 2009 iniciou o&lt;br /&gt;
seu Doutoramento em Ciências e Tecnologias da Informação. Publicou 5 artigos&lt;br /&gt;
científicos em conferências com processo de revisão pelos pares rigoroso, incluindo&lt;br /&gt;
artigos nas conferências mais prestigiadas das áreas de confiabilidade e serviços.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Revisões de Segurança de Sistemas ASP.NET nos modos &amp;quot;black box&amp;quot; e &amp;quot;white-box&amp;quot; usando a plataforma OWASP O2==&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;color: rgb(255, 0, 0);&amp;quot;&amp;gt; Este treinamento será ministrado em português usando materiais em inglês. &amp;lt;/span&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
'''Data e horário: 16 de Novembro (9 às 18 horas)'''&amp;lt;br&amp;gt; '''Instrutor: Dinis Cruz'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Resumo'''&lt;br /&gt;
&lt;br /&gt;
This is a hands-on Training course on how to use the OWASP O2 Platform to perform both Black-Box and White-Box security reviews on ASP.NET Web Applications&lt;br /&gt;
&lt;br /&gt;
The course is designed for security consultants/developers who are responsible for performing Penetration Tests or Security Code Reviews. The course will show practical examples of how to use the OWASP O2 Platform to find, exploit and document security vulnerabities.&lt;br /&gt;
&lt;br /&gt;
For the course's labs, a number of test and real-world applications/frameworks will be used. In order to give the students a benign test enviroment which is easy to replicate, the (vulnerable-by-design) HacmeBank ASP.NET banking application will be used throughout the course.&lt;br /&gt;
&lt;br /&gt;
'''Tópicos'''&lt;br /&gt;
&lt;br /&gt;
* What is the OWASP O2 Platform and how to use it?&lt;br /&gt;
* Using O2's Unit Tests for web exploration and browsing&lt;br /&gt;
* Using O2's Unit Tests for web exploitation&lt;br /&gt;
* Understanding and using O2's Web Automation Tools to find and exploit vulnerabilities in HacmeBank (Black-Box)&lt;br /&gt;
* Understanding and using O2's AST .NET Scanner to find vulnerabilities in HacmeBank (White-Box)&lt;br /&gt;
* Connecting the source-code traces with the web exploits to create a unified view of the vulnerabilties&lt;br /&gt;
* Create 'Vulnerability-driven Unit Tests' to be delivered to Developers, QA/Testers and Managers&lt;br /&gt;
* Customizing and writing new APIs (for new or modified frameworks)&lt;br /&gt;
* Using O2 to consume results from open source tools and 3rd party commercial vendors&lt;br /&gt;
* Case Study: Microsoft ASP.NET MVC&lt;br /&gt;
* Case Study: Microsoft Sharpoint&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''O Instrutor'''&lt;br /&gt;
&lt;br /&gt;
The course is delivered by Dinis Cruz who the lead developer of the OWASP O2 Platform and has created and delivered a number of .NET Security training courses&lt;br /&gt;
&lt;br /&gt;
== Local dos treinamentos ==&lt;br /&gt;
&lt;br /&gt;
A conferência será em Campinas, SP, na [http://www.cpqd.com.br Fundação CPQD]. &lt;br /&gt;
&lt;br /&gt;
Veja a localização usando o [http://maps.google.com.br/maps/ms?source=embed&amp;amp;hl=pt-BR&amp;amp;geocode=&amp;amp;ie=UTF8&amp;amp;update=1&amp;amp;t=h&amp;amp;msa=0&amp;amp;msid=104978801628275418750.000462bf2d1a49a7571af&amp;amp;ll=-22.83125,-47.044315&amp;amp;spn=0.03718,0.04034&amp;amp;z=14 Google Maps]&lt;br /&gt;
&lt;br /&gt;
== Como chegar ==&lt;br /&gt;
&lt;br /&gt;
TBD &lt;br /&gt;
&lt;br /&gt;
==== Inscrições  ====&lt;br /&gt;
&lt;br /&gt;
== Inscrições online ==&lt;br /&gt;
&lt;br /&gt;
O formulário de inscrição está disponível em https://creator.zoho.com/lucas.ferreira/appsec/.&lt;br /&gt;
&lt;br /&gt;
== Valores ==&lt;br /&gt;
&lt;br /&gt;
'''Apenas a conferência (dias 18 e 19/11):'''&lt;br /&gt;
&lt;br /&gt;
* Antes de 16 de setembro:  R$ 400,00&lt;br /&gt;
* Antes de 16 de outubro: R$ 500,00&lt;br /&gt;
* Antes de 12 de novembro: R$ 550,00&lt;br /&gt;
* No local: R$ 600,00&lt;br /&gt;
&lt;br /&gt;
As inscrições no local estarão sujeitas à disponibilidade de lugares.&lt;br /&gt;
&lt;br /&gt;
'''Treinamentos'''&lt;br /&gt;
&lt;br /&gt;
* Um dia: R$ 450,00&lt;br /&gt;
* Dois dias: R$ 900,00&lt;br /&gt;
&lt;br /&gt;
'''Descontos'''&lt;br /&gt;
&lt;br /&gt;
* Membro do OWASP: R$ 100,00 (Nota: Este desconto é maior do que a taxa anual de USD 50.00. Confira [http://www.google.com.br/#q=50+usd+in+brl&amp;amp;fp=1 aqui]&lt;br /&gt;
* Estudantes: R$ 100.00 (Nota: Será necessário apresentar comprovante de matrícula).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Organização  ====&lt;br /&gt;
&lt;br /&gt;
== Comitês ==&lt;br /&gt;
&lt;br /&gt;
OWASP Global Conferences Committee Chair: Mark Bristow &lt;br /&gt;
&lt;br /&gt;
Líder do [[Brazilian|Capítulo Brasileiro]]: Wagner Elias &lt;br /&gt;
&lt;br /&gt;
Comissão organizadora do AppSec Brasil 2010 (organizacao2010 at appsecbrasil.org): &lt;br /&gt;
&lt;br /&gt;
*Conference General Chair: Lucas C. Ferreira &lt;br /&gt;
*Tutorials Chair: Eduardo Camargo Neves &lt;br /&gt;
*Tracks Chair: Luiz Otávio Duarte &lt;br /&gt;
*Local Chair: Alexandre Melo Braga&lt;br /&gt;
&lt;br /&gt;
=== Equipe ===&lt;br /&gt;
&lt;br /&gt;
*Alexandre Melo Braga &lt;br /&gt;
*Eduardo Camargo Neves &lt;br /&gt;
*Lucas C. Ferreira &lt;br /&gt;
*Luiz Otávio Duarte &lt;br /&gt;
*Wagner Elias &lt;br /&gt;
*Eduardo Alves Nonato da Silva &lt;br /&gt;
*Leonardo Buonsanti &lt;br /&gt;
*Dinis Cruz &lt;br /&gt;
*Paulo Coimbra&lt;br /&gt;
&lt;br /&gt;
== Comitê de Programa ==&lt;br /&gt;
* Alexandre Braga&lt;br /&gt;
* Carlos Serrao&lt;br /&gt;
* Eduardo alves&lt;br /&gt;
* Fernando Cima&lt;br /&gt;
* Leonardo Buonsanti&lt;br /&gt;
* Lucas Ferreira&lt;br /&gt;
* Luiz Duarte&lt;br /&gt;
* Nelson Uto&lt;br /&gt;
* Rodrigo Rubira&lt;br /&gt;
* Wagner Elias&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hospedagem ====&lt;br /&gt;
&lt;br /&gt;
TBD &lt;br /&gt;
&lt;br /&gt;
==== Links ====&lt;br /&gt;
&lt;br /&gt;
Blog: http://blog.appsecbrasil.org &lt;br /&gt;
&lt;br /&gt;
Twitter: http://twitter.com/owaspappsecbr&lt;br /&gt;
&lt;br /&gt;
== Notícias ==&lt;br /&gt;
&lt;br /&gt;
[http://g1.globo.com/Noticias/Tecnologia/0,,MUL1545935-6174,00-EM+COMPETICAO+DE+SEGURANCA+SAFARI+IE+E+FIREFOX+SAO+HACKEADOS.html Portal G1] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project_-_ModSecurity_2.0.6_-_Assessment&amp;diff=86148</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project - ModSecurity 2.0.6 - Assessment</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project_-_ModSecurity_2.0.6_-_Assessment&amp;diff=86148"/>
				<updated>2010-07-10T23:29:17Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;small&amp;gt;[[:Category:OWASP ModSecurity Core Rule Set Project|Click here to return to project's main page]]&amp;lt;/small&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Stable Release Review of the OWASP ModSecurity Core Rule Set Project - Release ModSecurity 2.0.6 ==&lt;br /&gt;
&lt;br /&gt;
==== Project Leader for this Release ====&lt;br /&gt;
'''''[[User:Rcbarnett|Ryan Barnett]]'s Pre-Assessment Checklist:'''''&lt;br /&gt;
&lt;br /&gt;
{{ Pre-Assessment Questions - Tools&lt;br /&gt;
| 1. Is this release associated with a project containing at least the [[Assessing_Project_Health#Project_Wiki_Page_Minimal_Content|Project Wiki Page Minimum Content]]  information?&lt;br /&gt;
= (answer #1) &lt;br /&gt;
   1. have an up to date project template with current project information? - YES&lt;br /&gt;
   2. have a conference style presentation that describes the tool/document in at least 3 slides? - YES&lt;br /&gt;
   3. have a one sheet overview document about the project? - NO&lt;br /&gt;
   4. have a link to a working mail list? - YES&lt;br /&gt;
   5. have a statement of the application security issue the project addresses? - YES&lt;br /&gt;
   6. have a project roadmap? - YES&lt;br /&gt;
   7. project leaders and main contributors have a wiki account (with its user page containing contact details about the user and if possible his CV) - YES&lt;br /&gt;
&lt;br /&gt;
| 2. Is your tool licensed under an open source license? &lt;br /&gt;
= (answer #2) &lt;br /&gt;
 http://www.gnu.org/licenses/old-licenses/gpl-2.0.html&lt;br /&gt;
&lt;br /&gt;
| 3. Is the source code and any documentation available in an online project repository? &lt;br /&gt;
= (answer #3)&lt;br /&gt;
 http://mod-security.svn.sourceforge.net/viewvc/mod-security/crs/&lt;br /&gt;
&lt;br /&gt;
| 4. Is there working code? &lt;br /&gt;
= (answer #4)&lt;br /&gt;
 http://sourceforge.net/projects/mod-security/files/modsecurity-crs/&lt;br /&gt;
&lt;br /&gt;
| 5. Is there a roadmap for this project release which will take it from Alpha to Stable release? &lt;br /&gt;
= (answer #5)&lt;br /&gt;
 http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project_-_Roadmap&lt;br /&gt;
&lt;br /&gt;
| 6. Are the Alpha pre-assessment items complete?&lt;br /&gt;
= (answer #6)&lt;br /&gt;
 YES&lt;br /&gt;
&lt;br /&gt;
| 7. Is there an installer or stand-alone executable? &lt;br /&gt;
= (answer #7)&lt;br /&gt;
 Not applicable. CRS is not a standalone project that can be installed with an installer.&lt;br /&gt;
&lt;br /&gt;
| 8. Is there user documentation on the OWASP project wiki page? &lt;br /&gt;
= (answer #8)&lt;br /&gt;
 YES&lt;br /&gt;
 http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Installation&lt;br /&gt;
 http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Documentation&lt;br /&gt;
&lt;br /&gt;
| 9. Is there an &amp;quot;About box&amp;quot; or similar help item which lists the following? &lt;br /&gt;
= (answer #9)&lt;br /&gt;
 YES - http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Project_Details&lt;br /&gt;
&lt;br /&gt;
 # Project Name - ModSecurity Core Rule Set (CRS)&lt;br /&gt;
 # Short Description - The Core Rule Set (CRS) provides critical protections against web attacks.  Unlike intrusion detection and prevention systems, which rely on signatures specific to known vulnerabilities, &lt;br /&gt;
                       the CRS is based on generic rules which focus on attack payload identification in order to provide protection from zero day and unknown vulnerabilities often found in web applications, &lt;br /&gt;
                       which are in most cases custom coded. &lt;br /&gt;
 # Project Release Lead and contact information (e.g. email address) - Ryan Barnett ryan.barnett@breach.com&lt;br /&gt;
 # Project Release Contributors (if any) - Brian Rectanus&lt;br /&gt;
 # Project Release License - GNU General Public License - Version 2.0&lt;br /&gt;
 # Project Release Sponsors (if any) - Breach Security Labs&lt;br /&gt;
 # Release status and date assessed as Month-Year (e.g. March 2009) - Not Yet Reviewed by OWASP.  An important point to consider is that the CRS is not the typical OWASP project.  Most projects start out as ideas, then move to documentation&lt;br /&gt;
                                                                      and eventually working code.  The CRS is in the opposite position in that Breach Security Labs developed these rules over the past 3-4 years.  So, we brought a project with&lt;br /&gt;
                                                                      fully working code that is running on thousands of web servers.  The code itself is well tested.  What was lacking was documentation which as since been updated.&lt;br /&gt;
 # Link to OWASP Project Page - http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project&lt;br /&gt;
&lt;br /&gt;
| 10. Is there documentation on how to build the tool from source including obtaining the source from the code repository? &lt;br /&gt;
= (answer #10)&lt;br /&gt;
 Not applicable, as no building is needed.&lt;br /&gt;
&lt;br /&gt;
| 11. Is the tool documentation stored in the same repository as the source code?&lt;br /&gt;
= (answer #11)&lt;br /&gt;
 YES - there is also extensive new documentation/comments inside the files themselves describing the Rule Logic and Reference links.&lt;br /&gt;
&lt;br /&gt;
| 12. Are the Alpha and Beta pre-assessment items complete? &lt;br /&gt;
= (answer #12)&lt;br /&gt;
 YES&lt;br /&gt;
&lt;br /&gt;
| 13. Does the tool include documentation built into the tool? &lt;br /&gt;
= (answer #13) &lt;br /&gt;
 YES - there is also extensive new documentation/comments inside the files themselves describing the Rule Logic and Reference links.&lt;br /&gt;
&lt;br /&gt;
| 14. Does the tool include build scripts to automate builds? &lt;br /&gt;
= (answer #14)&lt;br /&gt;
 Not applicable, as no building is needed.&lt;br /&gt;
&lt;br /&gt;
| 15. Is there a publicly accessible bug tracking system? &lt;br /&gt;
= (answer #15)&lt;br /&gt;
 YES - JIRA Ticket System:&lt;br /&gt;
 https://www.modsecurity.org/tracker/browse/CORERULES &lt;br /&gt;
&lt;br /&gt;
| 16. Have any existing limitations of the tool been documented? &lt;br /&gt;
= (answer #15)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== First Reviewer ====&lt;br /&gt;
'''''[[User:Ivanr|Ivan Ristic]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;Ideally, reviewers should be an existing OWASP project leader or chapter leader.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = Not applicable. ModSecurity rules cannot be installed with an installer.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= Not applicable. The rules do use the SecComponentSignature to identify themselves, which is the closest thing to having an “About box” in these circumstances.&lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= Not applicable. Building is not necessary as the rules are evaluated at runtime.&lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= Not applicable. No building is necessary.&lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= The bug tracking system is very much usable. JIRA is pretty much the best tracking system available. It is hosted elsewhere, but that’s a big plus in this case (because the code is hosted at SourceForge, and its tracking systems are all bad.)&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= Yes. The Core Rules are a substantial piece of work that provides significant security qualities. Nothing similar is available elsewhere. It’s easily the best rule set there is.&lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= I don’t believe anything else is required for a stable release. Of course, the rules can be improved, but that’s a matter of new research.&lt;br /&gt;
There are two areas in which I would like to see improvement:&lt;br /&gt;
• More involvement from the community. For the rules to flourish, there must be a sustained community involvement. Ryan is already very clear about leading the project into this direction (as demonstrated by his messages on the mailing list).&lt;br /&gt;
• Transparency. This is always a difficult goal to achieve with WAF rules. I would like to see clear justification of every rule in the set, explanation of the attack it was designed to handle, and explanation of the way in which it works.&lt;br /&gt;
In talking to Ryan, it is clear that there already are activities under way to address both of the above points.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== Second Reviewer ====&lt;br /&gt;
'''''[[User:Leocavallari|Leonardo Cavallari]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;It is recommended that an OWASP board member or Global Projects Committee member be the second reviewer on Quality releases. The board has the initial option to review the project, followed by the Global Projects Committee.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = There's no need for an installer, just to unpack the package in proper directory. It could have a more detailed explanation about this process on Installation page.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= Yes, except by installation procedure. Although the project is about a rule set that only needs to be unpacked, it's important to have modsecurity installation and basic configuration procedures or, at least, relevant links that point to it, since the project by itself makes no sense without a running ModSecurity installation.&lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= Yes. Users can find latest improvements into CHANGELOG and README files.&lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= There`s no need for this information. &lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= Yes. &lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= (answer #6)&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= (answer #7)&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= (answer #8)&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= (answer #9)&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= (answer #10)&lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= (answer #11)&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= (answer #12)&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= (answer #13)&lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= (answer #14)&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Leocavallari&amp;diff=85150</id>
		<title>User talk:Leocavallari</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Leocavallari&amp;diff=85150"/>
				<updated>2010-06-21T00:21:10Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Leonardo Cavallari Militelli is member of OWASP Global Projects Committee and [[ASDR]] Project Leader.&lt;br /&gt;
&lt;br /&gt;
He holds a Master's Degree from University of São Paulo and SANS GAWN certification.&lt;br /&gt;
&lt;br /&gt;
He is CEO of [http://www.ibliss.com.br iBLISS Segurança &amp;amp; Inteligência]and can be found at leo&amp;lt;dot&amp;gt;cavallari&amp;lt;@&amp;gt;owasp&amp;lt;dot&amp;gt;org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----------------------------------------------------------------------------------------------------------------&lt;br /&gt;
Leonardo Cavallari Militelli é membro do Comitê Global de Projetos da OWASP e Líder do projeto [[ASDR]].&lt;br /&gt;
&lt;br /&gt;
Ele é Mestre em Engenharia pela Poli-USP e possui certificação SANS GAWN.&lt;br /&gt;
&lt;br /&gt;
Ele é CEO da [http://www.ibliss.com.br iBLISS Segurança &amp;amp; Inteligência]e pode ser encontrado em leo&amp;lt;dot&amp;gt;cavallari&amp;lt;@&amp;gt;owasp&amp;lt;dot&amp;gt;org.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Activities ===&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_ASDR_Project|OWASP ASDR Project Leader]]&lt;br /&gt;
&lt;br /&gt;
[[OWASP EU Summit 2008|OWASP EU Summit 2008 Organization Committee]]&lt;br /&gt;
&lt;br /&gt;
[[Brazilian|Project's translation for Brazilian chapter|]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Leocavallari&amp;diff=85149</id>
		<title>User talk:Leocavallari</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Leocavallari&amp;diff=85149"/>
				<updated>2010-06-21T00:19:51Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Leonardo Cavallari Militelli is member of OWASP Global Projects Committee and [[ASDR]] Project Leader.&lt;br /&gt;
&lt;br /&gt;
He holds a Master's Degree from University of São Paulo and SANS GAWN certification.&lt;br /&gt;
&lt;br /&gt;
He is CEO of [http://www.ibliss.com.br iBLISSSegurança &amp;amp; Inteligência] and can be found at leo&amp;lt;dot&amp;gt;cavallari&amp;lt;@&amp;gt;owasp&amp;lt;dot&amp;gt;org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----------------------------------------------------------------------------------------------------------------&lt;br /&gt;
Leonardo Cavallari Militelli é membro do Comitê Global de Projetos da OWASP e Líder do projeto [[ASDR]].&lt;br /&gt;
&lt;br /&gt;
Ele é Mestre em Engenharia pela Poli-USP e possui certificação SANS GAWN.&lt;br /&gt;
&lt;br /&gt;
Ele é CEO da [http://www.ibliss.com.br iBLISSSegurança &amp;amp; Inteligência] e pode ser encontrado em leo&amp;lt;dot&amp;gt;cavallari&amp;lt;@&amp;gt;owasp&amp;lt;dot&amp;gt;org.&lt;br /&gt;
&lt;br /&gt;
=== OWASP Activities ===&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_ASDR_Project|OWASP ASDR Project Leader]]&lt;br /&gt;
[[OWASP EU Summit 2008|OWASP EU Summit 2008 Organization Committee]]&lt;br /&gt;
[[Project's translation for local chapter|Brazilian]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Leocavallari&amp;diff=85148</id>
		<title>User talk:Leocavallari</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Leocavallari&amp;diff=85148"/>
				<updated>2010-06-21T00:17:07Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Leonardo Cavallari Militelli is member of OWASP Global Projects Committee and [[ASDR]] Project Leader.&lt;br /&gt;
&lt;br /&gt;
He holds a Master's Degree from University of São Paulo and SANS GAWN certification.&lt;br /&gt;
&lt;br /&gt;
He is CEO of iBLISS [http://www.ibliss.com.br Segurança &amp;amp; Inteligência] and can be found at leo&amp;lt;dot&amp;gt;cavallari&amp;lt;@&amp;gt;owasp&amp;lt;dot&amp;gt;org&lt;br /&gt;
&lt;br /&gt;
Leonardo Cavallari Militelli é membro do Comitê Global de Projetos([[GPC]]) da OWASP e Líder do projeto [[ASDR]].&lt;br /&gt;
&lt;br /&gt;
=== OWASP Activities ===&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_ASDR_Project|OWASP ASDR Project Leader]]&lt;br /&gt;
[[OWASP EU Summit 2008|OWASP EU Summit 2008 Organization Committee]]&lt;br /&gt;
[[Project's translation for local chapter|Brazilian]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Leocavallari&amp;diff=85147</id>
		<title>User talk:Leocavallari</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Leocavallari&amp;diff=85147"/>
				<updated>2010-06-21T00:16:19Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Leonardo Cavallari Militelli is member of OWASP Global Projects Committee and [[ASDR]] Project Leader.&lt;br /&gt;
He holds a Master's Degree from University of São Paulo and SANS GAWN certification.&lt;br /&gt;
He is CEO of iBLISS [http://www.ibliss.com.br Segurança &amp;amp; Inteligência] and can be found at leo&amp;lt;dot&amp;gt;cavallari&amp;lt;@&amp;gt;owasp&amp;lt;dot&amp;gt;org&lt;br /&gt;
&lt;br /&gt;
Leonardo Cavallari Militelli é membro do Comitê Global de Projetos([[GPC]]) da OWASP e Líder do projeto [[ASDR]].&lt;br /&gt;
&lt;br /&gt;
=== OWASP Activities ===&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_ASDR_Project|OWASP ASDR Project Leader]]&lt;br /&gt;
[[OWASP EU Summit 2008|OWASP EU Summit 2008 Organization Committee]]&lt;br /&gt;
[[Brazilian| Project's translation for local chapter]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Principle_template&amp;diff=83283</id>
		<title>Principle template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Principle_template&amp;diff=83283"/>
				<updated>2010-05-10T17:15:39Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Every '''[[Principle]]''' should follow this template.&lt;br /&gt;
&lt;br /&gt;
{{Template:Principle}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
A principle is a simple rule that helps to guide security decisions in complex situations.&lt;br /&gt;
# Start with a one-sentence description of the principle&lt;br /&gt;
# Describe the principle and how it should be applied to security decisions&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
===Short example name===&lt;br /&gt;
: A short example description, small picture, or sample code with [http://www.site.com links]&lt;br /&gt;
&lt;br /&gt;
===Short example name===&lt;br /&gt;
: A short example description, small picture, or sample code with [http://www.site.com links]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[Vulnerability 1]]&lt;br /&gt;
* [[Vulnerabiltiy 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
* [[Controls 1]]&lt;br /&gt;
* [[Controls 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
* http://www.link1.com&lt;br /&gt;
* [http://www.link2.com Title for the link2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Attack&amp;diff=83273</id>
		<title>Template:Attack</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Attack&amp;diff=83273"/>
				<updated>2010-05-10T17:00:21Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;:''This is an '''[[:Category:Attack|Attack]]'''. To view all attacks, please see the [[:Category:Attack|Attack Category]] page. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Education_Presentation&amp;diff=74975</id>
		<title>OWASP Education Presentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Education_Presentation&amp;diff=74975"/>
				<updated>2009-12-08T19:03:17Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: /* OWASP Education Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page provide a commented overview of the OWASP presentations available.&amp;lt;br&amp;gt;&lt;br /&gt;
Please use the last line of the tables as template.&amp;lt;br&amp;gt;&lt;br /&gt;
Presentions can be tracked through:&lt;br /&gt;
* the [http://www.owasp.org/index.php/Category:OWASP_Presentations OWASP Presentations Category]&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference Past OWASP Conference agenda's]&lt;br /&gt;
* From the chapter pages&lt;br /&gt;
Everybody is encouraged to link the presentations and add their findings on this page !&lt;br /&gt;
There are currently hundreds of presentations all over the OWASP web site. &lt;br /&gt;
If you search google with “site:owasp.org filetype:ppt” there are 166 hits. “site:owasp.org filetype:pdf” returns 76.&lt;br /&gt;
Feel free to “mine” them and add them to the overview.&lt;br /&gt;
&lt;br /&gt;
== OWASP Education Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Education Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Overview Winter 2009v1.pptx|OWASP Overview Winter 2009]]|| Updated overview of OWASP || Novice || 2009-12-08&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Programa_de_Educacion_OWASP.ppt|Programa de Educacion OWASP]]|| Una introduccion a OWASP para Universidades y Centros Educativos por Fabio Cerullo|| Novice || 2009-03-20&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_Educational_Programme.ppt|OWASP Educational Programme]]|| An introduction to OWASP for Universities &amp;amp; Educational Institutions by Fabio Cerullo|| Novice || 2009-03-20&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Overview Summer 2009.pptx|OWASP Overview Summer 2009]]|| Recent overview of OWASP by Jeff Williams || Novice || 2009-08-25&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Why WebAppSec Matters.ppt|Why WebAppSec Matters]]|| This module explains why security should be considered when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP-Intro-2008-portuguese.ppt|OWASP Intro 2008 Portuguese]]|| Este módulo é uma intrudução sobre o projeto OWASP. || Novice || 2008-07-06&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module OWASP Top 10 Introduction and Remedies.ppt|OWASP Top 10 Introduction and Remedies]]|| This module explains the OWASP Top 10 web application vulnerabilities as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Embed within SDLC.ppt|Embed within SDLC]]|| This module explains the complete approach of Web Application Security when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Good Secure Development Practices.ppt|Good Secure Development Practices]]|| This module explains some good secure development practices when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Testing for Vulnerabilities.ppt|Testing for Vulnerabilities]]|| This module explains application security testing when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Good WebAppSec Resources.ppt|Good WebAppSec Resources]]|| This module points you to some good web application security resources when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Example (include link) || Fill in your comments || Novice/Intermediate/Expert || yyyy-mm-dd&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Project Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Germany 2008 Conference OWASP Introduction v1.pptx|OWASP Introduction]] || OWASP Overview presentation covering OWASP, project parade and OWASP near you. Given by Seba during the Germany 2008 Conference || Novice || 2008-11-25&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Foundation The story so far and beyond - Part 1.ppt|India08 Keynote - Part 1]] || OWASP Overview presentation. Part 1 of 2. Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Foundation The story so far and beyond - Part 2.ppt|India08 Keynote - Part 2]] || OWASP Overview presentation. Part 2 of 2. Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP India - Tour of OWASP projects.ppt|Tour of OWASP’s projects]] || Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://www.owasp.org/images/5/59/RISK_2008_OWASP_Introduction_v1.pptx OWASP @ RISK08 (Norway)] || OWASP introduction at Norway RISK2008 conference by Seba || Novice || 2008-04-23&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP NY Keynote.ppt|OWASP NY Keynote by Jeff]] also available in [[:Image:20070620-FR-OWASP NY Keynote.ppt|French]]|| OWASP Overview presentation with slide &amp;quot;OWASP by the numbers&amp;quot; and slide with the sorry state of Tools (at best 45%) which caused some controverse || Novice || 2007-06-12&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/a/af/OWASP_Testing_Guide_Presentation.zip The OWASP Testing Guide (Jeff Williams)] || Overview of the OWASP Testing Guide || Novice || 2007-01-23&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/e/e9/OWASP_Testing_Guide_Presentation_EUSecWest07.zip The OWASP Testing Guide v2 EUSecWest07 (Matteo Meucci, Alberto Revelli)] || Presentation at EUSecWest07 || Intermediate || 2007-03-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/3c/OWASP_Flyer_Sep06.ppt OWASP Project Overview] || High level overview of projects and how OWASP works || Novice || 2006-09-19 &lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/4/49/OWASPAppSec2006Seattle_Security_Metrics.ppt The OWASP Application Security Metrics Project (Bob Austin)] || Presentation on the Application Security Metrics project || Novice || 2006-10-17&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/5/53/OWASPAppSecEU2006_CLASP_Project.ppt OWASP CLASP Project (Pravir Chandra)] || OWASP CLASP project presentation given at the 2006 European AppSec conference || Novice || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/30/OWASPAppSec2006Seattle_UsingSprajaxToTestAJAXSecurity.ppt Sprajax (Dan Cornell)] || OWASP Sprajax presentation given at the 2006 Seattle AppSec conference || Intermediate || 2006-10-17&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Example (include link) || Fill in your comments || Novice/Intermediate/Expert || yyyy-mm-dd&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Conference Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Conference Presentations &lt;br /&gt;
!width=&amp;quot;30%&amp;quot; | Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; | Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; | Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan ModSecurityCoreRuleSet.ppt | Mod Security Core Rule Set (Ofer Shezaf)]] ||Ofer Shezaf's presentation on the Core Ruleset for the latest version of ModSecurity presented at 6th OWASP AppSec conference in Milan, Italy, in May 2007.|| Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OWASPTestingGuide2v1.ppt | OWASP Testing Guide v2.1 (Matteo Meucci)]] ||Matteo Meucci's presentation on the OWASP Testing Guide v2 at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan CLASP.ppt | CLASP (Pravir Chandra)]] ||Pravir Chandra's presentation on the upcoming 2007 update to CLASP presented at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan AdvancedWebHacking.ppt | Advanced Web Hacking (PDP)]] ||PDPs presentation at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan XMLSecurityGatewayEvalCriteria.ppt | XML Security Gateway Evaluation Criteria (Gunnar Peterson)]] ||Gunnar Peterson's presentation about the new XML Security Gateway Evaluation Criteria project at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan TestingFlashApplications.ppt | Testing Flash Applications (Stephano Di Paolo)]] ||Stephano Di Paolo's presentation on how to test Flash applications presented at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert|| 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OvertakingGoogleDesktop.ppt | Overtaking Google Desktop (Yair Amit)]] ||Yair Amit's presentation on XSS Flaws in Google Desktop that can be exploited through google.com presented at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan MS ACETeamAppSecfromTheCore.ppt | ACE Team Application Security from the Core (Simon Roses Femerling)]] ||Simon Roses Femerling's presentation on the Microsoft ACE team's application security process at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan Pantera.ppt | Pantera (Simon Roses Femerling)]] ||Simon Roses Femerling's presentation on the new OWASP tool Pantera at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan ProtectingWebAppsfromUniversalPDFXSS.ppt | Protecting Web applications from universal PDF XSS (Ivan Ristic)]] ||Ivan Ristic's Universal XSS PDF presentation at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SoftwareSecurity.ppt | Software Security (Rudolph Araujo)]] ||Rudolph Araujo's presentation on Application Security best practices at the 6th OWASP AppSec conference in Milan Italy, May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan WebGoatv5.ppt | WebGoat v5 (Dave Wichers)]] ||WebGoat v5 presentation by Dave Wichers at the 6th OWASP AppSec Conference in Milan, Italy, May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan WebScarabNG.ppt | WebScarab NG (Dave Wichers)]] ||Description of the new WebScarab-NG efforts presented by Dave Wichers at the 6th OWASP AppSec conference in Milan, Italy in May 2007.|| Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SANS SPSA Initiative.ppt | SANS SPSA Initiative (Dave Wichers)]] ||Description of the SANS Secure Coding Exam Initiative presented by Dave Wichers at the 6th OWASP AppSec conference in Milan Italy, May 2007.|| Novice || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OWASPItalyActivities.ppt | OWASP Italy Activities (Raoul Chiesa)]] ||Raoul Chiesa's keynote for day 2 of the 6th OWASP AppSec conference on the state of application security in Italy including OWASP's activities in that country.|| Novice || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SecurityEngineeringInVista.ppt | Security engineering in Vista (Alex Lucas)]] ||Alex Lucas' from Microsoft's keynote presentation for Day 1 of the 6th OWASP AppSec conference in Milan on the benefits of Microsoft's SDL to the security of Vista. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/5/5f/OWASPAppSec2006Seattle_SecurityEngineeringInVista.ppt How the Security Development Lifecycle(SDL) Improved Windows Vista (Michael Howard)] || Michael Howard's talk on SDL from the OWASP Seattle AppSec Conference in 2006 || Intermediate || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/34/OWASPAppSecEU2006_Bootstrapping_the_Application_Assurance_Process.ppt Bootstrapping the Application Assurance Process (Sebastien Deleersnyder)] || Presentation given during the European 2006 AppSec conference on the application assurance process || Novice || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/8/8b/OWASPAppSecEU2006_InlineApproachforSecureSOAPRequests.ppt Inline Approach for Secure SOAP Requests and Early Validation (Mohammad Ashiqur Rahaman, Maartin Rits and Andreas Schaad SAP Research, Sophia Antipolis, France)] || Presentation given at the European 2006 AppSec conference about security and soap message structure issues || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/9/9c/OWASPAppSecEU2006_WAFs_WhenAreTheyUseful.ppt Web Application Firewalls:When Are They Useful? (Ivan Ristic)] || Presentation about Web Application Firewalls || Novice || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/1/1a/OWASPAppSecEU2006_HTTPMessageSplittingSmugglingEtc.ppt HTTP Message Splitting, Smuggling and Other Animals (Amit Klein)] || A presentation about Message splitting other attacks around the HTTP protocol || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f6/OWASPAppSec2006Seattle_WebAppForensics.ppt Web Application Incident Response &amp;amp; Forensics: A Whole New Ball Game! (Rohyt Belani &amp;amp; Chuck Willis)] || Talk about Web Application Security incident handling and forensics given at the OWASP 2006 Seattle AppSec conference || Intermediate || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/d/d2/OWASPAppSecEU2006_CanTestingToolsReallyFindOWASPTop10.ppt Can (Automated) Testing Tools Really Find the OWASP Top 10? (Erwin Geirnaert) ] || A talk about how automated testing tools stack up against the OWASP top 10 || Intermediate || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/2/28/OWASPAppSecEU2006_RequestRodeo.ppt RequestRodeo: Client Side Protection against Session Riding (Martin Johns / Justus Winter)] || Presentation given about how Sessions can be hi-jacked, etc... || Novice  || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/6/62/OWASPAppSecEU2006_SecurityTestingthruAutomatedSWTests.ppt Security Testing through Automated Software Tests (Stephen de Vries)] || Presentation given at the 2006 EuSec conference || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/0/0e/AppSec2005DC-Jeremy_Poteet-In_the_Line_of_Fire.ppt In the Line of Fire: Defending Highly Visible Targets (Jeremy Poteet)] || Conference given at the 2005 DC AppSec conference || Novice || 2005-10-1&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/9/93/AppSec2005DC-Matt_Fisher-Google_Hacking_and_Worms.ppt Google Hacking and Web Application Worms (Matt Fisher)] || Talk given at the 2005 DC AppSec conference || Novice || 2005-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/0/05/AppSec2005DC-Anthony_Canike-Enterprise_AppSec_Program.ppt Establishing an Enterprise Application Security Program (Tony Canike)] || Talk given at the 2005 DC AppSec Conference || Novice || 2005-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://owasp.org/images/0/0d/OWASPAppSec2006Seattle_Why_AJAX_Applications_More_Likely_Insecure.ppt Why AJAX Applications Are Far More Likely To Be Insecure (And What To Do About It) (Dave Wichers)] || Dave's talk on AJAX given at the Seattle 2006 AppSec conference || Intermediate || 2006-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Example (include link) || Fill in your comments || Novice/Intermediate/Expert || yyyy-mm-dd&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Web Application Security Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ Web Application Security Presentations &lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Protecting Web Applications from Universal PDF XSS.ppt| Universal PDF XSS by Ivan Ristic]] || Protecting Web Applications from Universal PDF XSS || Intermediate || 2007-06-28&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:IdM-OWASP.v.0.2.14.pdf|Identity Management Basics (Derek Brown)]] ||Identity Management Basics|| Novice || 2007-05-09&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection (Victor Chapela)] || Detailed methodology for analyzing applications for SQL injection vulnerabilities || Expert || 2005-11-04&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/7/7d/Advanced_Topics_on_SQL_Injection_Protection.ppt Advanced Topics on SQL Injection Protection (Sam NG)] || 7 methods to prevent SQL injection attacks correctly and in a more integrated approach. Methods 1 to 3 are applicable during design or development life cycle. Method 4 is mainly from QA’s perspective. Methods 5 and 6 can be applied to production environment and are applicable even if you do not have access to or if you cannot change the source code. Other non-main stream technology are discussed in Method 7.  || Intermediate || 2006-02-27&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/d/d1/AppSec2005DC-Alex_Stamos-Attacking_Web_Services.ppt Attacking Web Services (Alex Stamos)] || Web Services Introduction and Attacks  || Intermediate || 2005-10-11&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/7/72/MMS_Spoofing.ppt MMS Spoofing (Matteo Meucci)] || A Case-study of a vulnerable web application || Intermediate&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f9/OWASPAppSecEU2006_AJAX_Security.ppt Ajax Security (Andrew van der Stock)] || Presentation on Ajax security for OWASP AppSec Europe 2006 || Intermediate || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/3a/OWASPAppSec2006Seattle_Web_Services_Security.ppt Advanced Web Services Security &amp;amp; Hacking (Justin Derry)] || Presentation given on Webservice security at the Seattle 2006 AppSec conference || Intermediate  || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f6/Integration_into_the_SDLC.ppt Integration into the SDLC (Eoin Keary)] || A presentation about why and how to integrate the SDLC. || Novice || 2005-04-09&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Example (include link) || Fill in your comments || Novice/Intermediate/Expert || yyyy-mm-dd&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ Chapter Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Month (Mon-yyyy)&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Chapter&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Common_Application_Flaws.ppt| Common Application Flaws (Brett Moore) ]] ||OWASP New Zealand chapter presentation on Common Application Flaws|| Novice/Intermediate ||November 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Time_Based_SQL_Injections.ppt| Time Based SQL Injections (Muhaimin Dzulfakar) ]] ||OWASP New Zealand chapter presentation on Time Based SQL Injections|| Intermediate ||September 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Browser_security.ppt| Browser Security (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Browser Security|| Intermediate ||September 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_CMH_SQLInjection__20080707.zip| 7/7/2008 SQL Injection (Columbus, OH)]] || SQL Injection Presentation given at the Columbus, OH OWASP Chapter Meeting. Powerpoint, derby DB, and applicable java code. || Novice / Intermediate || July 2008 || [[Columbus]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_ellak-Greece.ppt| Detecting Web Application Vulnerabilities Using Open Source Means (Konstantinos Papapanagiotou) ]] ||OWASP Greek Chapter presentation given at the Open Source Software (FLOSS) Conference in Athens|| Novice ||May 2008 || [[Greece]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Hacking_The_World_With_Flash.ppt| Hacking The World With Flash (Paul Craig) ]] ||OWASP New Zealand chapter presentation on Flash security|| Intermediate ||April 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Web_spam_techniques.ppt| Web Spam Techniques (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Web Spam Techniques|| Intermediate ||April 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Xpath_Injection.ppt| Xpath Injection Overview (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Xpath Injection|| Intermediate ||February 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Owasp security4mobileJava.pdf| Dependability for Java Mobile Code (Pierre Parrend) ]] ||OWASP Swiss chapter presentation on Mobile Java Security || Expert ||July 2007 || [[Switzerland]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Trust Security Usability - v1.0.pdf|Trust, Security and Usability (Roger Carhuatocto) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP-tratamiento_de_datos.pdf|Tratamiento seguro de datos en aplicaciones in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Conferencia_OWASP.pdf|Ataques DoS en aplicaciones Web (Jaime Blasco Bermejo) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Seguridad en entornos financieros.pdf|Seguridad en entornos financierosPedro (Pedro Sánchez) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Java_Open_Review.ppt|Brian Chess from Fortify shared what's going on with the Java Open Source review project at the June NoVA OWASP meeting]] || Java Open Review || Intermediate ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Bytecode_injection.ppt|Brian Chess from Fortify, presentation to NoVA OWASP chapter in June 2007.]] || Bytecode injection || Expert ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Security at the VMM Layer - OWASP.ppt|Security at the VMM Layer by Ted Winograd]] || Security at the VMM Layer || Expert ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:KC June 2007 Evaluating and Tuning WAFs.pdf|Evaluating and Tuning Web Application Firewalls (Barry Archer)]] ||Presentation given at Kansas City June 2007 chapter meeting|| Intermediate ||June 2007 || [[Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_SDL-IT.pdf|Microsoft Security Development Lifecycle for IT (Rob Labbé)]] ||Presentation by Rob Labbe at Ottawa OWASP Chapter|| Novice ||May 2007|| [[Ottawa]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_Application_DOS.pdf|Application Denial of Service (Shaayy Cheen)]] ||Is it Really That Easy? Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_FuzzGuru.pdf|Fuzzing in Microsoft and FuzzGuru framework (John Neystadt)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_AppSec_and_Beyond.pdf|Application Security, not just development (David Lewis)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 Overtaking Google Desktop.pdf|Overtaking Google Desktop, Leveraging XSS to Raise Havoc (Yair Amit)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 UnregisterAttackInSip.pdf|Unregister Attack in SIP (Anat Bremler-Barr, Ronit Halachmi-Bekel and Jussi Kangasharju)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 WAF Positive Security.pdf|Positive Security Model for Web Applications, Challenges and Promise (Ofer Shezaf)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 DOT NET Reverse Engineering.pdf|.NET Reverse Engineering (Erez Metula)]] ||Presentation given at the Israel Mini Conference in May 2007|| Expert ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 OWASP Introduction.pdf|OWASP introduction (Ofer Shezaf)]] ||2nd OWASP IL mini conference at the Interdisciplinary Center (IDC) Herzliya|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP BeLux 2007-06-22 Update on Internet Attack Statistics for Belgium in 2006.ppt|Update on Internet Attack Statistics for Belgium in 2006 by Hilar Leoste (Zone-H)]] || Update on Internet Attack Statistics for Belgium in 2006  || Novice ||May 2007 || [[Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:InfoSec_World_2007_-_Web_services_gateways.ppt Securing Web Services using XML Security Gateways by Tim Bond] || Securing Web Services using XML Security Gateways || Intermediate ||May 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:SwA_Acquisition_WG_-_Overview.ppt Software Assurance in the Acquisition Process by Stan Wisseman] || Software Assurance in the Acquisition Process || Intermediate ||May 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_Legal_Aspects_Jos_Dumortier.zip Legal Aspects of (Web) Application Security by Jos Dumortier] || Legal Aspects of (Web) Application Security  || Intermediate ||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_AppSec_Research_Lieven_Desmet.zip AppSec Research (University Leuven Belgium)] ||  Formal absence of implementation bugs in web applications: a case study on indirect data sharing by Lieven Desmet || Expert ||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Scanner-Sparkly.ppt|A Scanner Sparkly]] || A Scanner Sparkly, taken from the Phoenix OWASP presentations on Application Security Tools, May 2007 || Intermediate ||May 2007 || [[Phoenix]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Owasp-lessonslearned.ppt|Grey Box Assessment Lessons Learned]] || &amp;quot;Grey Box Assessment Lessons Learned&amp;quot;, taken from the Phoenix OWASP presentations, Application Security Tools, May 2007 || Intermediate ||May 2007 || [[Phoenix]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_OWASP_Update.zip OWASP Update and OWASP BeLux Board Presentation (Seba)] || OWASP Update and OWASP BeLux Board Presentation || Novice||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Security Metics- What can we measure- Zed Abbadi.pdf|Metics- What can we measure (Zed Abbadi)]] ||19 April NoVa chapter meeting presentation on Security Metrics || Novice ||April 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Web Services Hacking and Hardening.pdf| Web Services Hacking and Hardening (Adam Vincent) ]] ||3/8/07 NoVA chapter meeting, Adam Vincent from Layer7  || Expert ||March 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_OWASP_Update.zip OWASP Update (Seba)] || OWASP Update  || Novice||Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/fe/Pres_20070206_04_svetsch_xss_worms_owasp.zip XSS Worms (Sven Vetsch)] || XSS Worms || Intermediate  ||Feb 2007 || [[Switzerland|Switzerland]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_OWASP_Update.zip OWASP Update (Seba)] || OWASP Update  || Novice||Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_WebGoat-Pantera.zip WebGoat and Pantera presentation (Philippe Bogaerts)] || WebGoat and Pantera presentation   || Novice || Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_AOP_security.zip Security implications of AOP for secure software (Bart De Win)] || Security implications of AOP for secure software || Expert || Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/1/12/OWASP_Denver_Nov-06_presentation.ppt testing for common security flaws (David Byrne)] || testing for common security flaws || Intermediate || Nov 2006 || [[Denver|Denver]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/7/7c/Owasp-olli.pdf 40-ish slides on analyzing threats (Olli)] || Analyzing Threats || Novice || Dec 2006 || [[Helsinki|Helsinki]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/2/2c/KC_Dec2006_Attacking_The_App.pdf Attacking the Application (Dave Ferguson)] || Vulnerabilities, attacks and coding suggestions || Intermediate || Dec 2006 || [[Kansas City|Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/6/6a/KC_Dec2006_Ajax_Security_Concerns.pdf Ajax Security Concerns (Rohini Sulatycki)] || Ajax Security Concerns || Intermediate ||Dec 2006 || [[Kansas City|Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 Web Application Testing (Matteo Meucci)] || Anatomy of 2 Web Application Testing || Intermediate || Mar 2006 || [[Italy|Italy]]&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Example (include link) || Fill in your comments || Novice/Intermediate/Expert || Mon Year || Chapter&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Education Project]]&lt;br /&gt;
[[Category:OWASP Presentations]]&lt;br /&gt;
[[Category:Chapter Resources]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Education_Presentation&amp;diff=74973</id>
		<title>OWASP Education Presentation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Education_Presentation&amp;diff=74973"/>
				<updated>2009-12-08T18:55:39Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: /* OWASP Education Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page provide a commented overview of the OWASP presentations available.&amp;lt;br&amp;gt;&lt;br /&gt;
Please use the last line of the tables as template.&amp;lt;br&amp;gt;&lt;br /&gt;
Presentions can be tracked through:&lt;br /&gt;
* the [http://www.owasp.org/index.php/Category:OWASP_Presentations OWASP Presentations Category]&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference Past OWASP Conference agenda's]&lt;br /&gt;
* From the chapter pages&lt;br /&gt;
Everybody is encouraged to link the presentations and add their findings on this page !&lt;br /&gt;
There are currently hundreds of presentations all over the OWASP web site. &lt;br /&gt;
If you search google with “site:owasp.org filetype:ppt” there are 166 hits. “site:owasp.org filetype:pdf” returns 76.&lt;br /&gt;
Feel free to “mine” them and add them to the overview.&lt;br /&gt;
&lt;br /&gt;
== OWASP Education Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Education Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Overview Winterv1 2009.pptx|OWASP Overview Winter 2009]]|| Updated overview of OWASP || Novice || 2009-12-08&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Programa_de_Educacion_OWASP.ppt|Programa de Educacion OWASP]]|| Una introduccion a OWASP para Universidades y Centros Educativos por Fabio Cerullo|| Novice || 2009-03-20&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_Educational_Programme.ppt|OWASP Educational Programme]]|| An introduction to OWASP for Universities &amp;amp; Educational Institutions by Fabio Cerullo|| Novice || 2009-03-20&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Overview Summer 2009.pptx|OWASP Overview Summer 2009]]|| Recent overview of OWASP by Jeff Williams || Novice || 2009-08-25&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Why WebAppSec Matters.ppt|Why WebAppSec Matters]]|| This module explains why security should be considered when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP-Intro-2008-portuguese.ppt|OWASP Intro 2008 Portuguese]]|| Este módulo é uma intrudução sobre o projeto OWASP. || Novice || 2008-07-06&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module OWASP Top 10 Introduction and Remedies.ppt|OWASP Top 10 Introduction and Remedies]]|| This module explains the OWASP Top 10 web application vulnerabilities as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Embed within SDLC.ppt|Embed within SDLC]]|| This module explains the complete approach of Web Application Security when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Good Secure Development Practices.ppt|Good Secure Development Practices]]|| This module explains some good secure development practices when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Testing for Vulnerabilities.ppt|Testing for Vulnerabilities]]|| This module explains application security testing when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Education Module Good WebAppSec Resources.ppt|Good WebAppSec Resources]]|| This module points you to some good web application security resources when developping or deploying web applications as part of the [[:Category:OWASP Education Project|Education Project]] || Novice || 2007-11-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Example (include link) || Fill in your comments || Novice/Intermediate/Expert || yyyy-mm-dd&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Project Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Project Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Germany 2008 Conference OWASP Introduction v1.pptx|OWASP Introduction]] || OWASP Overview presentation covering OWASP, project parade and OWASP near you. Given by Seba during the Germany 2008 Conference || Novice || 2008-11-25&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Foundation The story so far and beyond - Part 1.ppt|India08 Keynote - Part 1]] || OWASP Overview presentation. Part 1 of 2. Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP Foundation The story so far and beyond - Part 2.ppt|India08 Keynote - Part 2]] || OWASP Overview presentation. Part 2 of 2. Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP India - Tour of OWASP projects.ppt|Tour of OWASP’s projects]] || Given by Dinis and Jason during the India08 Conference || Novice || 2008-08-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://www.owasp.org/images/5/59/RISK_2008_OWASP_Introduction_v1.pptx OWASP @ RISK08 (Norway)] || OWASP introduction at Norway RISK2008 conference by Seba || Novice || 2008-04-23&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP NY Keynote.ppt|OWASP NY Keynote by Jeff]] also available in [[:Image:20070620-FR-OWASP NY Keynote.ppt|French]]|| OWASP Overview presentation with slide &amp;quot;OWASP by the numbers&amp;quot; and slide with the sorry state of Tools (at best 45%) which caused some controverse || Novice || 2007-06-12&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/a/af/OWASP_Testing_Guide_Presentation.zip The OWASP Testing Guide (Jeff Williams)] || Overview of the OWASP Testing Guide || Novice || 2007-01-23&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/e/e9/OWASP_Testing_Guide_Presentation_EUSecWest07.zip The OWASP Testing Guide v2 EUSecWest07 (Matteo Meucci, Alberto Revelli)] || Presentation at EUSecWest07 || Intermediate || 2007-03-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/3c/OWASP_Flyer_Sep06.ppt OWASP Project Overview] || High level overview of projects and how OWASP works || Novice || 2006-09-19 &lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/4/49/OWASPAppSec2006Seattle_Security_Metrics.ppt The OWASP Application Security Metrics Project (Bob Austin)] || Presentation on the Application Security Metrics project || Novice || 2006-10-17&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/5/53/OWASPAppSecEU2006_CLASP_Project.ppt OWASP CLASP Project (Pravir Chandra)] || OWASP CLASP project presentation given at the 2006 European AppSec conference || Novice || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/30/OWASPAppSec2006Seattle_UsingSprajaxToTestAJAXSecurity.ppt Sprajax (Dan Cornell)] || OWASP Sprajax presentation given at the 2006 Seattle AppSec conference || Intermediate || 2006-10-17&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Example (include link) || Fill in your comments || Novice/Intermediate/Expert || yyyy-mm-dd&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP Conference Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ OWASP Conference Presentations &lt;br /&gt;
!width=&amp;quot;30%&amp;quot; | Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; | Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; | Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan ModSecurityCoreRuleSet.ppt | Mod Security Core Rule Set (Ofer Shezaf)]] ||Ofer Shezaf's presentation on the Core Ruleset for the latest version of ModSecurity presented at 6th OWASP AppSec conference in Milan, Italy, in May 2007.|| Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OWASPTestingGuide2v1.ppt | OWASP Testing Guide v2.1 (Matteo Meucci)]] ||Matteo Meucci's presentation on the OWASP Testing Guide v2 at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan CLASP.ppt | CLASP (Pravir Chandra)]] ||Pravir Chandra's presentation on the upcoming 2007 update to CLASP presented at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan AdvancedWebHacking.ppt | Advanced Web Hacking (PDP)]] ||PDPs presentation at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan XMLSecurityGatewayEvalCriteria.ppt | XML Security Gateway Evaluation Criteria (Gunnar Peterson)]] ||Gunnar Peterson's presentation about the new XML Security Gateway Evaluation Criteria project at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan TestingFlashApplications.ppt | Testing Flash Applications (Stephano Di Paolo)]] ||Stephano Di Paolo's presentation on how to test Flash applications presented at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert|| 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OvertakingGoogleDesktop.ppt | Overtaking Google Desktop (Yair Amit)]] ||Yair Amit's presentation on XSS Flaws in Google Desktop that can be exploited through google.com presented at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Expert || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan MS ACETeamAppSecfromTheCore.ppt | ACE Team Application Security from the Core (Simon Roses Femerling)]] ||Simon Roses Femerling's presentation on the Microsoft ACE team's application security process at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan Pantera.ppt | Pantera (Simon Roses Femerling)]] ||Simon Roses Femerling's presentation on the new OWASP tool Pantera at the 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan ProtectingWebAppsfromUniversalPDFXSS.ppt | Protecting Web applications from universal PDF XSS (Ivan Ristic)]] ||Ivan Ristic's Universal XSS PDF presentation at 6th OWASP AppSec conference in Milan, Italy in May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SoftwareSecurity.ppt | Software Security (Rudolph Araujo)]] ||Rudolph Araujo's presentation on Application Security best practices at the 6th OWASP AppSec conference in Milan Italy, May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan WebGoatv5.ppt | WebGoat v5 (Dave Wichers)]] ||WebGoat v5 presentation by Dave Wichers at the 6th OWASP AppSec Conference in Milan, Italy, May 2007. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan WebScarabNG.ppt | WebScarab NG (Dave Wichers)]] ||Description of the new WebScarab-NG efforts presented by Dave Wichers at the 6th OWASP AppSec conference in Milan, Italy in May 2007.|| Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SANS SPSA Initiative.ppt | SANS SPSA Initiative (Dave Wichers)]] ||Description of the SANS Secure Coding Exam Initiative presented by Dave Wichers at the 6th OWASP AppSec conference in Milan Italy, May 2007.|| Novice || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan OWASPItalyActivities.ppt | OWASP Italy Activities (Raoul Chiesa)]] ||Raoul Chiesa's keynote for day 2 of the 6th OWASP AppSec conference on the state of application security in Italy including OWASP's activities in that country.|| Novice || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASPAppSec2007Milan SecurityEngineeringInVista.ppt | Security engineering in Vista (Alex Lucas)]] ||Alex Lucas' from Microsoft's keynote presentation for Day 1 of the 6th OWASP AppSec conference in Milan on the benefits of Microsoft's SDL to the security of Vista. || Intermediate || 2007-05-16&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/5/5f/OWASPAppSec2006Seattle_SecurityEngineeringInVista.ppt How the Security Development Lifecycle(SDL) Improved Windows Vista (Michael Howard)] || Michael Howard's talk on SDL from the OWASP Seattle AppSec Conference in 2006 || Intermediate || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/34/OWASPAppSecEU2006_Bootstrapping_the_Application_Assurance_Process.ppt Bootstrapping the Application Assurance Process (Sebastien Deleersnyder)] || Presentation given during the European 2006 AppSec conference on the application assurance process || Novice || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/8/8b/OWASPAppSecEU2006_InlineApproachforSecureSOAPRequests.ppt Inline Approach for Secure SOAP Requests and Early Validation (Mohammad Ashiqur Rahaman, Maartin Rits and Andreas Schaad SAP Research, Sophia Antipolis, France)] || Presentation given at the European 2006 AppSec conference about security and soap message structure issues || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/9/9c/OWASPAppSecEU2006_WAFs_WhenAreTheyUseful.ppt Web Application Firewalls:When Are They Useful? (Ivan Ristic)] || Presentation about Web Application Firewalls || Novice || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/1/1a/OWASPAppSecEU2006_HTTPMessageSplittingSmugglingEtc.ppt HTTP Message Splitting, Smuggling and Other Animals (Amit Klein)] || A presentation about Message splitting other attacks around the HTTP protocol || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f6/OWASPAppSec2006Seattle_WebAppForensics.ppt Web Application Incident Response &amp;amp; Forensics: A Whole New Ball Game! (Rohyt Belani &amp;amp; Chuck Willis)] || Talk about Web Application Security incident handling and forensics given at the OWASP 2006 Seattle AppSec conference || Intermediate || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/d/d2/OWASPAppSecEU2006_CanTestingToolsReallyFindOWASPTop10.ppt Can (Automated) Testing Tools Really Find the OWASP Top 10? (Erwin Geirnaert) ] || A talk about how automated testing tools stack up against the OWASP top 10 || Intermediate || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/2/28/OWASPAppSecEU2006_RequestRodeo.ppt RequestRodeo: Client Side Protection against Session Riding (Martin Johns / Justus Winter)] || Presentation given about how Sessions can be hi-jacked, etc... || Novice  || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/6/62/OWASPAppSecEU2006_SecurityTestingthruAutomatedSWTests.ppt Security Testing through Automated Software Tests (Stephen de Vries)] || Presentation given at the 2006 EuSec conference || Intermediate || 2006-05-31&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/0/0e/AppSec2005DC-Jeremy_Poteet-In_the_Line_of_Fire.ppt In the Line of Fire: Defending Highly Visible Targets (Jeremy Poteet)] || Conference given at the 2005 DC AppSec conference || Novice || 2005-10-1&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/9/93/AppSec2005DC-Matt_Fisher-Google_Hacking_and_Worms.ppt Google Hacking and Web Application Worms (Matt Fisher)] || Talk given at the 2005 DC AppSec conference || Novice || 2005-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/0/05/AppSec2005DC-Anthony_Canike-Enterprise_AppSec_Program.ppt Establishing an Enterprise Application Security Program (Tony Canike)] || Talk given at the 2005 DC AppSec Conference || Novice || 2005-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[https://owasp.org/images/0/0d/OWASPAppSec2006Seattle_Why_AJAX_Applications_More_Likely_Insecure.ppt Why AJAX Applications Are Far More Likely To Be Insecure (And What To Do About It) (Dave Wichers)] || Dave's talk on AJAX given at the Seattle 2006 AppSec conference || Intermediate || 2006-10-01&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Example (include link) || Fill in your comments || Novice/Intermediate/Expert || yyyy-mm-dd&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Web Application Security Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ Web Application Security Presentations &lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;40%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;15%&amp;quot; |Date (yyyy-mm-dd)&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Protecting Web Applications from Universal PDF XSS.ppt| Universal PDF XSS by Ivan Ristic]] || Protecting Web Applications from Universal PDF XSS || Intermediate || 2007-06-28&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:IdM-OWASP.v.0.2.14.pdf|Identity Management Basics (Derek Brown)]] ||Identity Management Basics|| Novice || 2007-05-09&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection (Victor Chapela)] || Detailed methodology for analyzing applications for SQL injection vulnerabilities || Expert || 2005-11-04&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/7/7d/Advanced_Topics_on_SQL_Injection_Protection.ppt Advanced Topics on SQL Injection Protection (Sam NG)] || 7 methods to prevent SQL injection attacks correctly and in a more integrated approach. Methods 1 to 3 are applicable during design or development life cycle. Method 4 is mainly from QA’s perspective. Methods 5 and 6 can be applied to production environment and are applicable even if you do not have access to or if you cannot change the source code. Other non-main stream technology are discussed in Method 7.  || Intermediate || 2006-02-27&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[http://www.owasp.org/images/d/d1/AppSec2005DC-Alex_Stamos-Attacking_Web_Services.ppt Attacking Web Services (Alex Stamos)] || Web Services Introduction and Attacks  || Intermediate || 2005-10-11&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/7/72/MMS_Spoofing.ppt MMS Spoofing (Matteo Meucci)] || A Case-study of a vulnerable web application || Intermediate&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f9/OWASPAppSecEU2006_AJAX_Security.ppt Ajax Security (Andrew van der Stock)] || Presentation on Ajax security for OWASP AppSec Europe 2006 || Intermediate || 2006-05-30&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/3/3a/OWASPAppSec2006Seattle_Web_Services_Security.ppt Advanced Web Services Security &amp;amp; Hacking (Justin Derry)] || Presentation given on Webservice security at the Seattle 2006 AppSec conference || Intermediate  || 2006-10-18&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/f6/Integration_into_the_SDLC.ppt Integration into the SDLC (Eoin Keary)] || A presentation about why and how to integrate the SDLC. || Novice || 2005-04-09&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Example (include link) || Fill in your comments || Novice/Intermediate/Expert || yyyy-mm-dd&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Presentations ==&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: top;&amp;quot; border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+ Chapter Presentations&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Title&lt;br /&gt;
!width=&amp;quot;30%&amp;quot; |Comment&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Level&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Month (Mon-yyyy)&lt;br /&gt;
!width=&amp;quot;10%&amp;quot; |Chapter&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Common_Application_Flaws.ppt| Common Application Flaws (Brett Moore) ]] ||OWASP New Zealand chapter presentation on Common Application Flaws|| Novice/Intermediate ||November 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Time_Based_SQL_Injections.ppt| Time Based SQL Injections (Muhaimin Dzulfakar) ]] ||OWASP New Zealand chapter presentation on Time Based SQL Injections|| Intermediate ||September 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Browser_security.ppt| Browser Security (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Browser Security|| Intermediate ||September 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_CMH_SQLInjection__20080707.zip| 7/7/2008 SQL Injection (Columbus, OH)]] || SQL Injection Presentation given at the Columbus, OH OWASP Chapter Meeting. Powerpoint, derby DB, and applicable java code. || Novice / Intermediate || July 2008 || [[Columbus]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_ellak-Greece.ppt| Detecting Web Application Vulnerabilities Using Open Source Means (Konstantinos Papapanagiotou) ]] ||OWASP Greek Chapter presentation given at the Open Source Software (FLOSS) Conference in Athens|| Novice ||May 2008 || [[Greece]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Hacking_The_World_With_Flash.ppt| Hacking The World With Flash (Paul Craig) ]] ||OWASP New Zealand chapter presentation on Flash security|| Intermediate ||April 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Web_spam_techniques.ppt| Web Spam Techniques (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Web Spam Techniques|| Intermediate ||April 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Xpath_Injection.ppt| Xpath Injection Overview (Roberto Suggi Liverani) ]] ||OWASP New Zealand chapter presentation on Xpath Injection|| Intermediate ||February 2008 || [[New Zealand]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Owasp security4mobileJava.pdf| Dependability for Java Mobile Code (Pierre Parrend) ]] ||OWASP Swiss chapter presentation on Mobile Java Security || Expert ||July 2007 || [[Switzerland]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Trust Security Usability - v1.0.pdf|Trust, Security and Usability (Roger Carhuatocto) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP-tratamiento_de_datos.pdf|Tratamiento seguro de datos en aplicaciones in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Conferencia_OWASP.pdf|Ataques DoS en aplicaciones Web (Jaime Blasco Bermejo) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Seguridad en entornos financieros.pdf|Seguridad en entornos financierosPedro (Pedro Sánchez) in Spanish]]||OWASP Spain chapter meeting (July'07) || Intermediate ||July 2007 || [[Spain]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Java_Open_Review.ppt|Brian Chess from Fortify shared what's going on with the Java Open Source review project at the June NoVA OWASP meeting]] || Java Open Review || Intermediate ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Bytecode_injection.ppt|Brian Chess from Fortify, presentation to NoVA OWASP chapter in June 2007.]] || Bytecode injection || Expert ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Security at the VMM Layer - OWASP.ppt|Security at the VMM Layer by Ted Winograd]] || Security at the VMM Layer || Expert ||June 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:KC June 2007 Evaluating and Tuning WAFs.pdf|Evaluating and Tuning Web Application Firewalls (Barry Archer)]] ||Presentation given at Kansas City June 2007 chapter meeting|| Intermediate ||June 2007 || [[Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_SDL-IT.pdf|Microsoft Security Development Lifecycle for IT (Rob Labbé)]] ||Presentation by Rob Labbe at Ottawa OWASP Chapter|| Novice ||May 2007|| [[Ottawa]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_Application_DOS.pdf|Application Denial of Service (Shaayy Cheen)]] ||Is it Really That Easy? Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_FuzzGuru.pdf|Fuzzing in Microsoft and FuzzGuru framework (John Neystadt)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP_IL_7_AppSec_and_Beyond.pdf|Application Security, not just development (David Lewis)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 Overtaking Google Desktop.pdf|Overtaking Google Desktop, Leveraging XSS to Raise Havoc (Yair Amit)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 UnregisterAttackInSip.pdf|Unregister Attack in SIP (Anat Bremler-Barr, Ronit Halachmi-Bekel and Jussi Kangasharju)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 WAF Positive Security.pdf|Positive Security Model for Web Applications, Challenges and Promise (Ofer Shezaf)]] ||Presentation given at the Israel Mini Conference in May 2007|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 DOT NET Reverse Engineering.pdf|.NET Reverse Engineering (Erez Metula)]] ||Presentation given at the Israel Mini Conference in May 2007|| Expert ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP IL 7 OWASP Introduction.pdf|OWASP introduction (Ofer Shezaf)]] ||2nd OWASP IL mini conference at the Interdisciplinary Center (IDC) Herzliya|| Intermediate ||May 2007 || [[Israel]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:OWASP BeLux 2007-06-22 Update on Internet Attack Statistics for Belgium in 2006.ppt|Update on Internet Attack Statistics for Belgium in 2006 by Hilar Leoste (Zone-H)]] || Update on Internet Attack Statistics for Belgium in 2006  || Novice ||May 2007 || [[Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:InfoSec_World_2007_-_Web_services_gateways.ppt Securing Web Services using XML Security Gateways by Tim Bond] || Securing Web Services using XML Security Gateways || Intermediate ||May 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:SwA_Acquisition_WG_-_Overview.ppt Software Assurance in the Acquisition Process by Stan Wisseman] || Software Assurance in the Acquisition Process || Intermediate ||May 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_Legal_Aspects_Jos_Dumortier.zip Legal Aspects of (Web) Application Security by Jos Dumortier] || Legal Aspects of (Web) Application Security  || Intermediate ||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_AppSec_Research_Lieven_Desmet.zip AppSec Research (University Leuven Belgium)] ||  Formal absence of implementation bugs in web applications: a case study on indirect data sharing by Lieven Desmet || Expert ||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Scanner-Sparkly.ppt|A Scanner Sparkly]] || A Scanner Sparkly, taken from the Phoenix OWASP presentations on Application Security Tools, May 2007 || Intermediate ||May 2007 || [[Phoenix]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Owasp-lessonslearned.ppt|Grey Box Assessment Lessons Learned]] || &amp;quot;Grey Box Assessment Lessons Learned&amp;quot;, taken from the Phoenix OWASP presentations, Application Security Tools, May 2007 || Intermediate ||May 2007 || [[Phoenix]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BeLux_2007-05-10_OWASP_Update.zip OWASP Update and OWASP BeLux Board Presentation (Seba)] || OWASP Update and OWASP BeLux Board Presentation || Novice||May 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Security Metics- What can we measure- Zed Abbadi.pdf|Metics- What can we measure (Zed Abbadi)]] ||19 April NoVa chapter meeting presentation on Security Metrics || Novice ||April 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[[:Image:Web Services Hacking and Hardening.pdf| Web Services Hacking and Hardening (Adam Vincent) ]] ||3/8/07 NoVA chapter meeting, Adam Vincent from Layer7  || Expert ||March 2007 || [[Virginia (Northern Virginia)]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_OWASP_Update.zip OWASP Update (Seba)] || OWASP Update  || Novice||Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/f/fe/Pres_20070206_04_svetsch_xss_worms_owasp.zip XSS Worms (Sven Vetsch)] || XSS Worms || Intermediate  ||Feb 2007 || [[Switzerland|Switzerland]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_OWASP_Update.zip OWASP Update (Seba)] || OWASP Update  || Novice||Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_WebGoat-Pantera.zip WebGoat and Pantera presentation (Philippe Bogaerts)] || WebGoat and Pantera presentation   || Novice || Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_AOP_security.zip Security implications of AOP for secure software (Bart De Win)] || Security implications of AOP for secure software || Expert || Jan 2007 || [[Belgium|Belgium]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/1/12/OWASP_Denver_Nov-06_presentation.ppt testing for common security flaws (David Byrne)] || testing for common security flaws || Intermediate || Nov 2006 || [[Denver|Denver]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/7/7c/Owasp-olli.pdf 40-ish slides on analyzing threats (Olli)] || Analyzing Threats || Novice || Dec 2006 || [[Helsinki|Helsinki]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/2/2c/KC_Dec2006_Attacking_The_App.pdf Attacking the Application (Dave Ferguson)] || Vulnerabilities, attacks and coding suggestions || Intermediate || Dec 2006 || [[Kansas City|Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/6/6a/KC_Dec2006_Ajax_Security_Concerns.pdf Ajax Security Concerns (Rohini Sulatycki)] || Ajax Security Concerns || Intermediate ||Dec 2006 || [[Kansas City|Kansas City]]&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|[http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 Web Application Testing (Matteo Meucci)] || Anatomy of 2 Web Application Testing || Intermediate || Mar 2006 || [[Italy|Italy]]&lt;br /&gt;
&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|Example (include link) || Fill in your comments || Novice/Intermediate/Expert || Mon Year || Chapter&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Education Project]]&lt;br /&gt;
[[Category:OWASP Presentations]]&lt;br /&gt;
[[Category:Chapter Resources]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Overview_Winter_2009v1.pptx&amp;diff=74971</id>
		<title>File:OWASP Overview Winter 2009v1.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Overview_Winter_2009v1.pptx&amp;diff=74971"/>
				<updated>2009-12-08T18:52:06Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GPC_Agenda_2009-11-23&amp;diff=73995</id>
		<title>GPC Agenda 2009-11-23</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GPC_Agenda_2009-11-23&amp;diff=73995"/>
				<updated>2009-11-23T19:12:49Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: /* Current Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Previous meetings and Dial-in  details ==&lt;br /&gt;
see [[:Category:GPC_Meetings|GPC Meetings]] for previous GPC Meetings Agenda '''and the Dial-In details''' &lt;br /&gt;
&lt;br /&gt;
= Agenda  =&lt;br /&gt;
&lt;br /&gt;
== Current Meeting  ==&lt;br /&gt;
&lt;br /&gt;
*[[:Summit 2009|&amp;quot;OWASP Mini-Summit 2009&amp;quot;]]/[[:OWASP AppSec DC 2009]] - Wrap-up:&lt;br /&gt;
**Decisions made in DC with impact on GPC activity, &lt;br /&gt;
**Has the GPC had the opportunity to contact M. Bobersky to answer his questions? [https://docs.google.com/a/owasp.org/Doc?docid=0AX4Puwz7EA41ZGNuODk2MmNfNTRjZGd0OTdkcw&amp;amp;hl=en M. Boberski's questions]&lt;br /&gt;
&lt;br /&gt;
* Leo wants to discuss about issues on usage of OWASP resources. Is this the right forum?&lt;br /&gt;
**Brazilian AppSec Conference&lt;br /&gt;
**Brazilian book that has a translated version of Top10 &amp;quot;integrally&amp;quot;, without any reference to OWASP&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Projects&lt;br /&gt;
** [[:Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Project_Details|OWASP ModSecurity Core Rule Set Project]] is ready for assessment and needs a GPC reviewer. Volunteers?&lt;br /&gt;
** [[:Category:OWASP Content Validation using Java Annotations Project|OWASP Content Validation using Java Annotations Project]] is ready for assessment and needs '''TWO''' GPC reviewers as it hasn't been possible to find any volunteers within our project leaders. Volunteers?&lt;br /&gt;
&lt;br /&gt;
** Releases translation process&lt;br /&gt;
*** Shall we handle this or let with other Committe?&lt;br /&gt;
*** Define process only for docs or also tools?&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Project Reviewers,&lt;br /&gt;
** In the sequence of suggestions and comments previously made by Tom and Brad and Matt, I've created a [[OWASP Project Reviewers Database|first straw of the page]] to receive information about hypothetical volunteer project reviewers.&lt;br /&gt;
***Please check it out and let me know if you think any changes have to be made. &lt;br /&gt;
***Also, it seems to me that the next phases of this process could consist in pushing it forward by using this page to describe the review job role and, thereafter, by doing a call for reviewers through our leaders' mailing list.&lt;br /&gt;
***If you agree with this methodology I ask if one of you have the spare cycles to produce the above referred job description. Later on a text to support the call for reviewers will also be needed - I will produce a first draft for your comments if nobody assumes first the task.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*GPC participation at the [http://www.ibwas.com/index.html Iberic Web Application Security] conference (IBWAS09): &lt;br /&gt;
**For GPC's information, Paulo is partially using his time to assist the conference management team.  &lt;br /&gt;
**We need a 1h slide deck about OWASP projects to be delivered at the next AppSec Conference in Madrid.&lt;br /&gt;
&lt;br /&gt;
== From Previous Meeting/Follow up  ==&lt;br /&gt;
&lt;br /&gt;
*Spreading [[:Template:OWASP Project Identification Tab|OWASP Project Details Tab]] through [[OWASP Projects Dashboard|ALL OWASP Projects]]. &lt;br /&gt;
**Revised&amp;amp;improved wiki code to link projects and releases -  Has this task been finished? Are there any available instructions/documentation?&lt;br /&gt;
&lt;br /&gt;
= Issues for next Meeting  =&lt;br /&gt;
&lt;br /&gt;
*Add here&lt;br /&gt;
&lt;br /&gt;
= Minutes  =&lt;br /&gt;
&lt;br /&gt;
*Meeting started 10H PM/GMT &lt;br /&gt;
*Add here&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Category:GPC_Meetings]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_JBroFuzz_Project_-_Version_1.7_Release_-_Assessment&amp;diff=73928</id>
		<title>Category:OWASP JBroFuzz Project - Version 1.7 Release - Assessment</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_JBroFuzz_Project_-_Version_1.7_Release_-_Assessment&amp;diff=73928"/>
				<updated>2009-11-21T15:17:21Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: /* Stable Release Review of the OWASP JBroFuzz Project - Release 1.7 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;small&amp;gt;[[:Category:OWASP JBroFuzz|Click here to return to project's main page]]&amp;lt;/small&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Stable Release Review of the OWASP JBroFuzz Project - Release 1.7 ==&lt;br /&gt;
&lt;br /&gt;
==== Project Leader for this Release ====&lt;br /&gt;
'''''[mailto:yiannis@owasp.org Subere]'s Pre-Assessment Checklist:'''''&lt;br /&gt;
&lt;br /&gt;
{{ Pre-Assessment Questions - Tools&lt;br /&gt;
| 1. Is this release associated with a project containing at least the [[Assessing_Project_Health#Project_Wiki_Page_Minimal_Content|Project Wiki Page Minimum Content]]  information?&lt;br /&gt;
= Yes; there a lot of information regarding how to use JBroFuzz, an FAQ section a Help section as well as an online tutorial that still needs a lot of work!&lt;br /&gt;
&lt;br /&gt;
| 2. Is your tool licensed under an open source license? &lt;br /&gt;
= GNU GPL v3&lt;br /&gt;
&lt;br /&gt;
| 3. Is the source code and any documentation available in an online project repository? &lt;br /&gt;
= For the source code: http://jbrofuzz.svn.sourceforge.net/viewvc/jbrofuzz/&lt;br /&gt;
&lt;br /&gt;
| 4. Is there working code? &lt;br /&gt;
= Yes; currently in its 179 revision, according to the subversion repository.&lt;br /&gt;
&lt;br /&gt;
| 5. Is there a roadmap for this project release which will take it from Alpha to Stable release? &lt;br /&gt;
= Yes; most of the roadmap has now being delivered with the continuous addition of enhancements (e.g. the encoder window)&lt;br /&gt;
&lt;br /&gt;
| 6. Are the Alpha pre-assessment items complete?&lt;br /&gt;
= I believe so, yes.&lt;br /&gt;
&lt;br /&gt;
| 7. Is there an installer or stand-alone executable? &lt;br /&gt;
= Both an installer and a stand-alone executable as well as a jar standalone executable.&lt;br /&gt;
 &lt;br /&gt;
| 8. Is there user documentation on the OWASP project wiki page? &lt;br /&gt;
= An FAQ section and a Help section, as well as an ongoing tutorial guide that can be found: http://www.owasp.org/index.php/OWASP_JBroFuzz_Tutorial&lt;br /&gt;
&lt;br /&gt;
| 9. Is there an &amp;quot;About box&amp;quot; or similar help item which lists the following? &lt;br /&gt;
= Yes, the about box carries version information, production alias email, the license as well as a disclaimer.&lt;br /&gt;
&lt;br /&gt;
| 10. Is there documentation on how to build the tool from source including obtaining the source from the code repository? &lt;br /&gt;
= Yes; using apache ant and running '&amp;gt;ant' after the source code has been downloading. This is also documented on the website.&lt;br /&gt;
&lt;br /&gt;
| 11. Is the tool documentation stored in the same repository as the source code?&lt;br /&gt;
= Yes; the faq and help sections are stored in the same repository as the source code. The java-doc is derived from the source code. The fuzzing payloads are stored within the repository.&lt;br /&gt;
&lt;br /&gt;
| 12. Are the Alpha and Beta pre-assessment items complete? &lt;br /&gt;
= I would say, yes.&lt;br /&gt;
&lt;br /&gt;
| 13. Does the tool include documentation built into the tool? &lt;br /&gt;
= Yes; under Help -&amp;gt; FAQ and Help -&amp;gt; Topics&lt;br /&gt;
&lt;br /&gt;
| 14. Does the tool include build scripts to automate builds? &lt;br /&gt;
= Yes; using apache ant and a standard build.xml file&lt;br /&gt;
&lt;br /&gt;
| 15. Is there a publicly accessible bug tracking system? &lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 16. Have any existing limitations of the tool been documented? &lt;br /&gt;
= Yes; for example running the tool from command line with more memory; running the jar file in order to pass a SOCKS5 proxy configuration, etc.&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== First Reviewer ====&lt;br /&gt;
'''''[[User:Mtesauro|Matt Tesauro]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;Ideally, reviewers should be an existing OWASP project leader or chapter leader.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = (answer #1) Delete this text and place your answer here. The same for the questions below.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= (answer #2)&lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= (answer #3) &lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= (answer #4)&lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= (answer #5)&lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= (answer #6)&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= (answer #7)&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= (answer #8)&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= (answer #9)&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= (answer #10)&lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= (answer #11)&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= (answer #12)&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= (answer #13)&lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= (answer #14)&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== Second Reviewer ====&lt;br /&gt;
'''''[[User:Leocavallari|Leonardo Cavallari Militelli]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;It is recommended that an OWASP board member or Global Projects Committee member be the second reviewer on Quality releases. The board has the initial option to review the project, followed by the Global Projects Committee.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = Yes, in a form of Java executable jar file and a MSI Installable package for Windows.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= Yes. I recommend to link the tutorial and FAQ to main link section on Project Details, while the videos linked on Main links sections are outdated and do not present the current version. Also, the tutorial and documentation have gaps to be improved.&lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= Yes&lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= No. The documentation regarding the source code was not found in the wiki, tool repository (sourceforge), or within the downloadable files. It assumes that the user already know what's a fuzzer and how to use it.&lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= No. The documentation is only available into the Wiki and doesn't explain how to build from source code. &lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= &lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= Yes, at Sourceforge&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= Yes, since it helps on fuzzing values during an application security assessment, thus automatizing attack variants discovery.&lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= The tool is doing very well, but I missed documentation about source code and a more concise user guide. It can go up the ladder for Release Quality, but I'd like to see a improved documentation when possible.&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_JBroFuzz_Project_-_Version_1.7_Release_-_Assessment&amp;diff=73927</id>
		<title>Category:OWASP JBroFuzz Project - Version 1.7 Release - Assessment</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_JBroFuzz_Project_-_Version_1.7_Release_-_Assessment&amp;diff=73927"/>
				<updated>2009-11-21T15:15:50Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: /* Stable Release Review of the OWASP JBroFuzz Project - Release 1.7 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;small&amp;gt;[[:Category:OWASP JBroFuzz|Click here to return to project's main page]]&amp;lt;/small&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Stable Release Review of the OWASP JBroFuzz Project - Release 1.7 ==&lt;br /&gt;
&lt;br /&gt;
==== Project Leader for this Release ====&lt;br /&gt;
'''''[mailto:yiannis@owasp.org Subere]'s Pre-Assessment Checklist:'''''&lt;br /&gt;
&lt;br /&gt;
{{ Pre-Assessment Questions - Tools&lt;br /&gt;
| 1. Is this release associated with a project containing at least the [[Assessing_Project_Health#Project_Wiki_Page_Minimal_Content|Project Wiki Page Minimum Content]]  information?&lt;br /&gt;
= Yes; there a lot of information regarding how to use JBroFuzz, an FAQ section a Help section as well as an online tutorial that still needs a lot of work!&lt;br /&gt;
&lt;br /&gt;
| 2. Is your tool licensed under an open source license? &lt;br /&gt;
= GNU GPL v3&lt;br /&gt;
&lt;br /&gt;
| 3. Is the source code and any documentation available in an online project repository? &lt;br /&gt;
= For the source code: http://jbrofuzz.svn.sourceforge.net/viewvc/jbrofuzz/&lt;br /&gt;
&lt;br /&gt;
| 4. Is there working code? &lt;br /&gt;
= Yes; currently in its 179 revision, according to the subversion repository.&lt;br /&gt;
&lt;br /&gt;
| 5. Is there a roadmap for this project release which will take it from Alpha to Stable release? &lt;br /&gt;
= Yes; most of the roadmap has now being delivered with the continuous addition of enhancements (e.g. the encoder window)&lt;br /&gt;
&lt;br /&gt;
| 6. Are the Alpha pre-assessment items complete?&lt;br /&gt;
= I believe so, yes.&lt;br /&gt;
&lt;br /&gt;
| 7. Is there an installer or stand-alone executable? &lt;br /&gt;
= Both an installer and a stand-alone executable as well as a jar standalone executable.&lt;br /&gt;
 &lt;br /&gt;
| 8. Is there user documentation on the OWASP project wiki page? &lt;br /&gt;
= An FAQ section and a Help section, as well as an ongoing tutorial guide that can be found: http://www.owasp.org/index.php/OWASP_JBroFuzz_Tutorial&lt;br /&gt;
&lt;br /&gt;
| 9. Is there an &amp;quot;About box&amp;quot; or similar help item which lists the following? &lt;br /&gt;
= Yes, the about box carries version information, production alias email, the license as well as a disclaimer.&lt;br /&gt;
&lt;br /&gt;
| 10. Is there documentation on how to build the tool from source including obtaining the source from the code repository? &lt;br /&gt;
= Yes; using apache ant and running '&amp;gt;ant' after the source code has been downloading. This is also documented on the website.&lt;br /&gt;
&lt;br /&gt;
| 11. Is the tool documentation stored in the same repository as the source code?&lt;br /&gt;
= Yes; the faq and help sections are stored in the same repository as the source code. The java-doc is derived from the source code. The fuzzing payloads are stored within the repository.&lt;br /&gt;
&lt;br /&gt;
| 12. Are the Alpha and Beta pre-assessment items complete? &lt;br /&gt;
= I would say, yes.&lt;br /&gt;
&lt;br /&gt;
| 13. Does the tool include documentation built into the tool? &lt;br /&gt;
= Yes; under Help -&amp;gt; FAQ and Help -&amp;gt; Topics&lt;br /&gt;
&lt;br /&gt;
| 14. Does the tool include build scripts to automate builds? &lt;br /&gt;
= Yes; using apache ant and a standard build.xml file&lt;br /&gt;
&lt;br /&gt;
| 15. Is there a publicly accessible bug tracking system? &lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 16. Have any existing limitations of the tool been documented? &lt;br /&gt;
= Yes; for example running the tool from command line with more memory; running the jar file in order to pass a SOCKS5 proxy configuration, etc.&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== First Reviewer ====&lt;br /&gt;
'''''[[User:Mtesauro|Matt Tesauro]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;Ideally, reviewers should be an existing OWASP project leader or chapter leader.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = (answer #1) Delete this text and place your answer here. The same for the questions below.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= (answer #2)&lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= (answer #3) &lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= (answer #4)&lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= (answer #5)&lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= (answer #6)&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= (answer #7)&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= (answer #8)&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= (answer #9)&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= (answer #10)&lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= (answer #11)&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= (answer #12)&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= (answer #13)&lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= (answer #14)&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== Second Reviewer ====&lt;br /&gt;
'''''[[User:Leocavallari|Leonardo Cavallari Militelli]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;It is recommended that an OWASP board member or Global Projects Committee member be the second reviewer on Quality releases. The board has the initial option to review the project, followed by the Global Projects Committee.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = Yes, in a form of Java executable jar file and a MSI Installable package for Windows.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= Yes. I recommend to link the tutorial to the main link section on Project Details, while the videos linked on Main links sections are outdated and do not present the current version. Also, the tutorial and documentation have gaps to be improved.&lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= Yes&lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= No. The documentation regarding the source code was not found in the wiki, tool repository (sourceforge), or within the downloadable files. It assumes that the user already know what's a fuzzer and how to use it.&lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= No. The documentation is only available into the Wiki and doesn't explain how to build from source code. &lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= &lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= Yes, at Sourceforge&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= Yes, since it helps on fuzzing values during an application security assessment, thus automatizing attack variants discovery.&lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= The tool is doing very well, but I missed documentation about source code and a more concise user guide. It can go up the ladder for Release Quality, but I'd like to see a improved documentation when possible.&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_JBroFuzz_Tutorial&amp;diff=73926</id>
		<title>OWASP JBroFuzz Tutorial</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_JBroFuzz_Tutorial&amp;diff=73926"/>
				<updated>2009-11-21T15:02:34Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP JBroFuzz]]&lt;br /&gt;
&lt;br /&gt;
== JBroFuzz Tutorial ==&lt;br /&gt;
=== Introduction ===&lt;br /&gt;
''“If you can’t fuzz with JBroFuzz, you probably do not want to fuzz!”'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt;Old JBroFuzz Motto &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The art of teaching, Mark Van Doren said, is the art of assisting discovery. Fuzzing is a representative discipline towards assisting the discovery of security vulnerabilities, that is just beginning to come of age. Over the last two years, through continuous development, JBroFuzz has attempted to expose the intrinsic beauty of the subject: Constantly submit a vast amount of payloads to a service, device or prompt, waiting for the one response that makes all the difference. This is the mentality that JBroFuzz embraces and attempts to offer back to security professionals. &lt;br /&gt;
&lt;br /&gt;
Fuzzing as a concept goes beyond a conventional work flow or a standard methodology. I would argue that to know how to fuzz well, is to master a new language. Thus, similar to the process of learning a programming (or foreign) language, there are three things you must master: &lt;br /&gt;
&lt;br /&gt;
• Grammar: How fuzzing as a process is structured&amp;lt;br&amp;gt;&lt;br /&gt;
• Vocabulary: How to name fuzzing concepts you want to use&amp;lt;br&amp;gt;&lt;br /&gt;
• Usage: Ways of achieving everyday effective results with fuzzing&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:001-JBroFuzz-Tutorial.jpg|300px|right|JBroFuzz Splash Screen]]From the pre-existing information available for JBroFuzz, this tutorial focuses on usage: How to best put a fuzzing tool to good use, either via the UI, or using APIs that ''JBroFuzz.jar'' is constituted of. As a result, this document has a small requirement as a caveat; you need to have a beginner level understanding of the Java programming language in order to understand some sections. &lt;br /&gt;
&lt;br /&gt;
There are a number of working examples described here within, which '''grep''' for statements such as “''&amp;lt;nowiki&amp;gt;public static void main(String[] args)&amp;lt;/nowiki&amp;gt;''”. The majority of the content relates to reviewing these examples and putting the Java syntax into a fuzzing perspective. &lt;br /&gt;
&lt;br /&gt;
To summarise, this tutorial focuses on customary and effective usage of fuzzing through the JBroFuzz Java APIs and the respective UI. It is targeting (without attacking them) web applications. Without further redo, let’s get fuzzing! &lt;br /&gt;
&lt;br /&gt;
=== 'Hello Google!' (forget 'Hello World') ===&lt;br /&gt;
As the traditional first program that you learn when indulging in a new programming language, 'Hello World!' represents the norm for understanding the basic output operations and syntax (let alone compiler and execution behaviour) of the language in question. &lt;br /&gt;
&lt;br /&gt;
As with most web application security related tools, when I am given the responsibility to run them, often in order to understand how they work, I would first craft a legitimate, single request to a trusted (to be up and behaving) popular Internet location. Needless, to say this request more than on occasion finds itself on Google servers. &lt;br /&gt;
&lt;br /&gt;
So 'Hello World!' for programming languages seems to transform to 'Hello Google!' for understanding how web application security related tools work. Let us see, how JBroFuzz does it. &lt;br /&gt;
&lt;br /&gt;
• Double-click on JBroFuzz and browse to the 'Fuzzing' tab&lt;br /&gt;
&lt;br /&gt;
JBroFuzz is constituted of tabs, typically located in the bottom or top (if you bother to change the settings) of the main window. &lt;br /&gt;
&lt;br /&gt;
The 'Fuzzing' tab is where you craft your request message to a particular host. Once that is in place, you can select any part of the request and proceed into adding any number of payloads. We shall see how in later sections.&lt;br /&gt;
&lt;br /&gt;
• In the 'URL' field type: http://www.google.com/ http://www.google.com&lt;br /&gt;
&lt;br /&gt;
Unlike conventional URLs, the URL field in JBroFuzz is only used for the underlying protocol (HTTP or HTTPS), host name (e.g.  www.yahoo.com) and (optionally) port number.&lt;br /&gt;
&lt;br /&gt;
All remaining information pasted or typed into the 'URL' field will be ignored; you are expected to enter it in the 'Request' field below.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;Still, if you want to just copy-paste a URL from a browser, hit [Ctrl+L] while you are not fuzzing, paste the URL value that you have copied from a browser and JBroFuzz will automatically do the work for you. &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Examples of valid URL values to be put in the&lt;br /&gt;
&lt;br /&gt;
Treat the 'URL' and 'Request' fields as the two stages of a 'telnet' session on port 80; you are effectively using the 'URL' field to specify the equivalent of: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;&amp;gt;telnet www.google.com 8088&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As equivalent to:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
http://www.google.com:8088&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
or in the case of HTTPS:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
https://www.google.com:8088&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Naturally, default ports for HTTP is 80 and HTTPS is 443.&lt;br /&gt;
&lt;br /&gt;
• In the 'Request' field type: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
GET / HTTP/1.0&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And press 'Enter' twice&lt;br /&gt;
&lt;br /&gt;
This is where the body of the message you are sending is to be placed. So anything obeying HTTP/S protocol, such as GET and POST requests, header fields and/or HTML content should be included here.&lt;br /&gt;
&lt;br /&gt;
As part of the process of fuzzing web applications with JBroFuzz you need to have done your homework, in terms of providing a base request message. This message is what will be used later on to add payloads to particular sections of the request.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;• Hit 'Start' [Ctrl+Enter]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This will instigate the process of sending a single request to the specified host on a given (or default) port, over HTTP or HTTPS.&lt;br /&gt;
&lt;br /&gt;
Once a connection has been established JBroFuzz will proceed to submit the message you have typed into the 'Request' field.&lt;br /&gt;
&lt;br /&gt;
Finally, JBroFuzz will log all data sent and received into a file; accessing this file is typically a process of double clicking on the output line on the table at the bottom section of the 'Fuzzing' tab.&lt;br /&gt;
&lt;br /&gt;
You should see a response received in the bottom part of the 'Fuzzing' panel. Double click (or right click for more options) to see the information exchanged; typically this would be a 302 redirect pointing you to another location. Congratulations, you have just said &amp;quot;Hello&amp;quot; to Google! &lt;br /&gt;
&lt;br /&gt;
[[Image:002-JBroFuzz-Tutorial.png|500px|JBroFuzz Hello Google!]]&lt;br /&gt;
&lt;br /&gt;
Now this would typically be enough under RFC rules, to get a response back; but damn all the bots out here, most websites require further information to respond back. So, in the 'Request' field let's pretend to be a (kind of) legitimate browser by typing: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
GET / HTTP/1.0&amp;lt;br&amp;gt;&lt;br /&gt;
Host: www.google.com&amp;lt;br&amp;gt;&lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-GB; rv:1.9.0.10) Gecko/2009042316 Firefox/3.0.10 (.NET CLR 3.5.30729) JBroFuzz/1.5&amp;lt;br&amp;gt;&lt;br /&gt;
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-gb,en;q=0.5Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Not forgetting to end the request typed with two returns: Press 'Enter' twice. Again, you should be able to see a line added with the response received back. &lt;br /&gt;
&lt;br /&gt;
Practice sending single requests to a website of your choice by changing the URL and also the 'Host:' field from the 'Request' above. Also try accessing an HTTPS website. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;Alternatively, you can use the shortcut [Ctrl+L] to type in your URL, with the 'Request' field filled automatically, based on the URL you have typed. &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=== HTTP Version Numbers &amp;amp; www.cia.gov Headerless Responses ===&lt;br /&gt;
For web applications, very often ill-defined requests submitted over the Internet, will trigger semi-legitimate responses that actually do not obey HTTP RFC protocol specification. Often, even though this is not the case in this example, these responses can lead to the identification of one or more security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
In this example we test for the responses received for invalid HTTP version numbers on a particular website, namely www.cia.gov, over https. Now a word of caution here; please do not attempt to fuzz web applications that you do not have the authority to do so, especially over the Internet. &lt;br /&gt;
&lt;br /&gt;
Still, for the purposes of this tutorial exercise, we will subject a web server to no more than a dozen or so requests. These requests would be otherwise identical, if it was not for the HTTP version number incrementing by a value of 1 on each request. &lt;br /&gt;
&lt;br /&gt;
In terms of having the authority to do so, well this is identical to hitting 'Refresh' in your web browser a dozen or so times, while you are browsing to www.cia.gov. I do not consider this remotely close to any form of hacking, cracking, or proper fuzzing; web servers across the globe receive a lot more abuse than this on a daily basis. &lt;br /&gt;
&lt;br /&gt;
Finally, by the time you are reading this, the particular issue described might have been fixed. So here goes:&lt;br /&gt;
&lt;br /&gt;
• Within JBroFuzz, select: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
File -&amp;gt; Open Location [Ctrl+L]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Type: https://www.cia.gov and hit enter. This is depicted in the following screenshot:&lt;br /&gt;
&lt;br /&gt;
[[Image:003-JBroFuzz-Tutorial.png|JBroFuzz Open Location]]&lt;br /&gt;
&lt;br /&gt;
Hitting 'Enter' should automatically populate the 'URL' field and the 'Request' field within the 'Fuzzing' tab. What you see is the base request that we intend to add fuzzing payloads to. Before we do so, let us make one small alteration first:&lt;br /&gt;
&lt;br /&gt;
• Modify the first line of the 'Request' field to:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
GET / HTTP/0.0&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Our objective is to enumerate the supported by the web server (in this case www.cia.gov) HTTP version numbers, following the two digit format that it has. We could be a lot more agressive here and test for buffer overflows and all types of injection; that would be out of line without the authority to do so. Instead we are going to see how JBroFuzz will iterate through the values of 0.0 to 1.4 by means of adding a Fuzzer to our base request.&lt;br /&gt;
&lt;br /&gt;
• Highlight the second zero from the line 'GET / HTTP/0.0' and right-click, selecting 'Add'. This is depicted in the screeshot below:&lt;br /&gt;
&lt;br /&gt;
[[Image:004-JBroFuzz-Tutorial.png|400px|Adding a Fuzzer to the HTTP version number]]&lt;br /&gt;
&lt;br /&gt;
• From the appearing 'Add a Fuzzer' window, select as 'Category Name', in the most left column 'Base' and as 'Fuzzer Name' in the middle column 'Base 10 (Decimal) Alphabet.&lt;br /&gt;
&lt;br /&gt;
• Click on 'Add Fuzzer' on the bottom right of the window&lt;br /&gt;
&lt;br /&gt;
[[Image:005-JBroFuzz-Tutorial.png|400px|Adding a Fuzzer]]&lt;br /&gt;
&lt;br /&gt;
This should add a Fuzzer of length 1 that iterates over the decimal (i.e. base 10) numbers 0 to 9. If we have added a hexadecimal Fuzzer instead of a decimal one (i.e. base 16) the iteration would from 0 to F. If we had selected two digits instead of one and proceeded to add a decimal Fuzzer, the iteration would be from:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
00&amp;lt;br&amp;gt;&lt;br /&gt;
01&amp;lt;br&amp;gt;&lt;br /&gt;
..&amp;lt;br&amp;gt;&lt;br /&gt;
98&amp;lt;br&amp;gt;&lt;br /&gt;
99&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
From a User Interface (UI) perspective you should see a line added to the 'Added Payloads Table'. &lt;br /&gt;
&lt;br /&gt;
• Click 'Start' [Ctrl+Enter]&lt;br /&gt;
&lt;br /&gt;
This process will send 10 requests to the specified web server changing only first line of the request to:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
GET / HTTP/0.0...&amp;lt;br&amp;gt;&lt;br /&gt;
GET / HTTP/0.1...&amp;lt;br&amp;gt;&lt;br /&gt;
...&amp;lt;br&amp;gt;&lt;br /&gt;
GET / HTTP/0.8...&amp;lt;br&amp;gt;&lt;br /&gt;
GET / HTTP/0.9...&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
While this is ongoing, you can sort the results by 'No' in the 'Output' table in the bottom of the 'Fuzzing' tab. This should enable you to see what request is currently being transmitted and received in real time.&lt;br /&gt;
&lt;br /&gt;
Once complete, change the first line of the 'Request' field to read:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
GET / HTTP/1.0&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
• Click 'Start' [Ctrl+Enter]&lt;br /&gt;
&lt;br /&gt;
The resulting output should resemble the following screenshot:&lt;br /&gt;
&lt;br /&gt;
[[Image:006-JBroFuzz-Tutorial.png|500px|JBroFuzz Output from a Fuzzing Session]]&lt;br /&gt;
&lt;br /&gt;
Straight away we can notice a difference in the response size: For HTTP version numbers 0.0 to 0.9 we are getting back what seems fairly big in size responses; 32222 bytes in size worth of responses, given that HTTP protocol version 0.0 to 0.8 do not officially exist!&lt;br /&gt;
&lt;br /&gt;
By double-clicking on one of these requests, we can see that the web server in question is responding back with no headers, yet returning a full HTML body; this represents the 32222 bytes of response of data we are receiving back. The following screenshot illustrates this:&lt;br /&gt;
&lt;br /&gt;
[[Image:007-JBroFuzz-Tutorial.png|300px|JBroFuzz Output for a Single Request/Response]]&lt;br /&gt;
&lt;br /&gt;
Using the 'Graphing' tab we can proceed to graph the particular requests and responses for this given session. &lt;br /&gt;
&lt;br /&gt;
• Within the 'Graphing' tab, click 'Start' [Ctrl+Enter]. &lt;br /&gt;
&lt;br /&gt;
• Select the directory corresponding to the Output folder we have used for this fuzzing session. This will typically be the last one.&lt;br /&gt;
&lt;br /&gt;
• Right-click and select 'Graph'&lt;br /&gt;
&lt;br /&gt;
Once complete, browse to the 'Response Size' tab within the 'Graphing' tab, as illustrated in the screenshot below:&lt;br /&gt;
&lt;br /&gt;
[[Image:008-JBroFuzz-Tutorial.png|300px|JBroFuzz Graphing different 'Response Sizes']]&lt;br /&gt;
&lt;br /&gt;
To re-iterate this does not present a security vulnerability in any shape or form; merely the fact that by manipulating HTTP version numbers as part of the request we transmit, we can impact the response that we get back. In this case, what changes is the non-existent header fields, with some HTML content being received back.&lt;br /&gt;
&lt;br /&gt;
If I was to guess what is causing this, I would say that some sort of load balancing or content delivery is not happening as it should when non-existent version numbers are being transmitted.&lt;br /&gt;
&lt;br /&gt;
===How to Use JBroFuzz as a Fuzzing Library===&lt;br /&gt;
&lt;br /&gt;
Quite often what you need to do in terms of fuzzing, far exceeds the User Interface (UI) of JBroFuzz. For this reason, a set of core fuzzing APIs have been made available that can be used for more advanced fuzzing scenarios.&lt;br /&gt;
&lt;br /&gt;
The JBroFuzz.jar standalone archive (made available with every release) carries a core fuzzing library that holds a number of key classes. These are located under:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
org.owasp.jbrofuzz.core.*;&lt;br /&gt;
-Database.java&lt;br /&gt;
-Fuzzer.java&lt;br /&gt;
-NoSuchFuzzerException.java&lt;br /&gt;
-Prototype.java&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The class of importance is Fuzzer.java. Within JBroFuzz a Fuzzer is an instance of a java Iterator. This implies that values can be accessed by simply calling the &amp;lt;code&amp;gt;next()&amp;lt;/code&amp;gt; method once an object has been made available. Typically, a call to &amp;lt;code&amp;gt;hasNext()&amp;lt;/code&amp;gt; should also be performed prior to avoid an exception being thrown.&lt;br /&gt;
&lt;br /&gt;
A Fuzzer can be obtained from the factory method &amp;lt;code&amp;gt;createFuzzer(String, int);&amp;lt;/code&amp;gt; available for every instance of the fuzzing Database. Ergo:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Database myDatabase = new Database();&lt;br /&gt;
&lt;br /&gt;
Fuzzer myFuzzer = myDatabase.createFuzzer(&amp;quot;FUZ-ZER-ID0&amp;quot;, 5);&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So how do I use the API? Here is a simple HelloFuzzer (file called HelloFuzzer.java) example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
import org.owasp.jbrofuzz.core.*;&lt;br /&gt;
&lt;br /&gt;
public class HelloFuzzer {&lt;br /&gt;
&lt;br /&gt;
 public static void main(String[] args) {&lt;br /&gt;
&lt;br /&gt;
 Database fuzzDB = new Database();&lt;br /&gt;
&lt;br /&gt;
 try {&lt;br /&gt;
     for(Fuzzer f = fuzzDB.createFuzzer(&amp;quot;NUM-HEX-LOW&amp;quot;, 4); f.hasNext();) {&lt;br /&gt;
       // Get the next payload value...&lt;br /&gt;
       System.out.println(&amp;quot; The fuzzer payload is: &amp;quot; + f.next());&lt;br /&gt;
     }&lt;br /&gt;
   } catch (NoSuchFuzzerException e) {&lt;br /&gt;
       System.out.println(&amp;quot;Could not find fuzzer &amp;quot; + e.getMessage());&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
} // HelloFuzzer.java OWASP JBroFuzz Example 1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A command of: &amp;lt;code&amp;gt;javac -classpath JBroFuzz.jar HelloFuzzer.java&amp;lt;/code&amp;gt; should compile the above program on command line. &lt;br /&gt;
&lt;br /&gt;
Within the JBroFuzz.jar file, there is a file called fuzzers.jbrofuzz that carries all the fuzzer definitions that you see in the UI payloads tab of JBroFuzz.&lt;br /&gt;
&lt;br /&gt;
Fuzzers belong in categories (1 to many) and each fuzzer carries a set of payloads that define the alphabet of the fuzzer.&lt;br /&gt;
&lt;br /&gt;
Also, you have replacive or recursive fuzzers, based on the OWASP testing guide v2. For example, the hexadecimal alphabet is fuzzer definition is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
R:NUM-HEX-LOW:Base16 (Hex) Lowercase:16&lt;br /&gt;
&amp;gt; Number Systems | Base | Recursive Fuzzers | Lowercase Fuzzers&lt;br /&gt;
0&lt;br /&gt;
1&lt;br /&gt;
2&lt;br /&gt;
3&lt;br /&gt;
4&lt;br /&gt;
5&lt;br /&gt;
6&lt;br /&gt;
7&lt;br /&gt;
8&lt;br /&gt;
9&lt;br /&gt;
a&lt;br /&gt;
b&lt;br /&gt;
c&lt;br /&gt;
d&lt;br /&gt;
e&lt;br /&gt;
f&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
stealing from the file fuzzers.jbrofuzz.&lt;br /&gt;
&lt;br /&gt;
There is very little preventing you from defining your own fuzzers within this file, by following the file format specified above. You can use the UI to see if they have been loaded successfully. &lt;br /&gt;
&lt;br /&gt;
Further to recursive and replacive fuzzers you also have zero fuzzers (i.e. a zero fuzzer of 1000 will just transmit 1000 requests as they are, without adding any payloads) double fuzzers, cross product fuzzers, etc. &lt;br /&gt;
&lt;br /&gt;
Notice the factory method Database.createFuzzer(&amp;quot;NUM-HEX&amp;quot;, 4) yielding: &amp;quot;I want a 4 digit recursive fuzzer (why because NUM-HEX is recursive in its definition, starts with R: instead of P:) of HEX digits.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Thus the above scenario would iterate through all the digits from 0000 to ffff. I wouldn't recommend using the above scenario for such trivial fuzzing capabilities; simply presented as an example of the inner workings of JBroFuzz.jar&lt;br /&gt;
&lt;br /&gt;
A more detailed code breakdown of the above HelloFuzzer example can be found below:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/**&lt;br /&gt;
 * JBroFuzz API Examples 01&lt;br /&gt;
 *&lt;br /&gt;
 * JBroFuzz - A stateless network protocol fuzzer for web applications.&lt;br /&gt;
 * &lt;br /&gt;
 * Copyright (C) 2007, 2008, 2009 subere@uncon.org&lt;br /&gt;
 *&lt;br /&gt;
 * This file is part of the JBroFuzz API examples on how to use the &lt;br /&gt;
 * fuzzer libraries included in JBroFuzz.jar.&lt;br /&gt;
 * &lt;br /&gt;
 * JBroFuzz is free software: you can redistribute it and/or modify&lt;br /&gt;
 * it under the terms of the GNU General Public License as published by&lt;br /&gt;
 * the Free Software Foundation, either version 3 of the License, or&lt;br /&gt;
 * (at your option) any later version.&lt;br /&gt;
 * &lt;br /&gt;
 * JBroFuzz is distributed in the hope that it will be useful,&lt;br /&gt;
 * but WITHOUT ANY WARRANTY; without even the implied warranty of&lt;br /&gt;
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the&lt;br /&gt;
 * GNU General Public License for more details.&lt;br /&gt;
 * &lt;br /&gt;
 * You should have received a copy of the GNU General Public License&lt;br /&gt;
 * along with JBroFuzz.  If not, see &amp;lt;http://www.gnu.org/licenses/&amp;gt;.&lt;br /&gt;
 * Alternatively, write to the Free Software Foundation, Inc., 51 &lt;br /&gt;
 * Franklin Street, Fifth Floor, Boston, MA  02110-1301, USA.&lt;br /&gt;
 * &lt;br /&gt;
 * Verbatim copying and distribution of this entire program file is &lt;br /&gt;
 * permitted in any medium without royalty provided this notice &lt;br /&gt;
 * is preserved. &lt;br /&gt;
 * &lt;br /&gt;
 */&lt;br /&gt;
&lt;br /&gt;
import org.owasp.jbrofuzz.core.NoSuchFuzzerException;&lt;br /&gt;
import org.owasp.jbrofuzz.core.Database;&lt;br /&gt;
import org.owasp.jbrofuzz.core.Fuzzer; &lt;br /&gt;
&lt;br /&gt;
/**&lt;br /&gt;
 * &amp;lt;p&amp;gt;In JBroFuzz a Fuzzer is a java Iterator.&amp;lt;/p&amp;gt;&lt;br /&gt;
 * &lt;br /&gt;
 * &amp;lt;p&amp;gt;In order to create a Fuzzer, use the factory method&lt;br /&gt;
 * Database.createFuzzer(String, int), passing as arguments&lt;br /&gt;
 * the Fuzzer ID and the specified length as a positive int.&amp;lt;/p&amp;gt;&lt;br /&gt;
 * &lt;br /&gt;
 * &amp;lt;p&amp;gt;Be careful to check that the fuzzer ID (labelled as f_ID)&lt;br /&gt;
 * is actually an existing ID from the Database of Fuzzers.&amp;lt;/p&amp;gt;&lt;br /&gt;
 * &lt;br /&gt;
 * &amp;lt;p&amp;gt;Expected Output:&amp;lt;/p&amp;gt;&lt;br /&gt;
 * &amp;lt;code&amp;gt;&lt;br /&gt;
 *  The fuzzer payload is: 00000&amp;lt;br&amp;gt;&lt;br /&gt;
 *  The fuzzer payload is: 00001&amp;lt;br&amp;gt;&lt;br /&gt;
 *  ...&amp;lt;br&amp;gt;&lt;br /&gt;
 *  (a total of 16^5 = 1048576 lines)&amp;lt;br&amp;gt;&lt;br /&gt;
 *  ...&amp;lt;br&amp;gt;&lt;br /&gt;
 *  The fuzzer payload is: ffffd&amp;lt;br&amp;gt;&lt;br /&gt;
 *	The fuzzer payload is: ffffe&amp;lt;br&amp;gt;&lt;br /&gt;
 *	The fuzzer payload is: fffff&amp;lt;br&amp;gt;&lt;br /&gt;
 * &amp;lt;/code&amp;gt;&lt;br /&gt;
 * &lt;br /&gt;
 * &amp;lt;p&amp;gt;For more information on the Database of Fuzzers, see the&lt;br /&gt;
 * HelloDatabase Class.&amp;lt;/p&amp;gt;&lt;br /&gt;
 * &lt;br /&gt;
 * @author subere@uncon.org&lt;br /&gt;
 * @version n/a&lt;br /&gt;
 */&lt;br /&gt;
public class HelloFuzzer {&lt;br /&gt;
&lt;br /&gt;
	/**&lt;br /&gt;
	 * @param args&lt;br /&gt;
	 */&lt;br /&gt;
	public static void main(String[] args) {&lt;br /&gt;
&lt;br /&gt;
		// You have to construct an instance of the fuzzers database&lt;br /&gt;
		Database fuzzDB = new Database();&lt;br /&gt;
		// You have to supply a valid fuzzer ID&lt;br /&gt;
		String f_ID = &amp;quot;NUM-HEX-LOW&amp;quot;;&lt;br /&gt;
		// You have to supply a (+)tive int&lt;br /&gt;
		int f_len = 5;&lt;br /&gt;
		&lt;br /&gt;
		try {&lt;br /&gt;
			&lt;br /&gt;
			for(Fuzzer f = fuzzDB.createFuzzer(f_ID, f_len); f.hasNext();) {&lt;br /&gt;
				&lt;br /&gt;
				// Get the next payload value...&lt;br /&gt;
				System.out.println(&amp;quot; The fuzzer payload is: &amp;quot; + f.next());&lt;br /&gt;
				&lt;br /&gt;
			}&lt;br /&gt;
&lt;br /&gt;
		} catch (NoSuchFuzzerException e) {&lt;br /&gt;
			&lt;br /&gt;
			System.out.println(&amp;quot;Could not find fuzzer &amp;quot; + e.getMessage());&lt;br /&gt;
			&lt;br /&gt;
		}&lt;br /&gt;
&lt;br /&gt;
	}&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Also, the second example below focuses on accessing the Database of Fuzzers. In JBroFuzz, all Fuzzers are stored in a Database object that you will be required to construct in order to access them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/**&lt;br /&gt;
 * JBroFuzz API Examples 02&lt;br /&gt;
 *&lt;br /&gt;
 * JBroFuzz - A stateless network protocol fuzzer for web applications.&lt;br /&gt;
 * &lt;br /&gt;
 * Copyright (C) 2007, 2008, 2009 subere@uncon.org&lt;br /&gt;
 *&lt;br /&gt;
 * This file is part of the JBroFuzz API examples on how to use the &lt;br /&gt;
 * fuzzer libraries included in JBroFuzz.jar.&lt;br /&gt;
 * &lt;br /&gt;
 * JBroFuzz is free software: you can redistribute it and/or modify&lt;br /&gt;
 * it under the terms of the GNU General Public License as published by&lt;br /&gt;
 * the Free Software Foundation, either version 3 of the License, or&lt;br /&gt;
 * (at your option) any later version.&lt;br /&gt;
 * &lt;br /&gt;
 * JBroFuzz is distributed in the hope that it will be useful,&lt;br /&gt;
 * but WITHOUT ANY WARRANTY; without even the implied warranty of&lt;br /&gt;
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the&lt;br /&gt;
 * GNU General Public License for more details.&lt;br /&gt;
 * &lt;br /&gt;
 * You should have received a copy of the GNU General Public License&lt;br /&gt;
 * along with JBroFuzz.  If not, see &amp;lt;http://www.gnu.org/licenses/&amp;gt;.&lt;br /&gt;
 * Alternatively, write to the Free Software Foundation, Inc., 51 &lt;br /&gt;
 * Franklin Street, Fifth Floor, Boston, MA  02110-1301, USA.&lt;br /&gt;
 * &lt;br /&gt;
 * Verbatim copying and distribution of this entire program file is &lt;br /&gt;
 * permitted in any medium without royalty provided this notice &lt;br /&gt;
 * is preserved. &lt;br /&gt;
 * &lt;br /&gt;
 */&lt;br /&gt;
&lt;br /&gt;
import org.owasp.jbrofuzz.core.NoSuchFuzzerException;&lt;br /&gt;
import org.owasp.jbrofuzz.core.Database;&lt;br /&gt;
import org.owasp.jbrofuzz.core.Fuzzer; &lt;br /&gt;
&lt;br /&gt;
/**&lt;br /&gt;
 * &amp;lt;p&amp;gt;In JBroFuzz all Fuzzers are stored in a Database&lt;br /&gt;
 * object that you will be required to construct in order&lt;br /&gt;
 * to access them.&amp;lt;/p&amp;gt;&lt;br /&gt;
 * &lt;br /&gt;
 * &amp;lt;p&amp;gt;Within the Database, each Fuzzer is a collection of &lt;br /&gt;
 * payloads, which carries a unique ID string value.&amp;lt;/p&amp;gt;&lt;br /&gt;
 * &lt;br /&gt;
 * &amp;lt;p&amp;gt;Example ID values are the output of this program:&amp;lt;/p&amp;gt;&lt;br /&gt;
 * &amp;lt;code&amp;gt;&lt;br /&gt;
 *  The fuzzer ID is: LDP-INJ&amp;lt;br&amp;gt;&lt;br /&gt;
 *	The name of the fuzzer is:			LDAP Injection&amp;lt;br&amp;gt;&lt;br /&gt;
 *	The id of the fuzzer is:			LDP-INJ&amp;lt;br&amp;gt;&lt;br /&gt;
 *	The of payloads it carries (it's alphabet) is:	20&amp;lt;br&amp;gt;&lt;br /&gt;
 *	It has as 1st payload:&amp;lt;br&amp;gt;&lt;br /&gt;
 *		|&amp;lt;br&amp;gt;&lt;br /&gt;
 *  The fuzzer ID is: XSS-IE4-567&amp;lt;br&amp;gt;&lt;br /&gt;
 *	The name of the fuzzer is:			XSS IE&amp;lt;br&amp;gt;&lt;br /&gt;
 *	The id of the fuzzer is:			XSS-IE4-567&amp;lt;br&amp;gt;&lt;br /&gt;
 *	The of payloads it carries (it's alphabet) is:	38&amp;lt;br&amp;gt;&lt;br /&gt;
 *	It has as 1st payload:&amp;lt;br&amp;gt;&lt;br /&gt;
 *		&amp;lt; img src=`x` onrerror= ` ;; alert(1) ` /&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
 *&lt;br /&gt;
 * &amp;lt;/code&amp;gt;&lt;br /&gt;
 * &lt;br /&gt;
 * &amp;lt;p&amp;gt;Do not be confused between Prototypes and Fuzzers; &lt;br /&gt;
 * JBroFuzz uses Prototype objects to construct the Fuzzers&lt;br /&gt;
 * that get added into the Database upon initialisation.&amp;lt;/p&amp;gt;&lt;br /&gt;
 * &lt;br /&gt;
 * &amp;lt;p&amp;gt;As a result, the getter methods available within a Database&lt;br /&gt;
 * object can carry the name of getAllPrototypeIDs and &lt;br /&gt;
 * getAllFuzzerIDs interchangebly.&amp;lt;/p&amp;gt;&lt;br /&gt;
 * &lt;br /&gt;
 * @author subere@uncon.org&lt;br /&gt;
 * @version n/a&lt;br /&gt;
 */&lt;br /&gt;
public class HelloDatabase {&lt;br /&gt;
&lt;br /&gt;
	/**&lt;br /&gt;
	 * @param args&lt;br /&gt;
	 */&lt;br /&gt;
	public static void main(String[] args) {&lt;br /&gt;
&lt;br /&gt;
		// You have to construct an instance of the fuzzers database&lt;br /&gt;
		Database fuzzDB = new Database();&lt;br /&gt;
&lt;br /&gt;
		// Get a list of all the fuzzer IDs from the database&lt;br /&gt;
		String[] fuzzer_IDs = fuzzDB.getAllPrototypeIDs();&lt;br /&gt;
		&lt;br /&gt;
		System.out.println(&amp;quot;The fuzzer IDs found are:&amp;quot;);&lt;br /&gt;
		&lt;br /&gt;
		for(String fuzzerID : fuzzer_IDs) {&lt;br /&gt;
			&lt;br /&gt;
			System.out.println(&amp;quot;The fuzzer ID is: &amp;quot; + fuzzerID);&lt;br /&gt;
			&lt;br /&gt;
			// We pass of length of 1, irrelevant if we are&lt;br /&gt;
			// just going to access the first payload&lt;br /&gt;
			// of the fuzzer&lt;br /&gt;
			Fuzzer fuzzer;&lt;br /&gt;
			try {&lt;br /&gt;
				&lt;br /&gt;
				fuzzer = fuzzDB.createFuzzer(fuzzerID, 1);&lt;br /&gt;
				// Normally you should check for fuzzer.hasNext()				&lt;br /&gt;
				String payload = fuzzer.next();&lt;br /&gt;
				&lt;br /&gt;
				System.out.println(&amp;quot;\tThe name of the fuzzer is:\t\t\t&amp;quot; + fuzzer.getName() );&lt;br /&gt;
				System.out.println(&amp;quot;\tThe id of the fuzzer is:\t\t\t&amp;quot; + fuzzer.getId() );&lt;br /&gt;
				System.out.println(&amp;quot;\tThe of payloads it carries (it's alphabet) is:\t&amp;quot; + fuzzDB.getSize(fuzzerID));&lt;br /&gt;
				System.out.println(&amp;quot;\tIt has as 1st payload:\n\t\t&amp;quot; + payload );&lt;br /&gt;
&lt;br /&gt;
			} catch (NoSuchFuzzerException e) {&lt;br /&gt;
				System.out.println(&amp;quot;Could not find the specified fuzzer!&amp;quot;);&lt;br /&gt;
				System.out.println(&amp;quot;Going to print all the fuzzer IDs I know:&amp;quot;);&lt;br /&gt;
				// old vs new for loop :)&lt;br /&gt;
				// in case of an error, print just the &lt;br /&gt;
				// fuzzer IDs, accessed from the DB&lt;br /&gt;
				for(int j = 0; j &amp;lt; fuzzer_IDs.length; j++) {&lt;br /&gt;
					System.out.println(&amp;quot;The fuzzer ID is: &amp;quot; + fuzzer_IDs[j]);&lt;br /&gt;
				}&lt;br /&gt;
				&lt;br /&gt;
			}&lt;br /&gt;
			&lt;br /&gt;
		}&lt;br /&gt;
		&lt;br /&gt;
	}&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A final example of this section, involves seeing the usage of all the method calls available in the Fuzzer.java class&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/**&lt;br /&gt;
 * JBroFuzz API Examples 03&lt;br /&gt;
 *&lt;br /&gt;
 * JBroFuzz - A stateless network protocol fuzzer for web applications.&lt;br /&gt;
 * &lt;br /&gt;
 * Copyright (C) 2007, 2008, 2009 subere@uncon.org&lt;br /&gt;
 *&lt;br /&gt;
 * This file is part of the JBroFuzz API examples on how to use the &lt;br /&gt;
 * fuzzer libraries included in JBroFuzz.jar.&lt;br /&gt;
 * &lt;br /&gt;
 * JBroFuzz is free software: you can redistribute it and/or modify&lt;br /&gt;
 * it under the terms of the GNU General Public License as published by&lt;br /&gt;
 * the Free Software Foundation, either version 3 of the License, or&lt;br /&gt;
 * (at your option) any later version.&lt;br /&gt;
 * &lt;br /&gt;
 * JBroFuzz is distributed in the hope that it will be useful,&lt;br /&gt;
 * but WITHOUT ANY WARRANTY; without even the implied warranty of&lt;br /&gt;
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the&lt;br /&gt;
 * GNU General Public License for more details.&lt;br /&gt;
 * &lt;br /&gt;
 * You should have received a copy of the GNU General Public License&lt;br /&gt;
 * along with JBroFuzz.  If not, see &amp;lt;http://www.gnu.org/licenses/&amp;gt;.&lt;br /&gt;
 * Alternatively, write to the Free Software Foundation, Inc., 51 &lt;br /&gt;
 * Franklin Street, Fifth Floor, Boston, MA  02110-1301, USA.&lt;br /&gt;
 * &lt;br /&gt;
 * Verbatim copying and distribution of this entire program file is &lt;br /&gt;
 * permitted in any medium without royalty provided this notice &lt;br /&gt;
 * is preserved. &lt;br /&gt;
 * &lt;br /&gt;
 */&lt;br /&gt;
&lt;br /&gt;
import org.owasp.jbrofuzz.core.NoSuchFuzzerException;&lt;br /&gt;
import org.owasp.jbrofuzz.core.Database;&lt;br /&gt;
import org.owasp.jbrofuzz.core.Fuzzer; &lt;br /&gt;
&lt;br /&gt;
/**&lt;br /&gt;
 * &amp;lt;p&amp;gt;Example iterating through all the methods available&lt;br /&gt;
 * in the Fuzzer Object and their respective outputs.&amp;lt;/p&amp;gt;&lt;br /&gt;
 *&lt;br /&gt;
 * @author subere@uncon.org&lt;br /&gt;
 * @version n/a&lt;br /&gt;
 */&lt;br /&gt;
public class IndigoFuzzerTests {&lt;br /&gt;
&lt;br /&gt;
	/**&lt;br /&gt;
	 * @param args&lt;br /&gt;
	 */&lt;br /&gt;
	public static void main(String[] args) {&lt;br /&gt;
&lt;br /&gt;
		// You have to construct an instance of the fuzzers database&lt;br /&gt;
		Database fuzzDB = new Database();&lt;br /&gt;
		// You have to supply a valid fuzzer ID&lt;br /&gt;
		String f_ID = &amp;quot;NUM-HEX-LOW&amp;quot;;&lt;br /&gt;
		// You have to supply a (+)tive int&lt;br /&gt;
		int f_len = 5;&lt;br /&gt;
&lt;br /&gt;
		try {&lt;br /&gt;
			&lt;br /&gt;
			Fuzzer f = fuzzDB.createFuzzer(f_ID, f_len);&lt;br /&gt;
&lt;br /&gt;
			while(f.hasNext()) {&lt;br /&gt;
				&lt;br /&gt;
				// Could do this via reflection, but..&lt;br /&gt;
				f.next();&lt;br /&gt;
				// System.out.println(&amp;quot; The fuzzer payload is: &amp;quot; + f.next());&lt;br /&gt;
				System.out.println(&amp;quot; The maximum value is: &amp;quot; + f.getMaximumValue());&lt;br /&gt;
&lt;br /&gt;
				System.out.println(&amp;quot; The current value is: &amp;quot; + f.getCurrectValue());&lt;br /&gt;
				&lt;br /&gt;
&lt;br /&gt;
				&lt;br /&gt;
			}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
		} catch (NoSuchFuzzerException e) {&lt;br /&gt;
			&lt;br /&gt;
			System.out.println(&amp;quot;Could not find fuzzer &amp;quot; + e.getMessage());&lt;br /&gt;
			&lt;br /&gt;
		}&lt;br /&gt;
&lt;br /&gt;
	}&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Performing User Enumeration with a Valid Set of Credentials ===&lt;br /&gt;
&lt;br /&gt;
Often you encounter an application that allows for the enumeration of one or more pages after a user has been successfully granted a set of session credentials. One of the key areas to test from an application specific perspective, relates to the page(s) that provide user account information.&lt;br /&gt;
&lt;br /&gt;
In the following example, we investigate an ASP.NET 2.0 application with a C# back-end. In this, an authenticated user has the option to select to &amp;quot;View My Profile&amp;quot;. This page provides them with account information (including the typical username, email address, further notes) that they can proceed to update and save to the back-end system.&lt;br /&gt;
&lt;br /&gt;
After a user has authenticated, the following URL, gives them access to their profile information stored on the database:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
http://www.myattackingdomain.com/portal-location/UserInfo.aspx?UserID=23&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Simple investigation confirms that the digits allowed as part of the UserID value are decimal numbers only. Lets feed that information into JBroFuzz.&lt;br /&gt;
&lt;br /&gt;
• Within JBroFuzz, select: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
File -&amp;gt; Open Location [Ctrl+L]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Type: http://www.myattackingdomain.com/portal-location/UserInfo.aspx?UserID=23 and hit enter. This is depicted in the following screenshot:&lt;br /&gt;
&lt;br /&gt;
[[Image:009-JBroFuzz-Tutorial.png|300px|JBroFuzz 'GET' Request with a 'UserID' parameter]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_JBroFuzz_FAQ&amp;diff=73925</id>
		<title>OWASP JBroFuzz FAQ</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_JBroFuzz_FAQ&amp;diff=73925"/>
				<updated>2009-11-21T15:02:03Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP JBroFuzz]]&lt;br /&gt;
&lt;br /&gt;
==JBroFuzz Frequently Asked Questions (FAQ)==&lt;br /&gt;
&lt;br /&gt;
===Q: What can I find within this section?===&lt;br /&gt;
&lt;br /&gt;
Frequently asked questions cover basic guidelines and pointers towards aspects of using JBroFuzz, it's purpose and underlying philosophy.&lt;br /&gt;
&lt;br /&gt;
More detailed information, can be found in the Help Topics section, under &amp;lt;code&amp;gt;Help -&amp;gt; Topics&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Q: Fancy wording what does JBroFuzz actually do?===&lt;br /&gt;
&lt;br /&gt;
JBroFuzz has the ability to send intentionally malformed data to any web server, recording the responses.&lt;br /&gt;
&lt;br /&gt;
This yields testing certain aspects of the security of web servers, by crafting corresponding requests and reviewing the responses received.&lt;br /&gt;
&lt;br /&gt;
The term stateless simply implies that the different requests/replies being generated do not depend on previous ones made.&lt;br /&gt;
&lt;br /&gt;
===Q: What JBroFuzz is not claiming to be..===&lt;br /&gt;
&lt;br /&gt;
The automated answer to your problems regarding sending a bunch of AAA's to a listening web service.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, you still have to know a bit about fuzzing web applications, HTTP and HTTPS, headers GET and POST statements, etc.&lt;br /&gt;
&lt;br /&gt;
==System Requirements==&lt;br /&gt;
&lt;br /&gt;
===Q: What operating systems has JBroFuzz been tested on?===&lt;br /&gt;
&lt;br /&gt;
JBroFuzz has been tested on the following operating systems: Mac OSX, Win32, RHEL 4, Centos 4.x, Backtrack 3.&lt;br /&gt;
&lt;br /&gt;
Also, you will need to have Java 1.6 or greater installed on your system. For more details, view the Java FAQ section, below.&lt;br /&gt;
&lt;br /&gt;
===Q: What permissions do I need to run JBroFuzz?===&lt;br /&gt;
&lt;br /&gt;
You will require write permissions within the directory that you execute JBroFuzz from.&lt;br /&gt;
&lt;br /&gt;
Each time you run JBroFuzz a directory structure for holding all the corresponding files generated while using the tool is created.&lt;br /&gt;
&lt;br /&gt;
==Java==&lt;br /&gt;
&lt;br /&gt;
===Q: How do I run the .jar file?===&lt;br /&gt;
&lt;br /&gt;
Say the file you want to run is named: JBroFuzz.jar&lt;br /&gt;
&lt;br /&gt;
From the command line type the following:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
&amp;gt;&amp;gt;java -jar JBroFuzz.jar&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You will need to have Java installed on your system. It's probably worth checking: http://www.java.sun.com&lt;br /&gt;
&lt;br /&gt;
===Q: Do I need a Java Runtime Environment (JRE)?===&lt;br /&gt;
&lt;br /&gt;
Yes. JBroFuzz will run on any platform for which a JRE is available.&lt;br /&gt;
&lt;br /&gt;
JREs for Windows, Linux and Solaris can be obtained for free from http://java.sun.com/j2se/downloads.html&lt;br /&gt;
&lt;br /&gt;
===Q: How much memory should I launch JBroFuzz with?===&lt;br /&gt;
&lt;br /&gt;
By default the JRE settings are typically limited to 64 Mb of memory. If JBroFuzz is to be used for memory intensive operations, it is advised to use 256 Mb of memory.&lt;br /&gt;
&lt;br /&gt;
Say the file you want to run with 256Mb of available memory is named: JBroFuzz.jar&lt;br /&gt;
&lt;br /&gt;
From the command line type the following:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
&amp;gt;&amp;gt;java -jar -Xmx256m JBroFuzz.jar&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You will need to have Java installed on your system. It's probably worth checking: http://www.java.sun.com&lt;br /&gt;
&lt;br /&gt;
===Q: What version of Java does JBroFuzz require to run?===&lt;br /&gt;
&lt;br /&gt;
JDK/JRE 1.6 or later.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
&lt;br /&gt;
===Q: What files is JBroFuzz released in?===&lt;br /&gt;
&lt;br /&gt;
There is a standalone executable (.exe), a standalone java archive (.jar) and an installer (.msi) for win32 platforms.&lt;br /&gt;
&lt;br /&gt;
* JBroFuzz.exe The standalone executable requiring no further installation, simply run the file.&lt;br /&gt;
* JBroFuzz.jar The standalone, platform independent java archive requiring no further installation, simply run the file.&lt;br /&gt;
* JBroFuzz.msi An installer available for win32 platforms.&lt;br /&gt;
&lt;br /&gt;
===Q: Do I need to install JBroFuzz?===&lt;br /&gt;
&lt;br /&gt;
No. JBroFuzz can be run as a standalone executable or java archive with all the functionality and features enabled.&lt;br /&gt;
&lt;br /&gt;
===Q: I run the exe or jar and the folder jbrofuzz does not get created, what's wrong?===&lt;br /&gt;
&lt;br /&gt;
For most browsers, if you select to run the exe / jar after it has finished downloading through the web browser, you will be limited to the security policy in place.&lt;br /&gt;
&lt;br /&gt;
Typically, this will not allow the application to create any files or folders within the downloaded location.&lt;br /&gt;
&lt;br /&gt;
Run the exe or jar file through the operating system, instead of the browser. Alternatively, download and install JBroFuzz using the msi installer.&lt;br /&gt;
&lt;br /&gt;
===Q: How can I download the latest copy of JBroFuzz?===&lt;br /&gt;
&lt;br /&gt;
JBroFuzz is an OWASP Project. It is free to download and open source.&lt;br /&gt;
&lt;br /&gt;
To make sure you are running the latest version select &amp;quot;Check for Updates...&amp;quot; from the Options menu, within the application.&lt;br /&gt;
&lt;br /&gt;
==Files &amp;amp; Directories==&lt;br /&gt;
&lt;br /&gt;
===Q: What files and directories get created when I launch JBroFuzz?===&lt;br /&gt;
&lt;br /&gt;
At launch JBroFuzz creates the following folders within the directory in which it is.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
jbrofuzz | fuzz | 001 2009-01-01 10-10-50&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The final directory (a timestamp) is where all file fuzzing data is stored in individual files.&lt;br /&gt;
&lt;br /&gt;
==Fuzzers &amp;amp; Payloads==&lt;br /&gt;
&lt;br /&gt;
===Q: What is a Fuzzer?===&lt;br /&gt;
&lt;br /&gt;
A fuzzer is a collection of payloads. A fuzzer contains a particular character set which will be tested against the specified range of the request.&lt;br /&gt;
&lt;br /&gt;
Some examples of fuzzers:&lt;br /&gt;
&lt;br /&gt;
* Sending all requests of : 0000 to 1111 (binary prototype over 4 characters)&lt;br /&gt;
* Sending all requests of : 00 to 99 (decimal prototype over 2 characters).&lt;br /&gt;
&lt;br /&gt;
To get a better understanding of how fuzzers work, view the tutorial demo that is available for download.&lt;br /&gt;
&lt;br /&gt;
===Q: Where are all the fuzzer definitions stored?===&lt;br /&gt;
&lt;br /&gt;
All fuzzer definitions are loaded from the file fuzzers.jbrofuzz&lt;br /&gt;
&lt;br /&gt;
This is an internal file within JBroFuzz and can be found inside the JBroFuzz.jar java archive.&lt;br /&gt;
&lt;br /&gt;
===Q: How do I learn more about fuzzing?===&lt;br /&gt;
&lt;br /&gt;
An attempt to define the term can be found on the spike mailing list:&lt;br /&gt;
&lt;br /&gt;
http://marc2.theaimsgroup.com/?l=spike&amp;amp;m=105606327823227&amp;amp;w=2&lt;br /&gt;
&lt;br /&gt;
http://www.scadasec.net/secwiki/FuzzingTools&lt;br /&gt;
&lt;br /&gt;
==Older Features/Versions==&lt;br /&gt;
&lt;br /&gt;
===Q: Where is the &amp;quot;Web Directories&amp;quot; tab?===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Web Directories&amp;quot; tab was removed in version 1.2.&lt;br /&gt;
&lt;br /&gt;
The original list of directories (directories.jbrofuzz) that was being used in JBroFuzz can still be found in distributions of [http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project DirBuster].&lt;br /&gt;
&lt;br /&gt;
As [http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project DirBuster] is a dedicated tool focusing on directory enumeration, it is suggested you use that tool.&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_JBroFuzz_FAQ&amp;diff=73924</id>
		<title>OWASP JBroFuzz FAQ</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_JBroFuzz_FAQ&amp;diff=73924"/>
				<updated>2009-11-21T15:01:45Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[Category:OWASP_JBroFuzz]&lt;br /&gt;
&lt;br /&gt;
==JBroFuzz Frequently Asked Questions (FAQ)==&lt;br /&gt;
&lt;br /&gt;
===Q: What can I find within this section?===&lt;br /&gt;
&lt;br /&gt;
Frequently asked questions cover basic guidelines and pointers towards aspects of using JBroFuzz, it's purpose and underlying philosophy.&lt;br /&gt;
&lt;br /&gt;
More detailed information, can be found in the Help Topics section, under &amp;lt;code&amp;gt;Help -&amp;gt; Topics&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Q: Fancy wording what does JBroFuzz actually do?===&lt;br /&gt;
&lt;br /&gt;
JBroFuzz has the ability to send intentionally malformed data to any web server, recording the responses.&lt;br /&gt;
&lt;br /&gt;
This yields testing certain aspects of the security of web servers, by crafting corresponding requests and reviewing the responses received.&lt;br /&gt;
&lt;br /&gt;
The term stateless simply implies that the different requests/replies being generated do not depend on previous ones made.&lt;br /&gt;
&lt;br /&gt;
===Q: What JBroFuzz is not claiming to be..===&lt;br /&gt;
&lt;br /&gt;
The automated answer to your problems regarding sending a bunch of AAA's to a listening web service.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, you still have to know a bit about fuzzing web applications, HTTP and HTTPS, headers GET and POST statements, etc.&lt;br /&gt;
&lt;br /&gt;
==System Requirements==&lt;br /&gt;
&lt;br /&gt;
===Q: What operating systems has JBroFuzz been tested on?===&lt;br /&gt;
&lt;br /&gt;
JBroFuzz has been tested on the following operating systems: Mac OSX, Win32, RHEL 4, Centos 4.x, Backtrack 3.&lt;br /&gt;
&lt;br /&gt;
Also, you will need to have Java 1.6 or greater installed on your system. For more details, view the Java FAQ section, below.&lt;br /&gt;
&lt;br /&gt;
===Q: What permissions do I need to run JBroFuzz?===&lt;br /&gt;
&lt;br /&gt;
You will require write permissions within the directory that you execute JBroFuzz from.&lt;br /&gt;
&lt;br /&gt;
Each time you run JBroFuzz a directory structure for holding all the corresponding files generated while using the tool is created.&lt;br /&gt;
&lt;br /&gt;
==Java==&lt;br /&gt;
&lt;br /&gt;
===Q: How do I run the .jar file?===&lt;br /&gt;
&lt;br /&gt;
Say the file you want to run is named: JBroFuzz.jar&lt;br /&gt;
&lt;br /&gt;
From the command line type the following:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
&amp;gt;&amp;gt;java -jar JBroFuzz.jar&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You will need to have Java installed on your system. It's probably worth checking: http://www.java.sun.com&lt;br /&gt;
&lt;br /&gt;
===Q: Do I need a Java Runtime Environment (JRE)?===&lt;br /&gt;
&lt;br /&gt;
Yes. JBroFuzz will run on any platform for which a JRE is available.&lt;br /&gt;
&lt;br /&gt;
JREs for Windows, Linux and Solaris can be obtained for free from http://java.sun.com/j2se/downloads.html&lt;br /&gt;
&lt;br /&gt;
===Q: How much memory should I launch JBroFuzz with?===&lt;br /&gt;
&lt;br /&gt;
By default the JRE settings are typically limited to 64 Mb of memory. If JBroFuzz is to be used for memory intensive operations, it is advised to use 256 Mb of memory.&lt;br /&gt;
&lt;br /&gt;
Say the file you want to run with 256Mb of available memory is named: JBroFuzz.jar&lt;br /&gt;
&lt;br /&gt;
From the command line type the following:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
&amp;gt;&amp;gt;java -jar -Xmx256m JBroFuzz.jar&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You will need to have Java installed on your system. It's probably worth checking: http://www.java.sun.com&lt;br /&gt;
&lt;br /&gt;
===Q: What version of Java does JBroFuzz require to run?===&lt;br /&gt;
&lt;br /&gt;
JDK/JRE 1.6 or later.&lt;br /&gt;
&lt;br /&gt;
==Installation==&lt;br /&gt;
&lt;br /&gt;
===Q: What files is JBroFuzz released in?===&lt;br /&gt;
&lt;br /&gt;
There is a standalone executable (.exe), a standalone java archive (.jar) and an installer (.msi) for win32 platforms.&lt;br /&gt;
&lt;br /&gt;
* JBroFuzz.exe The standalone executable requiring no further installation, simply run the file.&lt;br /&gt;
* JBroFuzz.jar The standalone, platform independent java archive requiring no further installation, simply run the file.&lt;br /&gt;
* JBroFuzz.msi An installer available for win32 platforms.&lt;br /&gt;
&lt;br /&gt;
===Q: Do I need to install JBroFuzz?===&lt;br /&gt;
&lt;br /&gt;
No. JBroFuzz can be run as a standalone executable or java archive with all the functionality and features enabled.&lt;br /&gt;
&lt;br /&gt;
===Q: I run the exe or jar and the folder jbrofuzz does not get created, what's wrong?===&lt;br /&gt;
&lt;br /&gt;
For most browsers, if you select to run the exe / jar after it has finished downloading through the web browser, you will be limited to the security policy in place.&lt;br /&gt;
&lt;br /&gt;
Typically, this will not allow the application to create any files or folders within the downloaded location.&lt;br /&gt;
&lt;br /&gt;
Run the exe or jar file through the operating system, instead of the browser. Alternatively, download and install JBroFuzz using the msi installer.&lt;br /&gt;
&lt;br /&gt;
===Q: How can I download the latest copy of JBroFuzz?===&lt;br /&gt;
&lt;br /&gt;
JBroFuzz is an OWASP Project. It is free to download and open source.&lt;br /&gt;
&lt;br /&gt;
To make sure you are running the latest version select &amp;quot;Check for Updates...&amp;quot; from the Options menu, within the application.&lt;br /&gt;
&lt;br /&gt;
==Files &amp;amp; Directories==&lt;br /&gt;
&lt;br /&gt;
===Q: What files and directories get created when I launch JBroFuzz?===&lt;br /&gt;
&lt;br /&gt;
At launch JBroFuzz creates the following folders within the directory in which it is.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
jbrofuzz | fuzz | 001 2009-01-01 10-10-50&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The final directory (a timestamp) is where all file fuzzing data is stored in individual files.&lt;br /&gt;
&lt;br /&gt;
==Fuzzers &amp;amp; Payloads==&lt;br /&gt;
&lt;br /&gt;
===Q: What is a Fuzzer?===&lt;br /&gt;
&lt;br /&gt;
A fuzzer is a collection of payloads. A fuzzer contains a particular character set which will be tested against the specified range of the request.&lt;br /&gt;
&lt;br /&gt;
Some examples of fuzzers:&lt;br /&gt;
&lt;br /&gt;
* Sending all requests of : 0000 to 1111 (binary prototype over 4 characters)&lt;br /&gt;
* Sending all requests of : 00 to 99 (decimal prototype over 2 characters).&lt;br /&gt;
&lt;br /&gt;
To get a better understanding of how fuzzers work, view the tutorial demo that is available for download.&lt;br /&gt;
&lt;br /&gt;
===Q: Where are all the fuzzer definitions stored?===&lt;br /&gt;
&lt;br /&gt;
All fuzzer definitions are loaded from the file fuzzers.jbrofuzz&lt;br /&gt;
&lt;br /&gt;
This is an internal file within JBroFuzz and can be found inside the JBroFuzz.jar java archive.&lt;br /&gt;
&lt;br /&gt;
===Q: How do I learn more about fuzzing?===&lt;br /&gt;
&lt;br /&gt;
An attempt to define the term can be found on the spike mailing list:&lt;br /&gt;
&lt;br /&gt;
http://marc2.theaimsgroup.com/?l=spike&amp;amp;m=105606327823227&amp;amp;w=2&lt;br /&gt;
&lt;br /&gt;
http://www.scadasec.net/secwiki/FuzzingTools&lt;br /&gt;
&lt;br /&gt;
==Older Features/Versions==&lt;br /&gt;
&lt;br /&gt;
===Q: Where is the &amp;quot;Web Directories&amp;quot; tab?===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Web Directories&amp;quot; tab was removed in version 1.2.&lt;br /&gt;
&lt;br /&gt;
The original list of directories (directories.jbrofuzz) that was being used in JBroFuzz can still be found in distributions of [http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project DirBuster].&lt;br /&gt;
&lt;br /&gt;
As [http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project DirBuster] is a dedicated tool focusing on directory enumeration, it is suggested you use that tool.&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_JBroFuzz_Project_-_Version_1.7_Release_-_Assessment&amp;diff=73923</id>
		<title>Category:OWASP JBroFuzz Project - Version 1.7 Release - Assessment</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_JBroFuzz_Project_-_Version_1.7_Release_-_Assessment&amp;diff=73923"/>
				<updated>2009-11-21T14:58:59Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: /* Stable Release Review of the OWASP JBroFuzz Project - Release 1.7 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;small&amp;gt;[[:Category:OWASP JBroFuzz|Click here to return to project's main page]]&amp;lt;/small&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Stable Release Review of the OWASP JBroFuzz Project - Release 1.7 ==&lt;br /&gt;
&lt;br /&gt;
==== Project Leader for this Release ====&lt;br /&gt;
'''''[mailto:yiannis@owasp.org Subere]'s Pre-Assessment Checklist:'''''&lt;br /&gt;
&lt;br /&gt;
{{ Pre-Assessment Questions - Tools&lt;br /&gt;
| 1. Is this release associated with a project containing at least the [[Assessing_Project_Health#Project_Wiki_Page_Minimal_Content|Project Wiki Page Minimum Content]]  information?&lt;br /&gt;
= Yes; there a lot of information regarding how to use JBroFuzz, an FAQ section a Help section as well as an online tutorial that still needs a lot of work!&lt;br /&gt;
&lt;br /&gt;
| 2. Is your tool licensed under an open source license? &lt;br /&gt;
= GNU GPL v3&lt;br /&gt;
&lt;br /&gt;
| 3. Is the source code and any documentation available in an online project repository? &lt;br /&gt;
= For the source code: http://jbrofuzz.svn.sourceforge.net/viewvc/jbrofuzz/&lt;br /&gt;
&lt;br /&gt;
| 4. Is there working code? &lt;br /&gt;
= Yes; currently in its 179 revision, according to the subversion repository.&lt;br /&gt;
&lt;br /&gt;
| 5. Is there a roadmap for this project release which will take it from Alpha to Stable release? &lt;br /&gt;
= Yes; most of the roadmap has now being delivered with the continuous addition of enhancements (e.g. the encoder window)&lt;br /&gt;
&lt;br /&gt;
| 6. Are the Alpha pre-assessment items complete?&lt;br /&gt;
= I believe so, yes.&lt;br /&gt;
&lt;br /&gt;
| 7. Is there an installer or stand-alone executable? &lt;br /&gt;
= Both an installer and a stand-alone executable as well as a jar standalone executable.&lt;br /&gt;
 &lt;br /&gt;
| 8. Is there user documentation on the OWASP project wiki page? &lt;br /&gt;
= An FAQ section and a Help section, as well as an ongoing tutorial guide that can be found: http://www.owasp.org/index.php/OWASP_JBroFuzz_Tutorial&lt;br /&gt;
&lt;br /&gt;
| 9. Is there an &amp;quot;About box&amp;quot; or similar help item which lists the following? &lt;br /&gt;
= Yes, the about box carries version information, production alias email, the license as well as a disclaimer.&lt;br /&gt;
&lt;br /&gt;
| 10. Is there documentation on how to build the tool from source including obtaining the source from the code repository? &lt;br /&gt;
= Yes; using apache ant and running '&amp;gt;ant' after the source code has been downloading. This is also documented on the website.&lt;br /&gt;
&lt;br /&gt;
| 11. Is the tool documentation stored in the same repository as the source code?&lt;br /&gt;
= Yes; the faq and help sections are stored in the same repository as the source code. The java-doc is derived from the source code. The fuzzing payloads are stored within the repository.&lt;br /&gt;
&lt;br /&gt;
| 12. Are the Alpha and Beta pre-assessment items complete? &lt;br /&gt;
= I would say, yes.&lt;br /&gt;
&lt;br /&gt;
| 13. Does the tool include documentation built into the tool? &lt;br /&gt;
= Yes; under Help -&amp;gt; FAQ and Help -&amp;gt; Topics&lt;br /&gt;
&lt;br /&gt;
| 14. Does the tool include build scripts to automate builds? &lt;br /&gt;
= Yes; using apache ant and a standard build.xml file&lt;br /&gt;
&lt;br /&gt;
| 15. Is there a publicly accessible bug tracking system? &lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 16. Have any existing limitations of the tool been documented? &lt;br /&gt;
= Yes; for example running the tool from command line with more memory; running the jar file in order to pass a SOCKS5 proxy configuration, etc.&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== First Reviewer ====&lt;br /&gt;
'''''[[User:Mtesauro|Matt Tesauro]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;Ideally, reviewers should be an existing OWASP project leader or chapter leader.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = (answer #1) Delete this text and place your answer here. The same for the questions below.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= (answer #2)&lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= (answer #3) &lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= (answer #4)&lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= (answer #5)&lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= (answer #6)&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= (answer #7)&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= (answer #8)&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= (answer #9)&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= (answer #10)&lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= (answer #11)&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= (answer #12)&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= (answer #13)&lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= (answer #14)&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== Second Reviewer ====&lt;br /&gt;
'''''[[User:Leocavallari|Leonardo Cavallari Militelli]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;It is recommended that an OWASP board member or Global Projects Committee member be the second reviewer on Quality releases. The board has the initial option to review the project, followed by the Global Projects Committee.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = Yes, in a form of Java executable jar file and a MSI Installable package for Windows.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= Yes. I recommend to link the tutorial to the main link section on Project Details and tag the tutorial and other wiki pages to the JbroFuzz category. The videos linked on Main links sections are outdated and does not present the current version. Also, the tutorial and documentation have gaps to be improved.&lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= Yes&lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= No. The documentation regarding the source code was not found in the wiki, tool repository (sourceforge), or within the downloadable files. It assumes that the user already know what's a fuzzer and how to use it.&lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= No. The documentation is only available into the Wiki and doesn't explain how to build from source code. &lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= &lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= Yes, at Sourceforge&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= Yes, since it helps on fuzzing &lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= (answer #14)&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_JBroFuzz_Project_-_Version_1.7_Release_-_Assessment&amp;diff=73922</id>
		<title>Category:OWASP JBroFuzz Project - Version 1.7 Release - Assessment</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_JBroFuzz_Project_-_Version_1.7_Release_-_Assessment&amp;diff=73922"/>
				<updated>2009-11-21T14:02:39Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;small&amp;gt;[[:Category:OWASP JBroFuzz|Click here to return to project's main page]]&amp;lt;/small&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Stable Release Review of the OWASP JBroFuzz Project - Release 1.7 ==&lt;br /&gt;
&lt;br /&gt;
==== Project Leader for this Release ====&lt;br /&gt;
'''''[mailto:yiannis@owasp.org Subere]'s Pre-Assessment Checklist:'''''&lt;br /&gt;
&lt;br /&gt;
{{ Pre-Assessment Questions - Tools&lt;br /&gt;
| 1. Is this release associated with a project containing at least the [[Assessing_Project_Health#Project_Wiki_Page_Minimal_Content|Project Wiki Page Minimum Content]]  information?&lt;br /&gt;
= Yes; there a lot of information regarding how to use JBroFuzz, an FAQ section a Help section as well as an online tutorial that still needs a lot of work!&lt;br /&gt;
&lt;br /&gt;
| 2. Is your tool licensed under an open source license? &lt;br /&gt;
= GNU GPL v3&lt;br /&gt;
&lt;br /&gt;
| 3. Is the source code and any documentation available in an online project repository? &lt;br /&gt;
= For the source code: http://jbrofuzz.svn.sourceforge.net/viewvc/jbrofuzz/&lt;br /&gt;
&lt;br /&gt;
| 4. Is there working code? &lt;br /&gt;
= Yes; currently in its 179 revision, according to the subversion repository.&lt;br /&gt;
&lt;br /&gt;
| 5. Is there a roadmap for this project release which will take it from Alpha to Stable release? &lt;br /&gt;
= Yes; most of the roadmap has now being delivered with the continuous addition of enhancements (e.g. the encoder window)&lt;br /&gt;
&lt;br /&gt;
| 6. Are the Alpha pre-assessment items complete?&lt;br /&gt;
= I believe so, yes.&lt;br /&gt;
&lt;br /&gt;
| 7. Is there an installer or stand-alone executable? &lt;br /&gt;
= Both an installer and a stand-alone executable as well as a jar standalone executable.&lt;br /&gt;
 &lt;br /&gt;
| 8. Is there user documentation on the OWASP project wiki page? &lt;br /&gt;
= An FAQ section and a Help section, as well as an ongoing tutorial guide that can be found: http://www.owasp.org/index.php/OWASP_JBroFuzz_Tutorial&lt;br /&gt;
&lt;br /&gt;
| 9. Is there an &amp;quot;About box&amp;quot; or similar help item which lists the following? &lt;br /&gt;
= Yes, the about box carries version information, production alias email, the license as well as a disclaimer.&lt;br /&gt;
&lt;br /&gt;
| 10. Is there documentation on how to build the tool from source including obtaining the source from the code repository? &lt;br /&gt;
= Yes; using apache ant and running '&amp;gt;ant' after the source code has been downloading. This is also documented on the website.&lt;br /&gt;
&lt;br /&gt;
| 11. Is the tool documentation stored in the same repository as the source code?&lt;br /&gt;
= Yes; the faq and help sections are stored in the same repository as the source code. The java-doc is derived from the source code. The fuzzing payloads are stored within the repository.&lt;br /&gt;
&lt;br /&gt;
| 12. Are the Alpha and Beta pre-assessment items complete? &lt;br /&gt;
= I would say, yes.&lt;br /&gt;
&lt;br /&gt;
| 13. Does the tool include documentation built into the tool? &lt;br /&gt;
= Yes; under Help -&amp;gt; FAQ and Help -&amp;gt; Topics&lt;br /&gt;
&lt;br /&gt;
| 14. Does the tool include build scripts to automate builds? &lt;br /&gt;
= Yes; using apache ant and a standard build.xml file&lt;br /&gt;
&lt;br /&gt;
| 15. Is there a publicly accessible bug tracking system? &lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 16. Have any existing limitations of the tool been documented? &lt;br /&gt;
= Yes; for example running the tool from command line with more memory; running the jar file in order to pass a SOCKS5 proxy configuration, etc.&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== First Reviewer ====&lt;br /&gt;
'''''[[User:Mtesauro|Matt Tesauro]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;Ideally, reviewers should be an existing OWASP project leader or chapter leader.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = (answer #1) Delete this text and place your answer here. The same for the questions below.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= (answer #2)&lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= (answer #3) &lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= (answer #4)&lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= (answer #5)&lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= (answer #6)&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= (answer #7)&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= (answer #8)&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= (answer #9)&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= (answer #10)&lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= (answer #11)&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= (answer #12)&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= (answer #13)&lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= (answer #14)&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== Second Reviewer ====&lt;br /&gt;
'''''[[User:Leocavallari|Leonardo Cavallari Militelli]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;It is recommended that an OWASP board member or Global Projects Committee member be the second reviewer on Quality releases. The board has the initial option to review the project, followed by the Global Projects Committee.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = (answer #1) Yes, in a form of Java executable jar file and a MSI Installable package for Windows.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= (answer #2) No, only available through application Help menu .&lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= (answer #3) Yes&lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= (answer #4) The documentation regarding the source code was not found in the wiki, tool repository (sourceforge), or on the downloadable files.&lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= (answer #5) No.&lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= (answer #6)&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= (answer #7)&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= (answer #8)&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= (answer #9)&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= (answer #10)&lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= (answer #11)&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= (answer #12)&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= (answer #13)&lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= (answer #14)&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71395</id>
		<title>OWASP Project Details Table 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71395"/>
				<updated>2009-10-12T18:33:42Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project description'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project license'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader email'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''pamphlet link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''presentation link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''mailing list name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''links url1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''links name1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project road map''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project health status''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release date''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release download link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release rating''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader username'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release details'''  &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release date''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release download link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release rating''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last GPC update'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''GPC Notes'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''Project Home page'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project details wiki page'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 3}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Orizon_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Vicnum_Project | OWASP Project Details Row 3}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_.NET_Project | OWASP Project Details Row 3}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API Java EE Version | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API .NET Version | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Classic ASP Version | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - PHP Version  | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - ColdFusion/CFML | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Python Version | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Haskell Version | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Access_Control_Rules_Tester_Project | OWASP Project Details Row 3}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AIR_Security_Project | OWASP Project Details Row 3}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Anti-Malware_Project | OWASP Project Details Row 3}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project | OWASP Project Details Row 3}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project_.NET | OWASP Project Details Row 3}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Requirements_Project | OWASP Project Details Row 3}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Tool_Benchmarking_Environment_and_Site_Generator_Refresh_Project | OWASP Project Details Row 3}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AppSensor_Project | OWASP Project Details Row 3}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_ASDR_Project | OWASP Project Details Row 3}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Verification_Standard_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Backend_Security_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CAL9000_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Certification_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Classic_ASP_Security_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Crawler | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Review_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFGuard_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFTester_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_DirBuster_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Education_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_EnDe | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_OpenPGP_Extensions_for_HTTP_-_Enigform_and_mod_openpgp | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC Project Details/OWASP OpenSign Server Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Google_Hacking_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Internationalization | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JSP_Testing_Tool_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Learn_About_Encoding_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Legal_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Live_CD | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_ModSecurity_Core_Rule_Set_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_NetBouncer_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Open_Review_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC Project Details/OWASP PHP Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Proxy_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Positive_Security_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Python_Static_Analysis_Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Ruby on Rails Security Guide V2 | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Scrubbr | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Securing WebGoat using ModSecurity Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC Project Details/OWASP Speakers Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC Project Details/OWASP Security Spending Benchmarks Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Skavenger Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/Software_Assurance_Maturity_Model | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Source Code Flaws Top 10 Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Spanish | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sprajax Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sqlibench Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC Project Details/OWASP Stinger Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Teachable Static Analysis Workbench Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Testing Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Top Ten Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Wapiti Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC Project Details/OWASP Webekci Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebGoat Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebScarab Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC Project Details/OWASP WSFuzzer Project | OWASP Project Details Row 3}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Yasca Project | OWASP Project Details Row 3}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* For more details on how this works see [[GPC Info On Editing Templates]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GPC_Project_Details/OWASP_JBroFuzz&amp;diff=71394</id>
		<title>GPC Project Details/OWASP JBroFuzz</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GPC_Project_Details/OWASP_JBroFuzz&amp;diff=71394"/>
				<updated>2009-10-12T18:31:29Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP Project|JBroFuzz Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Project Identification Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = JBroFuzz &lt;br /&gt;
| project_description = '''JBroFuzz''' is a stateless web application fuzzer for requests being made over [http://en.wikipedia.org/wiki/HTTP HTTP] and/or [http://en.wikipedia.org/wiki/Https HTTPS]. Its purpose is to provide a single, portable application that offers stable web protocol fuzzing capabilities. As a tool, it emerged from the needs of penetration testing. &lt;br /&gt;
| project_license = [http://www.gnu.org/licenses/gpl-3.0-standalone.html GNU General Public License v3]&lt;br /&gt;
| leader_name =  Subere&lt;br /&gt;
| leader_email = subere@uncon.org  &lt;br /&gt;
| leader_username = Yiannis&lt;br /&gt;
| past_leaders_special_contributions = TBD&lt;br /&gt;
| maintainer_name = &lt;br /&gt;
| maintainer_email = &lt;br /&gt;
| maintainer_username =  &lt;br /&gt;
| contributor_name1 = &lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 =  &lt;br /&gt;
| contributor_name2 = &lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = &lt;br /&gt;
| contributor_name3 = &lt;br /&gt;
| contributor_email3 = &lt;br /&gt;
| contributor_username3 = &lt;br /&gt;
| contributor_name4 = &lt;br /&gt;
| contributor_email4 = &lt;br /&gt;
| contributor_username4 = &lt;br /&gt;
| contributor_name5 = &lt;br /&gt;
| contributor_email5 = &lt;br /&gt;
| contributor_username5 = &lt;br /&gt;
| contributor_name6 = &lt;br /&gt;
| contributor_email6 = &lt;br /&gt;
| contributor_username6 = &lt;br /&gt;
| contributor_name7 = &lt;br /&gt;
| contributor_email7 = &lt;br /&gt;
| contributor_username7 = &lt;br /&gt;
| contributor_name8 = &lt;br /&gt;
| contributor_email8 = &lt;br /&gt;
| contributor_username8 = &lt;br /&gt;
| contributor_name9 = &lt;br /&gt;
| contributor_email9 = &lt;br /&gt;
| contributor_username9 = &lt;br /&gt;
| contributor_name10 = &lt;br /&gt;
| contributor_email10 = &lt;br /&gt;
| contributor_username10 =  &lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link =&lt;br /&gt;
| mailing_list_name = owasp-jbrofuzz&lt;br /&gt;
| links_url1 = http://www.sourceforge.net/projects/jbrofuzz JBroFuzz's &lt;br /&gt;
| links_name1 = Sourceforge Repository&lt;br /&gt;
| links_url2 = http://video.google.co.uk/videoplay?docid=6388655108193715653&amp;amp;q=jbrofuzz  &lt;br /&gt;
| links_name2 = Video Tutorial - medium quality (to watch)&lt;br /&gt;
| links_url3 = http://sourceforge.net/project/showfiles.php?group_id=180679&amp;amp;package_id=209088&amp;amp;release_id=461300 Video Tutorial&lt;br /&gt;
| links_name3 = Video Tutorial - high quality (to download); &lt;br /&gt;
| links_url4 = http://jbrofuzz.svn.sourceforge.net/viewvc/jbrofuzz/ &lt;br /&gt;
| links_name4 = Java Documenation, the source code and the latest build&lt;br /&gt;
| links_url5 = http://java.sun.com/ &lt;br /&gt;
| links_name5 = To run the JBroFuzz's application you need Java 1.6 Runtime Environment&lt;br /&gt;
| links_url6 = &lt;br /&gt;
| links_name6 = &lt;br /&gt;
| links_url7 = &lt;br /&gt;
| links_name7 = &lt;br /&gt;
| links_url8 = &lt;br /&gt;
| links_name8 = &lt;br /&gt;
| links_url9 = &lt;br /&gt;
| links_name9 = &lt;br /&gt;
| links_url10 = &lt;br /&gt;
| links_name10 = &lt;br /&gt;
| project_road_map = :Category:OWASP JBroFuzz Project - Roadmap&lt;br /&gt;
| project_health_status = &lt;br /&gt;
| current_release_name = JBroFuzz 1.7 &lt;br /&gt;
| current_release_date = October 2009&lt;br /&gt;
| current_release_download_link = http://sourceforge.net/project/platformdownload.php?group_id=180679&lt;br /&gt;
| current_release_rating = -1&lt;br /&gt;
| current_release_leader_name = Subere&lt;br /&gt;
| current_release_leader_email = subere@uncon.org&lt;br /&gt;
| current_release_leader_username = Yiannis&lt;br /&gt;
| current_release_details = :Category:OWASP JBroFuzz Project - Release 1.6 &lt;br /&gt;
| last_reviewed_release_name = JBroFuzz 1.0/OWASP SpoC 07 Release&lt;br /&gt;
| last_reviewed_release_date = July 2007&lt;br /&gt;
| last_reviewed_release_download_link = http://sourceforge.net/forum/forum.php?forum_id=842897&lt;br /&gt;
| last_reviewed_release_rating = 1&lt;br /&gt;
| last_reviewed_release_leader_name = Subere&lt;br /&gt;
| last_reviewed_release_leader_email = &lt;br /&gt;
| last_reviewed_release_leader_username = Yiannis&lt;br /&gt;
| last_reviewed_release_details = [http://www.owasp.org/index.php/SpoC_007_-_OWASP_JBroFuzz_Project  Main links, release roadmap and assessment]&lt;br /&gt;
| old_release_name1 = JBroFuzz 1.5&lt;br /&gt;
| old_release_date1 = July 2009&lt;br /&gt;
| old_release_download_link1 = http://sourceforge.net/project/platformdownload.php?group_id=180679&lt;br /&gt;
| old_release_name2 = JBroFuzz 1.4&lt;br /&gt;
| old_release_date2 = June 2009&lt;br /&gt;
| old_release_download_link2 = http://sourceforge.net/project/platformdownload.php?group_id=180679&lt;br /&gt;
| old_release_name3 = JBroFuzz 1.2&lt;br /&gt;
| old_release_date3 = January 2009&lt;br /&gt;
| old_release_download_link3 = http://sourceforge.net/forum/forum.php?forum_id=910952&lt;br /&gt;
| old_release_name4 = JBroFuzz 1.1&lt;br /&gt;
| old_release_date4 = September 2008&lt;br /&gt;
| old_release_download_link4 = http://sourceforge.net/forum/forum.php?forum_id=869579&lt;br /&gt;
| old_release_name5 = &lt;br /&gt;
| old_release_date5 = &lt;br /&gt;
| old_release_download_link5 = &lt;br /&gt;
| last_GPC_update = 30/09/2009 &lt;br /&gt;
| GPC_Notes = Being assessed  &lt;br /&gt;
| project_home_page=Category:OWASP_JBroFuzz &lt;br /&gt;
| project_details_wiki_page=GPC_Project_Details/OWASP_JBroFuzz&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GPC_Project_Details/OWASP_JBroFuzz&amp;diff=71393</id>
		<title>GPC Project Details/OWASP JBroFuzz</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GPC_Project_Details/OWASP_JBroFuzz&amp;diff=71393"/>
				<updated>2009-10-12T18:30:05Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: minor typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP Project|JBroFuzz Project]]&lt;br /&gt;
[[Category:OWASP Tool]]&lt;br /&gt;
[[Category:OWASP Download]]&lt;br /&gt;
[[Category:OWASP Alpha Quality Tool]]&lt;br /&gt;
{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Project Identification Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = JBroFuzz &lt;br /&gt;
| project_description = '''JBroFuzz''' is a stateless web application fuzzer for requests being made over [http://en.wikipedia.org/wiki/HTTP HTTP] and/or [http://en.wikipedia.org/wiki/Https HTTPS]. Its purpose is to provide a single, portable application that offers stable web protocol fuzzing capabilities. As a tool, it emerged from the needs of penetration testing. &lt;br /&gt;
| project_license = [http://www.gnu.org/licenses/gpl-3.0-standalone.html GNU General Public License v3]&lt;br /&gt;
| leader_name =  Subere&lt;br /&gt;
| leader_email = subere@uncon.org  &lt;br /&gt;
| leader_username = Yiannis&lt;br /&gt;
| past_leaders_special_contributions = TBD&lt;br /&gt;
| maintainer_name = &lt;br /&gt;
| maintainer_email = &lt;br /&gt;
| maintainer_username =  &lt;br /&gt;
| contributor_name1 = &lt;br /&gt;
| contributor_email1 = &lt;br /&gt;
| contributor_username1 =  &lt;br /&gt;
| contributor_name2 = &lt;br /&gt;
| contributor_email2 = &lt;br /&gt;
| contributor_username2 = &lt;br /&gt;
| contributor_name3 = &lt;br /&gt;
| contributor_email3 = &lt;br /&gt;
| contributor_username3 = &lt;br /&gt;
| contributor_name4 = &lt;br /&gt;
| contributor_email4 = &lt;br /&gt;
| contributor_username4 = &lt;br /&gt;
| contributor_name5 = &lt;br /&gt;
| contributor_email5 = &lt;br /&gt;
| contributor_username5 = &lt;br /&gt;
| contributor_name6 = &lt;br /&gt;
| contributor_email6 = &lt;br /&gt;
| contributor_username6 = &lt;br /&gt;
| contributor_name7 = &lt;br /&gt;
| contributor_email7 = &lt;br /&gt;
| contributor_username7 = &lt;br /&gt;
| contributor_name8 = &lt;br /&gt;
| contributor_email8 = &lt;br /&gt;
| contributor_username8 = &lt;br /&gt;
| contributor_name9 = &lt;br /&gt;
| contributor_email9 = &lt;br /&gt;
| contributor_username9 = &lt;br /&gt;
| contributor_name10 = &lt;br /&gt;
| contributor_email10 = &lt;br /&gt;
| contributor_username10 =  &lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
| presentation_link =&lt;br /&gt;
| mailing_list_name = owasp-jbrofuzz&lt;br /&gt;
| links_url1 = http://www.sourceforge.net/projects/jbrofuzz JBroFuzz's &lt;br /&gt;
| links_name1 = Sourceforge Repository&lt;br /&gt;
| links_url2 = http://video.google.co.uk/videoplay?docid=6388655108193715653&amp;amp;q=jbrofuzz  &lt;br /&gt;
| links_name2 = Video Tutorial - medium quality (to watch)&lt;br /&gt;
| links_url3 = http://sourceforge.net/project/showfiles.php?group_id=180679&amp;amp;package_id=209088&amp;amp;release_id=461300 Video Tutorial&lt;br /&gt;
| links_name3 = Video Tutorial - high quality (to download); &lt;br /&gt;
| links_url4 = http://jbrofuzz.svn.sourceforge.net/viewvc/jbrofuzz/ &lt;br /&gt;
| links_name4 = Java Documenation, the source code and the latest build&lt;br /&gt;
| links_url5 = http://java.sun.com/ &lt;br /&gt;
| links_name5 = To run the JBroFuzz's application you need Java 1.6 Runtime Environment&lt;br /&gt;
| links_url6 = &lt;br /&gt;
| links_name6 = &lt;br /&gt;
| links_url7 = &lt;br /&gt;
| links_name7 = &lt;br /&gt;
| links_url8 = &lt;br /&gt;
| links_name8 = &lt;br /&gt;
| links_url9 = &lt;br /&gt;
| links_name9 = &lt;br /&gt;
| links_url10 = &lt;br /&gt;
| links_name10 = &lt;br /&gt;
| project_road_map = :Category:OWASP JBroFuzz Project - Roadmap&lt;br /&gt;
| project_health_status = &lt;br /&gt;
| current_release_name = JBroFuzz 1.7 &lt;br /&gt;
| current_release_date = October 2009&lt;br /&gt;
| current_release_download_link = http://sourceforge.net/project/platformdownload.php?group_id=180679&lt;br /&gt;
| current_release_rating = -1&lt;br /&gt;
| current_release_leader_name = Subere&lt;br /&gt;
| current_release_leader_email = subere@uncon.org&lt;br /&gt;
| current_release_leader_username = Yiannis&lt;br /&gt;
| current_release_details = :Category:OWASP JBroFuzz Project - Release 1.6 &lt;br /&gt;
| last_reviewed_release_name = JBroFuzz 1.0/OWASP SpoC 07 Release&lt;br /&gt;
| last_reviewed_release_date = July 2007&lt;br /&gt;
| last_reviewed_release_download_link = http://sourceforge.net/forum/forum.php?forum_id=842897&lt;br /&gt;
| last_reviewed_release_rating = 1&lt;br /&gt;
| last_reviewed_release_leader_name = Subere&lt;br /&gt;
| last_reviewed_release_leader_email = &lt;br /&gt;
| last_reviewed_release_leader_username = Yiannis&lt;br /&gt;
| last_reviewed_release_details = [http://www.owasp.org/index.php/SpoC_007_-_OWASP_JBroFuzz_Project  Main links, release roadmap and assessment]&lt;br /&gt;
| old_release_name1 = JBroFuzz 1.5&lt;br /&gt;
| old_release_date1 = July 2009&lt;br /&gt;
| old_release_download_link1 = http://sourceforge.net/project/platformdownload.php?group_id=180679&lt;br /&gt;
| old_release_name2 = JBroFuzz 1.4&lt;br /&gt;
| old_release_date2 = June 2009&lt;br /&gt;
| old_release_download_link2 = http://sourceforge.net/project/platformdownload.php?group_id=180679&lt;br /&gt;
| old_release_name3 = JBroFuzz 1.2&lt;br /&gt;
| old_release_date3 = January 2009&lt;br /&gt;
| old_release_download_link3 = http://sourceforge.net/forum/forum.php?forum_id=910952&lt;br /&gt;
| old_release_name4 = JBroFuzz 1.1&lt;br /&gt;
| old_release_date4 = September 2008&lt;br /&gt;
| old_release_download_link4 = http://sourceforge.net/forum/forum.php?forum_id=869579&lt;br /&gt;
| old_release_name5 = &lt;br /&gt;
| old_release_date5 = &lt;br /&gt;
| old_release_download_link5 = &lt;br /&gt;
| last_GPC_update = 30/09/2009 &lt;br /&gt;
| GPC_Notes = Being assessed  &lt;br /&gt;
| project_home_page=Category:OWASP_JBroFuzz &lt;br /&gt;
| project_details_wiki_page=GPC_Project_Details/OWASP_JBroFuzz&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71392</id>
		<title>OWASP Project Details Table 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71392"/>
				<updated>2009-10-12T18:26:59Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project description'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project license'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader email'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''pamphlet link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''presentation link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''mailing list name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''links url1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''links name1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project road map''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project health status''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release date''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release download link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release rating''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader username'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release details'''  &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release date''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release download link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release rating''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last GPC update'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''GPC Notes'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''Project Home page'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project details wiki page'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 3}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* For more details on how this works see [[GPC Info On Editing Templates]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71388</id>
		<title>OWASP Project Details Table 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71388"/>
				<updated>2009-10-12T18:18:13Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project description'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project license'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader email'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''pamphlet link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''presentation link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''mailing list name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''links url1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''links name1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project road map''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project health status''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release date''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release download link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release rating''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader username'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release details'''  &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release date''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release download link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release rating''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last GPC update'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''GPC Notes'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project details wiki page'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''2'''&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 3}} &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* For more details on how this works see [[GPC Info On Editing Templates]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71386</id>
		<title>OWASP Project Details Table 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71386"/>
				<updated>2009-10-12T18:15:45Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project description'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project license'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader email'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''pamphlet link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''presentation link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''mailing list name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''links url1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''links name1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project road map''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project health status''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release date''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release download link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release rating''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader username'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release details'''  &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release date''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release download link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release rating''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last GPC update'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''GPC Notes'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project details wiki page'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''2'''}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 3}} &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* For more details on how this works see [[GPC Info On Editing Templates]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71382</id>
		<title>OWASP Project Details Table 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71382"/>
				<updated>2009-10-12T17:20:33Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project description'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project license'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader email'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''pamphlet link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''presentation link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''mailing list name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''links url1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''links name1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project road map''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project health status''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release date''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release download link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release rating''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader username'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release details'''  &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release date''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release download link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release rating''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last GPC update'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''GPC Notes'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project details wiki page'''}&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 3}} &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* For more details on how this works see [[GPC Info On Editing Templates]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71381</id>
		<title>OWASP Project Details Table 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71381"/>
				<updated>2009-10-12T17:17:18Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project description'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project license'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader email'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''pamphlet link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''presentation link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''mailing list name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''links url1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''links name1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project road map''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project health status''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release date''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release download link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release rating''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader username'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release details'''  &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release date''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release download link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release rating''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last GPC update'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''GPC Notes'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project details wiki page'''&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 3}} &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* For more details on how this works see [[GPC Info On Editing Templates]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:OWASP_Project_Details_Row_3&amp;diff=71380</id>
		<title>Template:OWASP Project Details Row 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:OWASP_Project_Details_Row_3&amp;diff=71380"/>
				<updated>2009-10-12T17:15:48Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;|-&lt;br /&gt;
| [[:{{{project_home_page}}}| {{{project_name}}}]]&lt;br /&gt;
| {{{leader_name}}} - {{{leader_username}}}&lt;br /&gt;
| {{#if: {{{mailing_list_name |}}} | {{{mailing_list_name}}}  | NA }} &lt;br /&gt;
| {{#if: {{{leader_name |}}} | {{{leader_name}}}  | NA }}&lt;br /&gt;
| {{#if: {{{leader_email |}}} | {{{leader_email}}}  | NA }}&lt;br /&gt;
| {{#if: {{{leader_username |}}} | {{{leader_username}}}  | NA }} &lt;br /&gt;
| {{#if: {{{maintainer_name |}}} | {{{maintainer_name}}}  | NA }}&lt;br /&gt;
| {{#if: {{{maintainer_email |}}} | {{{maintainer_email}}}  | NA }} &lt;br /&gt;
| {{#if: {{{maintainer_username |}}} | {{{maintainer_username}}}  | NA }} &lt;br /&gt;
| {{#if: {{{pamphlet_link |}}} | {{{pamphlet_link}}}  | NA }} &lt;br /&gt;
| {{#if: {{{presentation_link |}}} | {{{presentation_link}}}  | NA }} &lt;br /&gt;
| {{#if: {{{mailing_list_name |}}} | {{{mailing_list_name}}}  | NA }} &lt;br /&gt;
| {{#if: {{{links_url1 |}}} | {{{links_url1}}}  | NA }} &lt;br /&gt;
| {{#if: {{{links_name1 |}}} | {{{links_name1}}}  | NA }} &lt;br /&gt;
| {{#if: {{{project_road_map |}}} | {{{project_road_map}}}  | NA }} &lt;br /&gt;
| {{#if: {{{project_health_status |}}} | {{{project_health_status}}}  | NA }} &lt;br /&gt;
| {{#if: {{{current_release_name |}}} | {{{current_release_name}}}  | NA }} &lt;br /&gt;
| {{#if: {{{current_release_date |}}} | {{{current_release_date}}}  | NA }} &lt;br /&gt;
| {{#if: {{{current_release_download_link |}}} | {{{current_release_download_link}}}  | NA }} &lt;br /&gt;
| {{#if: {{{current_release_rating |}}} | {{{current_release_rating}}}  | NA }} &lt;br /&gt;
| {{#if: {{{current_release_leader_name |}}} | {{{current_release_leader_name}}}  | NA }} &lt;br /&gt;
| {{#if: {{{current_release_leader_email |}}} | {{{current_release_leader_email}}} | NA }} &lt;br /&gt;
| {{#if: {{{current_release_leader_username |}}} | {{{current_release_leader_username}}}  | NA }}&lt;br /&gt;
| {{#if: {{{current_release_details |}}} | {{{current_release_details}}}  | NA }}  &lt;br /&gt;
| {{#if: {{{last_reviewed_release_name |}}} | {{{last_reviewed_release_name}}}  | NA }} &lt;br /&gt;
| {{#if: {{{last_reviewed_release_date |}}} | {{{last_reviewed_release_date}}}  | NA }} &lt;br /&gt;
| {{#if: {{{last_reviewed_release_download_link |}}} | {{{last_reviewed_release_download_link}}}  | NA }} &lt;br /&gt;
| {{#if: {{{last_reviewed_release_rating |}}} | {{{last_reviewed_release_rating}}}  | NA }} &lt;br /&gt;
| {{#if: {{{last_reviewed_release_leader_name |}}} | {{{last_reviewed_release_leader name}}}  | NA }} &lt;br /&gt;
| {{#if: {{{last_reviewed_release_leader_email |}}} | {{{last_reviewed_release_leader_email}}}  | NA }} &lt;br /&gt;
| {{#if: {{{last_reviewed_release_leader_username |}}} | {{{last_reviewed_release_leader_username}}}  | NA }} &lt;br /&gt;
| {{#if: {{{last_GPC_update |}}} | {{{last_GPC_update}}}  | NA }}&lt;br /&gt;
| {{#if: {{{GPC_Notes |}}} | {{{GPC_Notes}}}  | NA }} Empty template&lt;br /&gt;
| {{#if: {{{project_home_page |}}} | {{{project_home_page}}}  | NA }} &lt;br /&gt;
| {{#if: {{{project_details_wiki_page |}}} | {{{project_details_wiki_page}}}  | NA }}&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71379</id>
		<title>OWASP Project Details Table 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71379"/>
				<updated>2009-10-12T17:13:52Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project description'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project license'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader email'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''past leaders special contributions''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer name'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''maintainer username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''pamphlet link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''presentation link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''mailing list name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''links url1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''links name1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project road map''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project health status''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release date''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release download link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release rating''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release leader username'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current release details'''  &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release date''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release download link''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release rating''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader email''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last reviewed release leader username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''last GPC update'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''GPC Notes'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project details wiki page'''&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 3}} &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* For more details on how this works see [[GPC Info On Editing Templates]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:OWASP_Project_Details_Row_3&amp;diff=71378</id>
		<title>Template:OWASP Project Details Row 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:OWASP_Project_Details_Row_3&amp;diff=71378"/>
				<updated>2009-10-12T17:00:31Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: Created page with '|- |  {{{project_name}}} | {{{leader_name}}} - {{{leader_username}}} | {{#if: {{{mailing_list_name |}}} | {{{mailing_list_name}}}  | NA }}  | {{#if: …'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;|-&lt;br /&gt;
| [[:{{{project_home_page}}}| {{{project_name}}}]]&lt;br /&gt;
| {{{leader_name}}} - {{{leader_username}}}&lt;br /&gt;
| {{#if: {{{mailing_list_name |}}} | {{{mailing_list_name}}}  | NA }} &lt;br /&gt;
| {{#if: {{{leader_name |}}} | {{{leader_name}}}  | NA }}&lt;br /&gt;
| {{#if: {{{leader_email |}}} | {{{leader_email}}}  | NA }}&lt;br /&gt;
| {{#if: {{{leader_username |}}} | {{{leader_username}}}  | NA }} &lt;br /&gt;
| {{#if: {{{maintainer_name |}}} | {{{maintainer_name}}}  | NA }}&lt;br /&gt;
| {{#if: {{{maintainer_email |}}} | {{{maintainer_email}}}  | NA }} &lt;br /&gt;
| {{#if: {{{maintainer_username |}}} | {{{maintainer_username}}}  | NA }} &lt;br /&gt;
| {{#if: {{{pamphlet_link |}}} | {{{pamphlet_link}}}  | NA }} &lt;br /&gt;
| {{#if: {{{presentation_link |}}} | {{{presentation_link}}}  | NA }} &lt;br /&gt;
| {{#if: {{{links_url1 |}}} | {{{links_url1}}}  | NA }} &lt;br /&gt;
| {{#if: {{{links_name1 |}}} | {{{links_name1}}}  | NA }} &lt;br /&gt;
| {{#if: {{{project_road_map |}}} | {{{project_road_map}}}  | NA }} &lt;br /&gt;
| {{#if: {{{project_health_status |}}} | {{{project_health_status}}}  | NA }} &lt;br /&gt;
| {{#if: {{{current_release_name |}}} | {{{current_release_name}}}  | NA }} &lt;br /&gt;
| {{#if: {{{current_release_date |}}} | {{{current_release_date}}}  | NA }} &lt;br /&gt;
| {{#if: {{{current_release_download_link |}}} | {{{current_release_download_link}}}  | NA }} &lt;br /&gt;
| {{#if: {{{current_release_rating |}}} | {{{current_release_rating}}}  | NA }} &lt;br /&gt;
| {{#if: {{{current_release_leader_name |}}} | {{{current_release_leader_name}}}  | NA }} &lt;br /&gt;
| {{#if: {{{current_release_leader_email |}}} | {{{current_release_leader_email}}} | NA }} &lt;br /&gt;
| {{#if: {{{current_release_leader_username |}}} | {{{current_release_leader_username}}}  | NA }}&lt;br /&gt;
| {{#if: {{{current_release_details |}}} | {{{current_release_details}}}  | NA }}  &lt;br /&gt;
| {{#if: {{{last_reviewed_release_name |}}} | {{{last_reviewed_release_name}}}  | NA }} &lt;br /&gt;
| {{#if: {{{last_reviewed_release_date |}}} | {{{last_reviewed_release_date}}}  | NA }} &lt;br /&gt;
| {{#if: {{{last_reviewed_release_download_link |}}} | {{{last_reviewed_release_download_link}}}  | NA }} &lt;br /&gt;
| {{#if: {{{last_reviewed_release_rating |}}} | {{{last_reviewed_release_rating}}}  | NA }} &lt;br /&gt;
| {{#if: {{{last_reviewed_release_leader_name |}}} | {{{last_reviewed_release_leader name}}}  | NA }} &lt;br /&gt;
| {{#if: {{{last_reviewed_release_leader_email |}}} | {{{last_reviewed_release_leader_email}}}  | NA }} &lt;br /&gt;
| {{#if: {{{last_reviewed_release_leader_username |}}} | {{{last_reviewed_release_leader_username}}}  | NA }} &lt;br /&gt;
| {{#if: {{{last_GPC_update |}}} | {{{last_GPC_update}}}  | NA }}&lt;br /&gt;
| {{#if: {{{GPC_Notes |}}} | {{{GPC_Notes}}}  | NA }} Empty template&lt;br /&gt;
| {{#if: {{{project_home_page |}}} | {{{project_home_page}}}  | NA }} &lt;br /&gt;
| {{#if: {{{project_details_wiki_page |}}} | {{{project_details_wiki_page}}}  | NA }}}&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71341</id>
		<title>OWASP Project Details Table 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71341"/>
				<updated>2009-10-11T16:31:30Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader name / WIKI username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''mailing list name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''road map''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''pamphlet''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current_release_details''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  License&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 2}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 1}} &lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 2}} &lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 3}} &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* For more details on how this works see [[GPC Info On Editing Templates]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71340</id>
		<title>OWASP Project Details Table 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71340"/>
				<updated>2009-10-11T16:30:37Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader name / WIKI username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''mailing list name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''road map''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''pamphlet''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current_release_details''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  License&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 2}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 2}} &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* For more details on how this works see [[GPC Info On Editing Templates]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71339</id>
		<title>OWASP Project Details Table 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_3&amp;diff=71339"/>
				<updated>2009-10-11T16:30:08Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: Created page with '{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot; |- | align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project name'''  | align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '…'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader name / WIKI username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''mailing list name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''road map''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''pamphlet''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current_release_details''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  License&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 2}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 2}} &lt;br /&gt;
&lt;br /&gt;
* For more details on how this works see [[GPC Info On Editing Templates]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_2&amp;diff=71338</id>
		<title>OWASP Project Details Table 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_2&amp;diff=71338"/>
				<updated>2009-10-11T16:28:24Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader name / WIKI username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''mailing list name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''road map''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''pamphlet''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current_release_details''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  License&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Orizon_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Vicnum_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_.NET_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API Java EE Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API .NET Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Classic ASP Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - PHP Version  | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - ColdFusion/CFML | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Python Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Haskell Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Access_Control_Rules_Tester_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AIR_Security_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Anti-Malware_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project_.NET | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Requirements_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Tool_Benchmarking_Environment_and_Site_Generator_Refresh_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AppSensor_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_ASDR_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Verification_Standard_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Backend_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CAL9000_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Certification_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Classic_ASP_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Crawler | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Review_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFGuard_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFTester_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_DirBuster_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Education_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_EnDe | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_OpenPGP_Extensions_for_HTTP_-_Enigform_and_mod_openpgp | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP OpenSign Server Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Google_Hacking_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Internationalization | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JSP_Testing_Tool_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Learn_About_Encoding_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Legal_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Live_CD | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_ModSecurity_Core_Rule_Set_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_NetBouncer_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Open_Review_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP PHP Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Proxy_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Positive_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Python_Static_Analysis_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Ruby on Rails Security Guide V2 | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Scrubbr | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Securing WebGoat using ModSecurity Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Speakers Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Security Spending Benchmarks Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Skavenger Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/Software_Assurance_Maturity_Model | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Source Code Flaws Top 10 Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Spanish | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sprajax Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sqlibench Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Stinger Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Teachable Static Analysis Workbench Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Testing Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Top Ten Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Wapiti Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Webekci Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebGoat Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebScarab Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP WSFuzzer Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Yasca Project | OWASP Project Details Row 2}} &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* For more details on how this works see [[GPC Info On Editing Templates]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_2&amp;diff=71337</id>
		<title>OWASP Project Details Table 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_2&amp;diff=71337"/>
				<updated>2009-10-11T13:36:23Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader name / WIKI username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''mailing list name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''road map''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''pamphlet''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current_release_details''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  License&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Orizon_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Vicnum_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_.NET_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API Java EE Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API .NET Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Classic ASP Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - PHP Version  | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - ColdFusion/CFML | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Python Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Haskell Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Access_Control_Rules_Tester_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AIR_Security_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Anti-Malware_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project_.NET | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Requirements_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Tool_Benchmarking_Environment_and_Site_Generator_Refresh_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AppSensor_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_ASDR_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Verification_Standard_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Backend_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CAL9000_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Certification_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Classic_ASP_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Crawler | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Review_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFGuard_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFTester_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_DirBuster_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Education_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_EnDe | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_OpenPGP_Extensions_for_HTTP_-_Enigform_and_mod_openpgp | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP OpenSign Server Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Google_Hacking_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Internationalization | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JSP_Testing_Tool_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Learn_About_Encoding_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Legal_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Live_CD | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_ModSecurity_Core_Rule_Set_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_NetBouncer_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Open_Review_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP PHP Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Proxy_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Positive_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Python_Static_Analysis_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Ruby on Rails Security Guide V2 | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Scrubbr | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Securing WebGoat using ModSecurity Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Speakers Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Security Spending Benchmarks Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Skavenger Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/Software_Assurance_Maturity_Model | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Source Code Flaws Top 10 Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Spanish | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sprajax Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sqlibench Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Stinger Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Teachable Static Analysis Workbench Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Testing Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Top Ten Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Wapiti Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Webekci Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebGoat Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebScarab Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP WSFuzzer Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Yasca Project | OWASP Project Details Row 2}} &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''2''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''3''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''4''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''5''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''6''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  7&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  8&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  9&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  10&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Orizon_Project | OWASP Project Details Row 2 | OWASP Project Details Row 3 | OWASP Project Details Row 4 | OWASP Project Details Row 5}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Vicnum_Project | OWASP Project Details Row 2}} &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* For more details on how this works see [[GPC Info On Editing Templates]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_2&amp;diff=71336</id>
		<title>OWASP Project Details Table 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_2&amp;diff=71336"/>
				<updated>2009-10-11T13:33:14Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader name / WIKI username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''mailing list name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''road map''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''pamphlet''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current_release_details''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  License&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Orizon_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Vicnum_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_.NET_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API Java EE Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API .NET Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Classic ASP Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - PHP Version  | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - ColdFusion/CFML | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Python Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Haskell Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Access_Control_Rules_Tester_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AIR_Security_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Anti-Malware_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project_.NET | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Requirements_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Tool_Benchmarking_Environment_and_Site_Generator_Refresh_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AppSensor_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_ASDR_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Verification_Standard_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Backend_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CAL9000_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Certification_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Classic_ASP_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Crawler | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Review_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFGuard_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFTester_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_DirBuster_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Education_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_EnDe | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_OpenPGP_Extensions_for_HTTP_-_Enigform_and_mod_openpgp | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP OpenSign Server Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Google_Hacking_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Internationalization | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JSP_Testing_Tool_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Learn_About_Encoding_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Legal_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Live_CD | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_ModSecurity_Core_Rule_Set_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_NetBouncer_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Open_Review_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP PHP Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Proxy_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Positive_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Python_Static_Analysis_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Ruby on Rails Security Guide V2 | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Scrubbr | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Securing WebGoat using ModSecurity Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Speakers Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Security Spending Benchmarks Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Skavenger Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/Software_Assurance_Maturity_Model | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Source Code Flaws Top 10 Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Spanish | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sprajax Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sqlibench Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Stinger Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Teachable Static Analysis Workbench Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Testing Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Top Ten Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Wapiti Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Webekci Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebGoat Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebScarab Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP WSFuzzer Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Yasca Project | OWASP Project Details Row 2}} &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''2''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''3''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''4''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''5''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''6''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  7&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  8&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  9&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  10&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Orizon_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Vicnum_Project | OWASP Project Details Row 2}} &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* For more details on how this works see [[GPC Info On Editing Templates]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_2&amp;diff=71335</id>
		<title>OWASP Project Details Table 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_2&amp;diff=71335"/>
				<updated>2009-10-11T13:20:59Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader name / WIKI username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''mailing list name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''road map''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''pamphlet''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current_release_details''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  License&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Orizon_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Vicnum_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_.NET_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API Java EE Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API .NET Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Classic ASP Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - PHP Version  | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - ColdFusion/CFML | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Python Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Haskell Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Access_Control_Rules_Tester_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AIR_Security_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Anti-Malware_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project_.NET | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Requirements_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Tool_Benchmarking_Environment_and_Site_Generator_Refresh_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AppSensor_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_ASDR_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Verification_Standard_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Backend_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CAL9000_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Certification_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Classic_ASP_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Crawler | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Review_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFGuard_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFTester_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_DirBuster_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Education_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_EnDe | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_OpenPGP_Extensions_for_HTTP_-_Enigform_and_mod_openpgp | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP OpenSign Server Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Google_Hacking_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Internationalization | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JSP_Testing_Tool_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Learn_About_Encoding_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Legal_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Live_CD | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_ModSecurity_Core_Rule_Set_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_NetBouncer_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Open_Review_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP PHP Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Proxy_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Positive_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Python_Static_Analysis_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Ruby on Rails Security Guide V2 | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Scrubbr | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Securing WebGoat using ModSecurity Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Speakers Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Security Spending Benchmarks Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Skavenger Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/Software_Assurance_Maturity_Model | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Source Code Flaws Top 10 Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Spanish | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sprajax Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sqlibench Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Stinger Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Teachable Static Analysis Workbench Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Testing Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Top Ten Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Wapiti Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Webekci Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebGoat Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebScarab Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP WSFuzzer Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Yasca Project | OWASP Project Details Row 2}} &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''2''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''3''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''4''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''5''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''6''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  7&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Orizon_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Vicnum_Project | OWASP Project Details Row 2}} &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* For more details on how this works see [[GPC Info On Editing Templates]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_2&amp;diff=71333</id>
		<title>OWASP Project Details Table 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_2&amp;diff=71333"/>
				<updated>2009-10-11T12:55:04Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader name / WIKI username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''mailing list name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''road map''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''pamphlet''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current_release_details''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  License&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Orizon_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Vicnum_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_.NET_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API Java EE Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API .NET Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Classic ASP Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - PHP Version  | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - ColdFusion/CFML | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Python Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Haskell Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Access_Control_Rules_Tester_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AIR_Security_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Anti-Malware_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project_.NET | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Requirements_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Tool_Benchmarking_Environment_and_Site_Generator_Refresh_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AppSensor_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_ASDR_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Verification_Standard_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Backend_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CAL9000_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Certification_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Classic_ASP_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Crawler | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Review_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFGuard_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFTester_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_DirBuster_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Education_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_EnDe | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_OpenPGP_Extensions_for_HTTP_-_Enigform_and_mod_openpgp | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP OpenSign Server Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Google_Hacking_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Internationalization | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JSP_Testing_Tool_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Learn_About_Encoding_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Legal_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Live_CD | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_ModSecurity_Core_Rule_Set_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_NetBouncer_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Open_Review_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP PHP Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Proxy_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Positive_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Python_Static_Analysis_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Ruby on Rails Security Guide V2 | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Scrubbr | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Securing WebGoat using ModSecurity Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Speakers Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Security Spending Benchmarks Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Skavenger Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/Software_Assurance_Maturity_Model | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Source Code Flaws Top 10 Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Spanish | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sprajax Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sqlibench Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Stinger Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Teachable Static Analysis Workbench Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Testing Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Top Ten Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Wapiti Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Webekci Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebGoat Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebScarab Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP WSFuzzer Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Yasca Project | OWASP Project Details Row 2}} &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* For more details on how this works see [[GPC Info On Editing Templates]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_2&amp;diff=71332</id>
		<title>OWASP Project Details Table 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Details_Table_2&amp;diff=71332"/>
				<updated>2009-10-11T12:54:36Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;border-collapse: collapse&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''project name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''leader name / WIKI username''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''mailing list name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''road map''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''pamphlet''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; | '''current_release_details''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; bgcolor=&amp;quot;#DDDDDD&amp;quot; |  License&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JBroFuzz | OWASP Project Details Row 3}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Orizon_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Vicnum_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_.NET_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API Java EE Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API .NET Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Classic ASP Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - PHP Version  | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - ColdFusion/CFML | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Python Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Enterprise Security API - Haskell Version | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Access_Control_Rules_Tester_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AIR_Security_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Anti-Malware_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AntiSamy_Project_.NET | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Requirements_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Tool_Benchmarking_Environment_and_Site_Generator_Refresh_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_AppSensor_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_ASDR_Project | OWASP Project Details Row 2}} &lt;br /&gt;
{{:GPC_Project_Details/OWASP_Application_Security_Verification_Standard_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Backend_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Best_Practices:_Web_Application_Firewalls | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CAL9000_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Certification_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Classic_ASP_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Crawler | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Code_Review_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFGuard_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_CSRFTester_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_DirBuster_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Education_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_EnDe | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_OpenPGP_Extensions_for_HTTP_-_Enigform_and_mod_openpgp | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP OpenSign Server Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Google_Hacking_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Internationalization | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_JSP_Testing_Tool_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Learn_About_Encoding_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Legal_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Live_CD | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_ModSecurity_Core_Rule_Set_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_NetBouncer_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Open_Review_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP PHP Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Proxy_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Positive_Security_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Python_Static_Analysis_Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Ruby on Rails Security Guide V2 | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Scrubbr | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Securing WebGoat using ModSecurity Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Speakers Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Security Spending Benchmarks Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Skavenger Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/Software_Assurance_Maturity_Model | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Source Code Flaws Top 10 Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Spanish | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sprajax Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Sqlibench Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Stinger Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Teachable Static Analysis Workbench Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Testing Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Top Ten Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Wapiti Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP Webekci Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebGoat Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP WebScarab Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC Project Details/OWASP WSFuzzer Project | OWASP Project Details Row 2}}&lt;br /&gt;
{{:GPC_Project_Details/OWASP Yasca Project | OWASP Project Details Row 2}} &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* For more details on how this works see [[GPC Info On Editing Templates]]&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Leocavallari&amp;diff=70770</id>
		<title>User:Leocavallari</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Leocavallari&amp;diff=70770"/>
				<updated>2009-10-05T22:42:37Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* Leonardo Cavallari Militelli's [http://www.linkedin.com/in/leocavallari Profile], [mailto:leo.cavallari@owasp.org Mail Contact] and [[:Special:Contributions/Leocavallari|Wiki Contributions]].&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Leocavallari&amp;diff=70769</id>
		<title>User:Leocavallari</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Leocavallari&amp;diff=70769"/>
				<updated>2009-10-05T22:42:21Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* Leonardo Cavallari Militelli's [[http://www.linkedin.com/in/leocavallari Profile]], [mailto:leo.cavallari@owasp.org Mail Contact] and [[:Special:Contributions/Leocavallari|Wiki Contributions]].&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Leocavallari&amp;diff=70768</id>
		<title>User:Leocavallari</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Leocavallari&amp;diff=70768"/>
				<updated>2009-10-05T22:42:07Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* Leonardo Cavallari Militelli's [[www.linkedin.com/in/leocavallari Profile]], [mailto:leo.cavallari@owasp.org Mail Contact] and [[:Special:Contributions/Leocavallari|Wiki Contributions]].&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Leocavallari&amp;diff=70767</id>
		<title>User:Leocavallari</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Leocavallari&amp;diff=70767"/>
				<updated>2009-10-05T22:41:53Z</updated>
		
		<summary type="html">&lt;p&gt;Leocavallari: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* Leonardo Cavallari Militelli's [www.linkedin.com/in/leocavallari Profile], [mailto:leo.cavallari@owasp.org Mail Contact] and [[:Special:Contributions/Leocavallari|Wiki Contributions]].&lt;/div&gt;</summary>
		<author><name>Leocavallari</name></author>	</entry>

	</feed>